Analysis
-
max time kernel
149s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 19:35
Behavioral task
behavioral1
Sample
78ccb45bd7267130e27d5afe998eab92_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
78ccb45bd7267130e27d5afe998eab92_JaffaCakes118.exe
-
Size
256KB
-
MD5
78ccb45bd7267130e27d5afe998eab92
-
SHA1
b45b2804e73e62dbe1577e7f1c4bc1d993c8456f
-
SHA256
dc46d1d0564c7a9f7791aa49670282ac4085c5f487bc56becf5fbfc46e66f080
-
SHA512
cb7026ce526a086fa378a3aaf25c54da594af556711e0e3a6e15c0e2656686cafad6a612de20d819df64f271673c686109ef388b594fe217979dbc1607cdf43e
-
SSDEEP
6144:N5MwggJf+HW7zWnsMdqkEjiPISUOgW9X+h8:N5MElOW2ZMkmZzcui
Malware Config
Signatures
-
Malware Dropper & Backdoor - Berbew 18 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral2/files/0x000e000000023b9d-10.dat family_berbew behavioral2/files/0x000c000000023b9e-12.dat family_berbew behavioral2/files/0x0002000000022ab5-32.dat family_berbew behavioral2/files/0x000d000000023bb3-45.dat family_berbew behavioral2/files/0x003800000001b530-57.dat family_berbew behavioral2/files/0x0007000000022ab7-71.dat family_berbew behavioral2/files/0x000f000000023a76-82.dat family_berbew behavioral2/files/0x001c000000023af6-105.dat family_berbew behavioral2/files/0x0012000000023a53-117.dat family_berbew behavioral2/files/0x001c000000023a52-128.dat family_berbew behavioral2/files/0x0017000000023aec-141.dat family_berbew behavioral2/files/0x0019000000023b0e-152.dat family_berbew behavioral2/files/0x001b000000023a54-178.dat family_berbew behavioral2/files/0x0018000000023a6f-189.dat family_berbew behavioral2/files/0x0017000000023bb7-201.dat family_berbew behavioral2/files/0x0024000000023ae9-214.dat family_berbew behavioral2/files/0x000a000000023bc5-224.dat family_berbew behavioral2/files/0x000f000000023bc7-250.dat family_berbew -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation CHOSZ.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation GDBMZ.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation ZJQMSK.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation HNJGRMC.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation DCG.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation MLZWIRJ.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation NSS.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation DHEM.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation IAP.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation VJFSK.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation ONHNZKN.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation LZGSQS.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation SXVPK.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation ZBNJRG.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation ARZHJD.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation LJPSBW.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation UGGKH.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation MDU.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation TCOYA.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation HQEMAZZ.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation VZPDI.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation XQJ.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation XGWS.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation TCZXHVP.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation HSV.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation DBY.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation YYWCZ.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation OBVY.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation BYTOF.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation KIADZ.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation BZW.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation SESQJY.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation PDA.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation MGQJMK.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation WKQQC.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation YDGPC.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation AJIALH.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation SKKFWEJ.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation SXP.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation FBYYYD.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation HNPD.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation UWZ.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation GRQ.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation BAKOMBL.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation BTP.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation VDIGJH.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation XHGFQ.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation KQFJZS.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation ICIOKKI.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation PVBL.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation ZHMFPGV.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation JBSNO.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation TBBIBBP.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation BYZK.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation QKATKVI.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation LDGBX.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation PVELDZZ.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation IXLDTXF.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation VERX.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation FXESETV.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation VABXAI.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation KXMJD.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation GDGKY.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation UOS.exe -
Executes dropped EXE 64 IoCs
pid Process 528 WKQQC.exe 4580 VDZRQ.exe 4924 MDU.exe 3936 OBVY.exe 2732 UWZ.exe 3788 DUTA.exe 1264 ZSZXL.exe 3924 CNQYXT.exe 2604 BYTOF.exe 4620 KGVURW.exe 4144 DBY.exe 4800 YMP.exe 1196 QPTSQ.exe 3340 KIADZ.exe 3852 ISLT.exe 4180 POOM.exe 1860 NDV.exe 2732 AJIALH.exe 2320 SKKFWEJ.exe 4944 PKU.exe 1268 IDBTKJ.exe 920 VNRRYM.exe 4408 PBQPD.exe 632 HEUT.exe 3456 WZEXBYC.exe 3192 KXMJD.exe 1032 OCWY.exe 4316 LDGBX.exe 1776 VDIGJH.exe 384 DRMUTF.exe 3640 XEREWFC.exe 2188 JUKW.exe 1008 IFV.exe 3172 QKATKVI.exe 3524 WFLTQKQ.exe 3648 SLRR.exe 384 BZW.exe 4168 DHEM.exe 3980 TCOYA.exe 1204 ISB.exe 2616 JVFLVE.exe 748 HQEMAZZ.exe 3972 ROSHHHH.exe 1668 TBBIBBP.exe 1304 VZPDI.exe 1564 ZCN.exe 4212 PXWCBP.exe 1204 PVELDZZ.exe 4116 OLLWPTG.exe 748 FTRTCKJ.exe 2880 PTTYF.exe 4708 XHGFQ.exe 2772 CHOSZ.exe 920 SXP.exe 4880 HSYWQQ.exe 2044 GDBMZ.exe 924 PLDRCC.exe 3260 ZJQMSK.exe 4868 HPVSVI.exe 4572 UZMR.exe 1892 IXLDTXF.exe 2472 XAVHE.exe 2640 DOHIJGW.exe 2352 JOOWAIX.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\windows\SysWOW64\DBY.exe.bat KGVURW.exe File created C:\windows\SysWOW64\POOM.exe ISLT.exe File created C:\windows\SysWOW64\IDBTKJ.exe PKU.exe File opened for modification C:\windows\SysWOW64\PBQPD.exe VNRRYM.exe File created C:\windows\SysWOW64\OLLWPTG.exe PVELDZZ.exe File opened for modification C:\windows\SysWOW64\OLLWPTG.exe PVELDZZ.exe File created C:\windows\SysWOW64\HPVSVI.exe.bat ZJQMSK.exe File created C:\windows\SysWOW64\UWZ.exe.bat OBVY.exe File created C:\windows\SysWOW64\LZGSQS.exe.bat VJFSK.exe File opened for modification C:\windows\SysWOW64\YDGPC.exe BTP.exe File created C:\windows\SysWOW64\UZMR.exe HPVSVI.exe File created C:\windows\SysWOW64\OLLWPTG.exe.bat PVELDZZ.exe File created C:\windows\SysWOW64\JFY.exe ICIOKKI.exe File opened for modification C:\windows\SysWOW64\ZHDW.exe THVICMU.exe File opened for modification C:\windows\SysWOW64\OVGT.exe IAP.exe File created C:\windows\SysWOW64\ARZHJD.exe MLZWIRJ.exe File opened for modification C:\windows\SysWOW64\ARZHJD.exe MLZWIRJ.exe File created C:\windows\SysWOW64\UWZ.exe OBVY.exe File created C:\windows\SysWOW64\LZGSQS.exe VJFSK.exe File created C:\windows\SysWOW64\PITKUH.exe QXQUTBS.exe File created C:\windows\SysWOW64\LJPSBW.exe.bat ARZHJD.exe File created C:\windows\SysWOW64\VDZRQ.exe WKQQC.exe File opened for modification C:\windows\SysWOW64\IDBTKJ.exe PKU.exe File created C:\windows\SysWOW64\SXVPK.exe.bat WRNDIT.exe File created C:\windows\SysWOW64\XQJ.exe.bat BYZK.exe File opened for modification C:\windows\SysWOW64\BGQVWNH.exe XQJ.exe File created C:\windows\SysWOW64\FXESETV.exe DZY.exe File created C:\windows\SysWOW64\PVBL.exe AZQK.exe File created C:\windows\SysWOW64\PVBL.exe.bat AZQK.exe File created C:\windows\SysWOW64\ISLT.exe.bat KIADZ.exe File created C:\windows\SysWOW64\AJIALH.exe NDV.exe File created C:\windows\SysWOW64\WRNDIT.exe LZGSQS.exe File created C:\windows\SysWOW64\MPG.exe ZEQMW.exe File created C:\windows\SysWOW64\LJPSBW.exe ARZHJD.exe File created C:\windows\SysWOW64\NDV.exe.bat POOM.exe File created C:\windows\SysWOW64\DRMUTF.exe VDIGJH.exe File created C:\windows\SysWOW64\GDBMZ.exe.bat HSYWQQ.exe File opened for modification C:\windows\SysWOW64\ZBNJRG.exe PDA.exe File created C:\windows\SysWOW64\XDTE.exe.bat GDEG.exe File created C:\windows\SysWOW64\KGVURW.exe.bat BYTOF.exe File created C:\windows\SysWOW64\PBQPD.exe VNRRYM.exe File opened for modification C:\windows\SysWOW64\ROSHHHH.exe HQEMAZZ.exe File created C:\windows\SysWOW64\IPWTM.exe FCFK.exe File created C:\windows\SysWOW64\SXVPK.exe WRNDIT.exe File opened for modification C:\windows\SysWOW64\OXNFZC.exe GRAYOW.exe File opened for modification C:\windows\SysWOW64\JFY.exe ICIOKKI.exe File created C:\windows\SysWOW64\YCB.exe.bat UUVYWI.exe File created C:\windows\SysWOW64\NDV.exe POOM.exe File created C:\windows\SysWOW64\ZHDW.exe THVICMU.exe File opened for modification C:\windows\SysWOW64\YCB.exe UUVYWI.exe File opened for modification C:\windows\SysWOW64\BYTOF.exe CNQYXT.exe File created C:\windows\SysWOW64\IDBTKJ.exe.bat PKU.exe File created C:\windows\SysWOW64\DHEM.exe BZW.exe File created C:\windows\SysWOW64\FTRTCKJ.exe.bat OLLWPTG.exe File created C:\windows\SysWOW64\IPWTM.exe.bat FCFK.exe File created C:\windows\SysWOW64\QXQUTBS.exe.bat VJLLJ.exe File created C:\windows\SysWOW64\MPG.exe.bat ZEQMW.exe File created C:\windows\SysWOW64\BNE.exe KNCFQB.exe File created C:\windows\SysWOW64\KGVURW.exe BYTOF.exe File created C:\windows\SysWOW64\NECAXTS.exe JBSNO.exe File created C:\windows\SysWOW64\OVGT.exe IAP.exe File opened for modification C:\windows\SysWOW64\POOM.exe ISLT.exe File opened for modification C:\windows\SysWOW64\HPVSVI.exe ZJQMSK.exe File created C:\windows\SysWOW64\EKBFIXJ.exe ZEJPRU.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\windows\QIOYR.exe.bat DFSAMQ.exe File opened for modification C:\windows\system\VLUVPVX.exe DIQSK.exe File created C:\windows\system\TCZXHVP.exe XXT.exe File created C:\windows\system\NEMQZ.exe.bat ZHMFPGV.exe File created C:\windows\system\APEHWCW.exe CEB.exe File created C:\windows\system\GDEG.exe RIVCSH.exe File created C:\windows\BCSLMT.exe.bat UGGKH.exe File created C:\windows\VZPDI.exe.bat TBBIBBP.exe File opened for modification C:\windows\FBYYYD.exe VJPZ.exe File created C:\windows\XXT.exe.bat MPG.exe File opened for modification C:\windows\system\CEB.exe DLQJ.exe File created C:\windows\system\UGGKH.exe DYSMU.exe File created C:\windows\HSYWQQ.exe.bat SXP.exe File created C:\windows\system\GNQJOJ.exe.bat EQLPYAH.exe File created C:\windows\system\LGS.exe.bat BGQVWNH.exe File created C:\windows\system\KIADZ.exe QPTSQ.exe File opened for modification C:\windows\PTTYF.exe FTRTCKJ.exe File opened for modification C:\windows\system\RREJHV.exe MOAKCEQ.exe File opened for modification C:\windows\DUTA.exe UWZ.exe File created C:\windows\CHOSZ.exe.bat XHGFQ.exe File created C:\windows\system\KJWAS.exe.bat KOS.exe File created C:\windows\DCG.exe FBYYYD.exe File created C:\windows\GDGKY.exe.bat HSV.exe File created C:\windows\EQLPYAH.exe.bat PVBL.exe File opened for modification C:\windows\system\OCWY.exe KXMJD.exe File created C:\windows\PWUSV.exe SESQJY.exe File created C:\windows\system\DIQSK.exe ONHNZKN.exe File created C:\windows\GRQ.exe.bat NOMWHC.exe File opened for modification C:\windows\SNU.exe OXNFZC.exe File created C:\windows\FBYYYD.exe VJPZ.exe File opened for modification C:\windows\system\GDEG.exe RIVCSH.exe File opened for modification C:\windows\HSYWQQ.exe SXP.exe File created C:\windows\system\KXMJD.exe WZEXBYC.exe File created C:\windows\VZPDI.exe TBBIBBP.exe File created C:\windows\system\XHGFQ.exe.bat PTTYF.exe File created C:\windows\JOOWAIX.exe.bat DOHIJGW.exe File created C:\windows\KQFJZS.exe.bat KNBGTCU.exe File created C:\windows\system\OLC.exe QVJIH.exe File created C:\windows\system\DLQJ.exe SSJ.exe File created C:\windows\system\ZSZXL.exe.bat DUTA.exe File created C:\windows\system\UGGKH.exe.bat DYSMU.exe File created C:\windows\XGWS.exe.bat BAKOMBL.exe File created C:\windows\ZEJPRU.exe.bat RREJHV.exe File created C:\windows\system\OXDZFQY.exe GRQ.exe File created C:\windows\ZPG.exe.bat OXDZFQY.exe File opened for modification C:\windows\EQLPYAH.exe PVBL.exe File created C:\windows\system\TBBIBBP.exe.bat ROSHHHH.exe File opened for modification C:\windows\system\ZSZXL.exe DUTA.exe File created C:\windows\LDGBX.exe.bat OCWY.exe File created C:\windows\system\HQEMAZZ.exe.bat JVFLVE.exe File created C:\windows\KNBGTCU.exe.bat IPWTM.exe File opened for modification C:\windows\system\OXDZFQY.exe GRQ.exe File created C:\windows\MGQJMK.exe.bat IYBJ.exe File created C:\windows\system\WKQQC.exe.bat 78ccb45bd7267130e27d5afe998eab92_JaffaCakes118.exe File created C:\windows\ISB.exe TCOYA.exe File created C:\windows\PTTYF.exe.bat FTRTCKJ.exe File opened for modification C:\windows\ZPG.exe OXDZFQY.exe File opened for modification C:\windows\system\DZY.exe CWUUJV.exe File opened for modification C:\windows\system\VDIGJH.exe LDGBX.exe File created C:\windows\system\ZCN.exe VZPDI.exe File opened for modification C:\windows\system\YFWFZA.exe PWUSV.exe File created C:\windows\NOMWHC.exe.bat JJCHZ.exe File opened for modification C:\windows\system\LGS.exe BGQVWNH.exe File created C:\windows\system\VDIGJH.exe.bat LDGBX.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 64 IoCs
pid pid_target Process procid_target 1824 396 WerFault.exe 82 1200 528 WerFault.exe 90 1496 4580 WerFault.exe 96 1304 4924 WerFault.exe 101 872 3936 WerFault.exe 106 4160 2732 WerFault.exe 111 4232 3788 WerFault.exe 118 4708 1264 WerFault.exe 125 3580 3924 WerFault.exe 132 2164 2604 WerFault.exe 137 1204 4620 WerFault.exe 143 2732 4144 WerFault.exe 148 4332 4800 WerFault.exe 154 548 1196 WerFault.exe 159 3016 3340 WerFault.exe 164 4568 3852 WerFault.exe 170 4948 4180 WerFault.exe 176 4884 1860 WerFault.exe 181 4416 2732 WerFault.exe 186 408 2320 WerFault.exe 191 752 4944 WerFault.exe 196 1788 1268 WerFault.exe 201 3932 920 WerFault.exe 206 5048 4408 WerFault.exe 211 4412 632 WerFault.exe 216 1556 3456 WerFault.exe 221 3712 3192 WerFault.exe 226 2124 1032 WerFault.exe 231 4208 4316 WerFault.exe 236 4480 1776 WerFault.exe 241 4116 384 WerFault.exe 246 3508 3640 WerFault.exe 251 4716 2188 WerFault.exe 256 3576 1008 WerFault.exe 261 2384 3172 WerFault.exe 266 4472 3524 WerFault.exe 271 1284 3648 WerFault.exe 277 2148 384 WerFault.exe 282 3528 4168 WerFault.exe 287 4944 3980 WerFault.exe 292 4020 1204 WerFault.exe 297 4416 2616 WerFault.exe 302 3336 748 WerFault.exe 307 1656 3972 WerFault.exe 312 4316 1668 WerFault.exe 317 1972 1304 WerFault.exe 322 4572 1564 WerFault.exe 328 1728 4212 WerFault.exe 333 1136 1204 WerFault.exe 338 4544 4116 WerFault.exe 343 400 748 WerFault.exe 348 1920 2880 WerFault.exe 353 3104 4708 WerFault.exe 358 3520 2772 WerFault.exe 363 2788 920 WerFault.exe 368 2724 4880 WerFault.exe 373 3968 2044 WerFault.exe 378 2392 924 WerFault.exe 383 1972 3260 WerFault.exe 388 4524 4868 WerFault.exe 393 4952 4572 WerFault.exe 398 3620 1892 WerFault.exe 403 1556 2472 WerFault.exe 408 3640 2640 WerFault.exe 413 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 396 78ccb45bd7267130e27d5afe998eab92_JaffaCakes118.exe 396 78ccb45bd7267130e27d5afe998eab92_JaffaCakes118.exe 528 WKQQC.exe 528 WKQQC.exe 4580 VDZRQ.exe 4580 VDZRQ.exe 4924 MDU.exe 4924 MDU.exe 3936 OBVY.exe 3936 OBVY.exe 2732 UWZ.exe 2732 UWZ.exe 3788 DUTA.exe 3788 DUTA.exe 1264 ZSZXL.exe 1264 ZSZXL.exe 3924 CNQYXT.exe 3924 CNQYXT.exe 2604 BYTOF.exe 2604 BYTOF.exe 4620 KGVURW.exe 4620 KGVURW.exe 4144 DBY.exe 4144 DBY.exe 4800 YMP.exe 4800 YMP.exe 1196 QPTSQ.exe 1196 QPTSQ.exe 3340 KIADZ.exe 3340 KIADZ.exe 3852 ISLT.exe 3852 ISLT.exe 4180 POOM.exe 4180 POOM.exe 1860 NDV.exe 1860 NDV.exe 2732 AJIALH.exe 2732 AJIALH.exe 2320 SKKFWEJ.exe 2320 SKKFWEJ.exe 4944 PKU.exe 4944 PKU.exe 1268 IDBTKJ.exe 1268 IDBTKJ.exe 920 VNRRYM.exe 920 VNRRYM.exe 4408 PBQPD.exe 4408 PBQPD.exe 632 HEUT.exe 632 HEUT.exe 3456 WZEXBYC.exe 3456 WZEXBYC.exe 3192 KXMJD.exe 3192 KXMJD.exe 1032 OCWY.exe 1032 OCWY.exe 4316 LDGBX.exe 4316 LDGBX.exe 1776 VDIGJH.exe 1776 VDIGJH.exe 384 DRMUTF.exe 384 DRMUTF.exe 3640 XEREWFC.exe 3640 XEREWFC.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 396 78ccb45bd7267130e27d5afe998eab92_JaffaCakes118.exe 396 78ccb45bd7267130e27d5afe998eab92_JaffaCakes118.exe 528 WKQQC.exe 528 WKQQC.exe 4580 VDZRQ.exe 4580 VDZRQ.exe 4924 MDU.exe 4924 MDU.exe 3936 OBVY.exe 3936 OBVY.exe 2732 UWZ.exe 2732 UWZ.exe 3788 DUTA.exe 3788 DUTA.exe 1264 ZSZXL.exe 1264 ZSZXL.exe 3924 CNQYXT.exe 3924 CNQYXT.exe 2604 BYTOF.exe 2604 BYTOF.exe 4620 KGVURW.exe 4620 KGVURW.exe 4144 DBY.exe 4144 DBY.exe 4800 YMP.exe 4800 YMP.exe 1196 QPTSQ.exe 1196 QPTSQ.exe 3340 KIADZ.exe 3340 KIADZ.exe 3852 ISLT.exe 3852 ISLT.exe 4180 POOM.exe 4180 POOM.exe 1860 NDV.exe 1860 NDV.exe 2732 AJIALH.exe 2732 AJIALH.exe 2320 SKKFWEJ.exe 2320 SKKFWEJ.exe 4944 PKU.exe 4944 PKU.exe 1268 IDBTKJ.exe 1268 IDBTKJ.exe 920 VNRRYM.exe 920 VNRRYM.exe 4408 PBQPD.exe 4408 PBQPD.exe 632 HEUT.exe 632 HEUT.exe 3456 WZEXBYC.exe 3456 WZEXBYC.exe 3192 KXMJD.exe 3192 KXMJD.exe 1032 OCWY.exe 1032 OCWY.exe 4316 LDGBX.exe 4316 LDGBX.exe 1776 VDIGJH.exe 1776 VDIGJH.exe 384 DRMUTF.exe 384 DRMUTF.exe 3640 XEREWFC.exe 3640 XEREWFC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 396 wrote to memory of 3320 396 78ccb45bd7267130e27d5afe998eab92_JaffaCakes118.exe 86 PID 396 wrote to memory of 3320 396 78ccb45bd7267130e27d5afe998eab92_JaffaCakes118.exe 86 PID 396 wrote to memory of 3320 396 78ccb45bd7267130e27d5afe998eab92_JaffaCakes118.exe 86 PID 3320 wrote to memory of 528 3320 cmd.exe 90 PID 3320 wrote to memory of 528 3320 cmd.exe 90 PID 3320 wrote to memory of 528 3320 cmd.exe 90 PID 528 wrote to memory of 392 528 WKQQC.exe 92 PID 528 wrote to memory of 392 528 WKQQC.exe 92 PID 528 wrote to memory of 392 528 WKQQC.exe 92 PID 392 wrote to memory of 4580 392 cmd.exe 96 PID 392 wrote to memory of 4580 392 cmd.exe 96 PID 392 wrote to memory of 4580 392 cmd.exe 96 PID 4580 wrote to memory of 436 4580 VDZRQ.exe 97 PID 4580 wrote to memory of 436 4580 VDZRQ.exe 97 PID 4580 wrote to memory of 436 4580 VDZRQ.exe 97 PID 436 wrote to memory of 4924 436 cmd.exe 101 PID 436 wrote to memory of 4924 436 cmd.exe 101 PID 436 wrote to memory of 4924 436 cmd.exe 101 PID 4924 wrote to memory of 2188 4924 MDU.exe 102 PID 4924 wrote to memory of 2188 4924 MDU.exe 102 PID 4924 wrote to memory of 2188 4924 MDU.exe 102 PID 2188 wrote to memory of 3936 2188 cmd.exe 106 PID 2188 wrote to memory of 3936 2188 cmd.exe 106 PID 2188 wrote to memory of 3936 2188 cmd.exe 106 PID 3936 wrote to memory of 4508 3936 OBVY.exe 107 PID 3936 wrote to memory of 4508 3936 OBVY.exe 107 PID 3936 wrote to memory of 4508 3936 OBVY.exe 107 PID 4508 wrote to memory of 2732 4508 cmd.exe 111 PID 4508 wrote to memory of 2732 4508 cmd.exe 111 PID 4508 wrote to memory of 2732 4508 cmd.exe 111 PID 2732 wrote to memory of 1788 2732 UWZ.exe 114 PID 2732 wrote to memory of 1788 2732 UWZ.exe 114 PID 2732 wrote to memory of 1788 2732 UWZ.exe 114 PID 1788 wrote to memory of 3788 1788 cmd.exe 118 PID 1788 wrote to memory of 3788 1788 cmd.exe 118 PID 1788 wrote to memory of 3788 1788 cmd.exe 118 PID 3788 wrote to memory of 468 3788 DUTA.exe 121 PID 3788 wrote to memory of 468 3788 DUTA.exe 121 PID 3788 wrote to memory of 468 3788 DUTA.exe 121 PID 468 wrote to memory of 1264 468 cmd.exe 125 PID 468 wrote to memory of 1264 468 cmd.exe 125 PID 468 wrote to memory of 1264 468 cmd.exe 125 PID 1264 wrote to memory of 3892 1264 ZSZXL.exe 128 PID 1264 wrote to memory of 3892 1264 ZSZXL.exe 128 PID 1264 wrote to memory of 3892 1264 ZSZXL.exe 128 PID 3892 wrote to memory of 3924 3892 cmd.exe 132 PID 3892 wrote to memory of 3924 3892 cmd.exe 132 PID 3892 wrote to memory of 3924 3892 cmd.exe 132 PID 3924 wrote to memory of 1728 3924 CNQYXT.exe 133 PID 3924 wrote to memory of 1728 3924 CNQYXT.exe 133 PID 3924 wrote to memory of 1728 3924 CNQYXT.exe 133 PID 1728 wrote to memory of 2604 1728 cmd.exe 137 PID 1728 wrote to memory of 2604 1728 cmd.exe 137 PID 1728 wrote to memory of 2604 1728 cmd.exe 137 PID 2604 wrote to memory of 2868 2604 BYTOF.exe 139 PID 2604 wrote to memory of 2868 2604 BYTOF.exe 139 PID 2604 wrote to memory of 2868 2604 BYTOF.exe 139 PID 2868 wrote to memory of 4620 2868 cmd.exe 143 PID 2868 wrote to memory of 4620 2868 cmd.exe 143 PID 2868 wrote to memory of 4620 2868 cmd.exe 143 PID 4620 wrote to memory of 3936 4620 KGVURW.exe 144 PID 4620 wrote to memory of 3936 4620 KGVURW.exe 144 PID 4620 wrote to memory of 3936 4620 KGVURW.exe 144 PID 3936 wrote to memory of 4144 3936 cmd.exe 148
Processes
-
C:\Users\Admin\AppData\Local\Temp\78ccb45bd7267130e27d5afe998eab92_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\78ccb45bd7267130e27d5afe998eab92_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\WKQQC.exe.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\windows\system\WKQQC.exeC:\windows\system\WKQQC.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\VDZRQ.exe.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:392 -
C:\windows\SysWOW64\VDZRQ.exeC:\windows\system32\VDZRQ.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\MDU.exe.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:436 -
C:\windows\MDU.exeC:\windows\MDU.exe7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\OBVY.exe.bat" "8⤵
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\windows\SysWOW64\OBVY.exeC:\windows\system32\OBVY.exe9⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\UWZ.exe.bat" "10⤵
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\windows\SysWOW64\UWZ.exeC:\windows\system32\UWZ.exe11⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\DUTA.exe.bat" "12⤵
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\windows\DUTA.exeC:\windows\DUTA.exe13⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ZSZXL.exe.bat" "14⤵
- Suspicious use of WriteProcessMemory
PID:468 -
C:\windows\system\ZSZXL.exeC:\windows\system\ZSZXL.exe15⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\CNQYXT.exe.bat" "16⤵
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\windows\CNQYXT.exeC:\windows\CNQYXT.exe17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\BYTOF.exe.bat" "18⤵
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\windows\SysWOW64\BYTOF.exeC:\windows\system32\BYTOF.exe19⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\KGVURW.exe.bat" "20⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\windows\SysWOW64\KGVURW.exeC:\windows\system32\KGVURW.exe21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\DBY.exe.bat" "22⤵
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\windows\SysWOW64\DBY.exeC:\windows\system32\DBY.exe23⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4144 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\YMP.exe.bat" "24⤵PID:3296
-
C:\windows\YMP.exeC:\windows\YMP.exe25⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4800 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\QPTSQ.exe.bat" "26⤵PID:4376
-
C:\windows\system\QPTSQ.exeC:\windows\system\QPTSQ.exe27⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1196 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\KIADZ.exe.bat" "28⤵PID:1284
-
C:\windows\system\KIADZ.exeC:\windows\system\KIADZ.exe29⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3340 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\ISLT.exe.bat" "30⤵PID:1556
-
C:\windows\SysWOW64\ISLT.exeC:\windows\system32\ISLT.exe31⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3852 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\POOM.exe.bat" "32⤵PID:1776
-
C:\windows\SysWOW64\POOM.exeC:\windows\system32\POOM.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4180 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\NDV.exe.bat" "34⤵PID:412
-
C:\windows\SysWOW64\NDV.exeC:\windows\system32\NDV.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1860 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\AJIALH.exe.bat" "36⤵PID:4620
-
C:\windows\SysWOW64\AJIALH.exeC:\windows\system32\AJIALH.exe37⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2732 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\SKKFWEJ.exe.bat" "38⤵PID:3124
-
C:\windows\system\SKKFWEJ.exeC:\windows\system\SKKFWEJ.exe39⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2320 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\PKU.exe.bat" "40⤵PID:1920
-
C:\windows\system\PKU.exeC:\windows\system\PKU.exe41⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\IDBTKJ.exe.bat" "42⤵PID:1304
-
C:\windows\SysWOW64\IDBTKJ.exeC:\windows\system32\IDBTKJ.exe43⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1268 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\VNRRYM.exe.bat" "44⤵PID:4320
-
C:\windows\VNRRYM.exeC:\windows\VNRRYM.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:920 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\PBQPD.exe.bat" "46⤵PID:5044
-
C:\windows\SysWOW64\PBQPD.exeC:\windows\system32\PBQPD.exe47⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4408 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\HEUT.exe.bat" "48⤵PID:5112
-
C:\windows\HEUT.exeC:\windows\HEUT.exe49⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:632 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\WZEXBYC.exe.bat" "50⤵PID:2472
-
C:\windows\SysWOW64\WZEXBYC.exeC:\windows\system32\WZEXBYC.exe51⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3456 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\KXMJD.exe.bat" "52⤵PID:2460
-
C:\windows\system\KXMJD.exeC:\windows\system\KXMJD.exe53⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3192 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\OCWY.exe.bat" "54⤵PID:4716
-
C:\windows\system\OCWY.exeC:\windows\system\OCWY.exe55⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1032 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\LDGBX.exe.bat" "56⤵PID:3296
-
C:\windows\LDGBX.exeC:\windows\LDGBX.exe57⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4316 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\VDIGJH.exe.bat" "58⤵PID:4668
-
C:\windows\system\VDIGJH.exeC:\windows\system\VDIGJH.exe59⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1776 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\DRMUTF.exe.bat" "60⤵PID:3584
-
C:\windows\SysWOW64\DRMUTF.exeC:\windows\system32\DRMUTF.exe61⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:384 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\XEREWFC.exe.bat" "62⤵PID:2424
-
C:\windows\system\XEREWFC.exeC:\windows\system\XEREWFC.exe63⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\JUKW.exe.bat" "64⤵PID:4580
-
C:\windows\system\JUKW.exeC:\windows\system\JUKW.exe65⤵
- Executes dropped EXE
PID:2188 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\IFV.exe.bat" "66⤵PID:1556
-
C:\windows\IFV.exeC:\windows\IFV.exe67⤵
- Executes dropped EXE
PID:1008 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\QKATKVI.exe.bat" "68⤵PID:984
-
C:\windows\QKATKVI.exeC:\windows\QKATKVI.exe69⤵
- Checks computer location settings
- Executes dropped EXE
PID:3172 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\WFLTQKQ.exe.bat" "70⤵PID:4668
-
C:\windows\WFLTQKQ.exeC:\windows\WFLTQKQ.exe71⤵
- Executes dropped EXE
PID:3524 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\SLRR.exe.bat" "72⤵PID:4444
-
C:\windows\SLRR.exeC:\windows\SLRR.exe73⤵
- Executes dropped EXE
PID:3648 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\BZW.exe.bat" "74⤵PID:4508
-
C:\windows\system\BZW.exeC:\windows\system\BZW.exe75⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:384 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\DHEM.exe.bat" "76⤵PID:2732
-
C:\windows\SysWOW64\DHEM.exeC:\windows\system32\DHEM.exe77⤵
- Checks computer location settings
- Executes dropped EXE
PID:4168 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\TCOYA.exe.bat" "78⤵PID:3788
-
C:\windows\TCOYA.exeC:\windows\TCOYA.exe79⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:3980 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ISB.exe.bat" "80⤵PID:3468
-
C:\windows\ISB.exeC:\windows\ISB.exe81⤵
- Executes dropped EXE
PID:1204 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\JVFLVE.exe.bat" "82⤵PID:2996
-
C:\windows\system\JVFLVE.exeC:\windows\system\JVFLVE.exe83⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2616 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\HQEMAZZ.exe.bat" "84⤵PID:2036
-
C:\windows\system\HQEMAZZ.exeC:\windows\system\HQEMAZZ.exe85⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\ROSHHHH.exe.bat" "86⤵PID:2564
-
C:\windows\SysWOW64\ROSHHHH.exeC:\windows\system32\ROSHHHH.exe87⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\TBBIBBP.exe.bat" "88⤵PID:2320
-
C:\windows\system\TBBIBBP.exeC:\windows\system\TBBIBBP.exe89⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:1668 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\VZPDI.exe.bat" "90⤵PID:4656
-
C:\windows\VZPDI.exeC:\windows\VZPDI.exe91⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:1304 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ZCN.exe.bat" "92⤵PID:2400
-
C:\windows\system\ZCN.exeC:\windows\system\ZCN.exe93⤵
- Executes dropped EXE
PID:1564 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\PXWCBP.exe.bat" "94⤵PID:4788
-
C:\windows\PXWCBP.exeC:\windows\PXWCBP.exe95⤵
- Executes dropped EXE
PID:4212 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\PVELDZZ.exe.bat" "96⤵PID:1892
-
C:\windows\PVELDZZ.exeC:\windows\PVELDZZ.exe97⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:1204 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\OLLWPTG.exe.bat" "98⤵PID:4580
-
C:\windows\SysWOW64\OLLWPTG.exeC:\windows\system32\OLLWPTG.exe99⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\FTRTCKJ.exe.bat" "100⤵PID:1376
-
C:\windows\SysWOW64\FTRTCKJ.exeC:\windows\system32\FTRTCKJ.exe101⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\PTTYF.exe.bat" "102⤵PID:4456
-
C:\windows\PTTYF.exeC:\windows\PTTYF.exe103⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2880 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\XHGFQ.exe.bat" "104⤵PID:752
-
C:\windows\system\XHGFQ.exeC:\windows\system\XHGFQ.exe105⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4708 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\CHOSZ.exe.bat" "106⤵PID:3344
-
C:\windows\CHOSZ.exeC:\windows\CHOSZ.exe107⤵
- Checks computer location settings
- Executes dropped EXE
PID:2772 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\SXP.exe.bat" "108⤵PID:3788
-
C:\windows\SXP.exeC:\windows\SXP.exe109⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:920 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\HSYWQQ.exe.bat" "110⤵PID:5040
-
C:\windows\HSYWQQ.exeC:\windows\HSYWQQ.exe111⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4880 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\GDBMZ.exe.bat" "112⤵PID:1860
-
C:\windows\SysWOW64\GDBMZ.exeC:\windows\system32\GDBMZ.exe113⤵
- Checks computer location settings
- Executes dropped EXE
PID:2044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\PLDRCC.exe.bat" "114⤵PID:3032
-
C:\windows\PLDRCC.exeC:\windows\PLDRCC.exe115⤵
- Executes dropped EXE
PID:924 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ZJQMSK.exe.bat" "116⤵PID:4456
-
C:\windows\system\ZJQMSK.exeC:\windows\system\ZJQMSK.exe117⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:3260 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\HPVSVI.exe.bat" "118⤵PID:3296
-
C:\windows\SysWOW64\HPVSVI.exeC:\windows\system32\HPVSVI.exe119⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4868 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\UZMR.exe.bat" "120⤵PID:4092
-
C:\windows\SysWOW64\UZMR.exeC:\windows\system32\UZMR.exe121⤵
- Executes dropped EXE
PID:4572 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\IXLDTXF.exe.bat" "122⤵PID:4232
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-