Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 20:08
Static task
static1
Behavioral task
behavioral1
Sample
e4a117a0311714ea836ce7564256d9b8_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e4a117a0311714ea836ce7564256d9b8_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
e4a117a0311714ea836ce7564256d9b8_JaffaCakes118.exe
-
Size
208KB
-
MD5
e4a117a0311714ea836ce7564256d9b8
-
SHA1
2f7b2b88ffd5b5efa9d145bcf5b0134678c9483a
-
SHA256
7a34a8374f396206511c8cb00d80a5817293afa93bfb464d50515a6597eff93c
-
SHA512
5557709ed7382b2e34f842a823b4424fa2bf504e2b0f235988aa04454ecff338ef9a484085c35eced308575f875d0bca8a969f969374a32339ff9047b124c274
-
SSDEEP
3072:gaJUoAbFDs6HdqpQj8u7DcYuHwTs9CLkeaqM7OBvi4NLthEjQT6:7ajFIyqpm8ukYTs9skLqMSBviQEj
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation MLV.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation HBABS.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation JGD.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation LHJE.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation NQJ.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation UKYPV.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation BOV.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation ZJW.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation IYNQD.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation VMKF.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation MOAKCEQ.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation CFIYXDB.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation VMJGPH.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation e4a117a0311714ea836ce7564256d9b8_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation ZFRYAJU.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation SFD.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation AZQK.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation MBNHVG.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation RIGORN.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation RZX.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation LMSPK.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation EEAKF.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation UFAEVWT.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation LZRW.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation EPWT.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation NEIIR.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation MMHTUGD.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation WKIFQPT.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation VFITAQ.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation WVUI.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation MQE.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation IOO.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation XQJ.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation THVICMU.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation VHSGMPF.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation KTH.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation GSA.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation WZOEV.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation KBKCAE.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation CHHS.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation HFN.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation TVGKP.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation ZVP.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation STYRU.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation ASYSH.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation QRMAX.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation FECYU.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation CWOXF.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation IOQHF.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation HFMAGH.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation SUBF.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation HMGWMR.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation KYLVQZN.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation CXBQZ.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation PINCIP.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation IXKP.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation GAXXQT.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation YTEG.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation GYXUIO.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation ESV.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation VLQXHJ.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation YDBCZK.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation EYOB.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation OLK.exe -
Executes dropped EXE 64 IoCs
pid Process 3096 IDRUQXG.exe 4572 FIXR.exe 2148 ORZWA.exe 4184 BTVVGE.exe 4460 UWZ.exe 4356 CHHS.exe 1840 WCMJJ.exe 4328 HVPURFZ.exe 3192 ESV.exe 1856 GQOT.exe 1788 IOUGMU.exe 1572 XJDS.exe 1020 LPL.exe 5008 AKUISF.exe 548 RKWNVLN.exe 4184 ASYSH.exe 3620 ZIKV.exe 3108 QRMAX.exe 3096 ORTOGNA.exe 4328 ZJW.exe 1876 CXBQZ.exe 552 JNCQGQT.exe 2332 GSA.exe 2976 MTIBWU.exe 4672 IYNQD.exe 2376 URQILL.exe 1048 IOO.exe 2888 ZXQL.exe 3652 NZHJSDF.exe 1060 TVGKP.exe 4684 MNNVG.exe 2472 FQRZLWE.exe 5008 ZEWI.exe 4752 YWH.exe 1816 PCRQ.exe 2592 RZX.exe 2668 VCVYBA.exe 1248 UAGBO.exe 1108 WYHVV.exe 4024 AGO.exe 4064 LZRW.exe 3316 WRMGP.exe 4504 ZFRYAJU.exe 5088 BCEK.exe 3236 QFOWAMD.exe 2308 BYR.exe 4384 YVPEQ.exe 1416 QZG.exe 440 WZOEV.exe 948 EEAKF.exe 2196 CFIYXDB.exe 4148 MCOKE.exe 3540 VLQXHJ.exe 4828 LBRP.exe 1968 JRK.exe 1908 PMJSGM.exe 3992 VMJGPH.exe 1808 FMLL.exe 2568 UQCYLZC.exe 3104 JGD.exe 1036 ETIYC.exe 3220 TOR.exe 1004 VMKF.exe 1984 RJQCB.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\windows\SysWOW64\XQJ.exe DDEDID.exe File created C:\windows\SysWOW64\ZUZMU.exe OBWT.exe File created C:\windows\SysWOW64\MQE.exe.bat NSS.exe File created C:\windows\SysWOW64\RKWNVLN.exe.bat AKUISF.exe File opened for modification C:\windows\SysWOW64\VCVYBA.exe RZX.exe File created C:\windows\SysWOW64\VMKF.exe TOR.exe File created C:\windows\SysWOW64\HFMAGH.exe NSIJ.exe File created C:\windows\SysWOW64\ZIKV.exe ASYSH.exe File created C:\windows\SysWOW64\BCEK.exe ZFRYAJU.exe File created C:\windows\SysWOW64\DTTLGUZ.exe.bat BVA.exe File opened for modification C:\windows\SysWOW64\CQUGI.exe NVLBXVH.exe File opened for modification C:\windows\SysWOW64\AZQK.exe RZO.exe File created C:\windows\SysWOW64\UFAEVWT.exe.bat WFTIM.exe File created C:\windows\SysWOW64\NWEETU.exe.bat CDJMK.exe File created C:\windows\SysWOW64\RKWNVLN.exe AKUISF.exe File opened for modification C:\windows\SysWOW64\GYZR.exe CQTRYGC.exe File created C:\windows\SysWOW64\HWSFAKM.exe NIVWQ.exe File created C:\windows\SysWOW64\UWZ.exe.bat BTVVGE.exe File created C:\windows\SysWOW64\XJDS.exe.bat IOUGMU.exe File created C:\windows\SysWOW64\MMHTUGD.exe RRCKKG.exe File created C:\windows\SysWOW64\LRO.exe.bat MUVQR.exe File created C:\windows\SysWOW64\FNO.exe HMGWMR.exe File opened for modification C:\windows\SysWOW64\AAZQRNG.exe HFN.exe File created C:\windows\SysWOW64\RJQCB.exe VMKF.exe File created C:\windows\SysWOW64\LHJE.exe.bat RJQCB.exe File created C:\windows\SysWOW64\AZQK.exe RZO.exe File opened for modification C:\windows\SysWOW64\HVPURFZ.exe WCMJJ.exe File created C:\windows\SysWOW64\XQJ.exe DDEDID.exe File opened for modification C:\windows\SysWOW64\ZUZMU.exe OBWT.exe File created C:\windows\SysWOW64\KYWPYFU.exe EYOB.exe File created C:\windows\SysWOW64\HBABS.exe.bat JLGYFN.exe File created C:\windows\SysWOW64\UURO.exe FZIKOT.exe File created C:\windows\SysWOW64\AAZQRNG.exe HFN.exe File created C:\windows\SysWOW64\BCEK.exe.bat ZFRYAJU.exe File created C:\windows\SysWOW64\NWEETU.exe CDJMK.exe File created C:\windows\SysWOW64\KBKCAE.exe.bat NWEETU.exe File created C:\windows\SysWOW64\MDX.exe GABH.exe File opened for modification C:\windows\SysWOW64\ZVP.exe VFITAQ.exe File opened for modification C:\windows\SysWOW64\IYNQD.exe MTIBWU.exe File opened for modification C:\windows\SysWOW64\AGO.exe WYHVV.exe File opened for modification C:\windows\SysWOW64\NWEETU.exe CDJMK.exe File created C:\windows\SysWOW64\DTTLGUZ.exe BVA.exe File created C:\windows\SysWOW64\LMSPK.exe LRO.exe File opened for modification C:\windows\SysWOW64\MDX.exe GABH.exe File created C:\windows\SysWOW64\MQE.exe NSS.exe File created C:\windows\SysWOW64\HVPURFZ.exe.bat WCMJJ.exe File opened for modification C:\windows\SysWOW64\WZOEV.exe QZG.exe File created C:\windows\SysWOW64\OBWT.exe.bat YDQQI.exe File created C:\windows\SysWOW64\NSS.exe NXHTGN.exe File created C:\windows\SysWOW64\GQOT.exe ESV.exe File created C:\windows\SysWOW64\GQOT.exe.bat ESV.exe File opened for modification C:\windows\SysWOW64\DTTLGUZ.exe BVA.exe File created C:\windows\SysWOW64\BFF.exe.bat JEDVVYR.exe File created C:\windows\SysWOW64\VHSGMPF.exe IXKP.exe File created C:\windows\SysWOW64\SUBF.exe UKYPV.exe File created C:\windows\SysWOW64\BVA.exe OLK.exe File opened for modification C:\windows\SysWOW64\BVA.exe OLK.exe File created C:\windows\SysWOW64\KYWPYFU.exe.bat EYOB.exe File created C:\windows\SysWOW64\ZHDW.exe.bat THVICMU.exe File opened for modification C:\windows\SysWOW64\IXKP.exe YHEVQ.exe File opened for modification C:\windows\SysWOW64\VHSGMPF.exe IXKP.exe File created C:\windows\SysWOW64\NOL.exe ADD.exe File created C:\windows\SysWOW64\HVPURFZ.exe WCMJJ.exe File created C:\windows\SysWOW64\MMHTUGD.exe.bat RRCKKG.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\windows\system\CJAMHW.exe.bat AMURZNL.exe File opened for modification C:\windows\WCMJJ.exe CHHS.exe File opened for modification C:\windows\system\UAGBO.exe VCVYBA.exe File opened for modification C:\windows\VLQXHJ.exe MCOKE.exe File created C:\windows\system\WVUI.exe NQJ.exe File opened for modification C:\windows\system\JLRS.exe CQUGI.exe File opened for modification C:\windows\system\THVICMU.exe NMWAFJ.exe File created C:\windows\system\EXSX.exe JKNFMBP.exe File opened for modification C:\windows\YTWGG.exe EXSX.exe File created C:\windows\system\CXBQZ.exe.bat ZJW.exe File opened for modification C:\windows\system\CJAMHW.exe AMURZNL.exe File created C:\windows\system\KEWEZSX.exe.bat KYWPYFU.exe File opened for modification C:\windows\system\VFITAQ.exe ZHDW.exe File opened for modification C:\windows\WJFSGWY.exe STYRU.exe File opened for modification C:\windows\HDQGKW.exe YUOTH.exe File created C:\windows\system\CDJMK.exe.bat XSFN.exe File opened for modification C:\windows\system\ZOPHALU.exe XQJ.exe File created C:\windows\MUVQR.exe.bat DTTLGUZ.exe File created C:\windows\system\ADD.exe.bat AAZQRNG.exe File created C:\windows\system\URQILL.exe IYNQD.exe File created C:\windows\system\OLK.exe.bat WKIFQPT.exe File created C:\windows\system\JLGYFN.exe OYCPV.exe File created C:\windows\system\MTIBWU.exe.bat GSA.exe File created C:\windows\KTH.exe.bat YDBCZK.exe File created C:\windows\AETETL.exe.bat ZAHI.exe File created C:\windows\FQRZLWE.exe.bat MNNVG.exe File created C:\windows\system\LBRP.exe.bat VLQXHJ.exe File created C:\windows\system\NSIJ.exe.bat SFD.exe File created C:\windows\FMEAXH.exe KYIR.exe File created C:\windows\system\JLRS.exe CQUGI.exe File opened for modification C:\windows\VRGF.exe MQE.exe File created C:\windows\system\ADD.exe AAZQRNG.exe File opened for modification C:\windows\AHBFXFG.exe EXKP.exe File opened for modification C:\windows\system\UVFX.exe AHBFXFG.exe File created C:\windows\system\BTVVGE.exe ORZWA.exe File created C:\windows\ORTOGNA.exe QRMAX.exe File opened for modification C:\windows\IOO.exe URQILL.exe File created C:\windows\BYR.exe.bat QFOWAMD.exe File created C:\windows\system\PRZUC.exe.bat WWV.exe File created C:\windows\system\CHHS.exe.bat UWZ.exe File created C:\windows\IOUGMU.exe.bat GQOT.exe File created C:\windows\QZG.exe YVPEQ.exe File created C:\windows\MUVQR.exe DTTLGUZ.exe File created C:\windows\ZAHI.exe ZVP.exe File opened for modification C:\windows\system\LPL.exe XJDS.exe File opened for modification C:\windows\ORTOGNA.exe QRMAX.exe File created C:\windows\KTH.exe YDBCZK.exe File opened for modification C:\windows\FMEAXH.exe KYIR.exe File opened for modification C:\windows\system\KEWEZSX.exe KYWPYFU.exe File opened for modification C:\windows\TVGKP.exe NZHJSDF.exe File created C:\windows\YUOTH.exe MMHTUGD.exe File opened for modification C:\windows\system\SFD.exe LHJE.exe File created C:\windows\system\WKIFQPT.exe.bat SUBF.exe File opened for modification C:\windows\MUVQR.exe DTTLGUZ.exe File opened for modification C:\windows\system\NXHTGN.exe UUDX.exe File created C:\windows\system\JGD.exe UQCYLZC.exe File created C:\windows\system\EYOB.exe.bat PINCIP.exe File created C:\windows\GAXXQT.exe.bat AZQK.exe File created C:\windows\system\UVFX.exe.bat AHBFXFG.exe File opened for modification C:\windows\MBNHVG.exe GBFU.exe File created C:\windows\CWOXF.exe KBKCAE.exe File created C:\windows\system\FECYU.exe.bat BOV.exe File opened for modification C:\windows\FZIKOT.exe VRGF.exe File created C:\windows\system\GABH.exe.bat PRZUC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 64 IoCs
pid pid_target Process procid_target 2992 4892 WerFault.exe 83 2448 3096 WerFault.exe 91 4736 4572 WerFault.exe 97 2192 2148 WerFault.exe 102 3612 4184 WerFault.exe 107 4552 4460 WerFault.exe 112 392 4356 WerFault.exe 118 3844 1840 WerFault.exe 125 3992 4328 WerFault.exe 131 3628 3192 WerFault.exe 136 3540 1856 WerFault.exe 141 3984 1788 WerFault.exe 147 3140 1572 WerFault.exe 152 1196 1020 WerFault.exe 157 4376 5008 WerFault.exe 162 3172 548 WerFault.exe 169 4072 4184 WerFault.exe 174 2988 3620 WerFault.exe 179 4584 3108 WerFault.exe 184 812 3096 WerFault.exe 189 1048 4328 WerFault.exe 194 3800 1876 WerFault.exe 199 2352 552 WerFault.exe 204 1620 2332 WerFault.exe 209 4584 2976 WerFault.exe 214 3424 4672 WerFault.exe 219 4868 2376 WerFault.exe 224 3552 1048 WerFault.exe 229 1104 2888 WerFault.exe 234 2872 3652 WerFault.exe 239 3844 1060 WerFault.exe 244 1920 4684 WerFault.exe 249 3444 2472 WerFault.exe 254 676 5008 WerFault.exe 259 4896 4752 WerFault.exe 264 868 1816 WerFault.exe 269 2520 2592 WerFault.exe 274 3404 2668 WerFault.exe 279 3240 1248 WerFault.exe 284 1856 1108 WerFault.exe 289 3540 4024 WerFault.exe 295 1572 4064 WerFault.exe 300 4356 3316 WerFault.exe 305 2312 4504 WerFault.exe 310 4244 5088 WerFault.exe 315 3736 3236 WerFault.exe 320 4024 2308 WerFault.exe 326 4816 4384 WerFault.exe 331 1772 1416 WerFault.exe 336 3124 440 WerFault.exe 341 2576 948 WerFault.exe 345 4212 2196 WerFault.exe 351 3656 4148 WerFault.exe 356 4592 3540 WerFault.exe 361 1304 4828 WerFault.exe 366 4868 1968 WerFault.exe 371 3312 1908 WerFault.exe 376 948 3992 WerFault.exe 381 1080 1808 WerFault.exe 386 2472 2568 WerFault.exe 391 2464 3104 WerFault.exe 396 3652 1036 WerFault.exe 401 2316 3220 WerFault.exe 406 2916 1004 WerFault.exe 411 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4892 e4a117a0311714ea836ce7564256d9b8_JaffaCakes118.exe 4892 e4a117a0311714ea836ce7564256d9b8_JaffaCakes118.exe 3096 IDRUQXG.exe 3096 IDRUQXG.exe 4572 FIXR.exe 4572 FIXR.exe 2148 ORZWA.exe 2148 ORZWA.exe 4184 BTVVGE.exe 4184 BTVVGE.exe 4460 UWZ.exe 4460 UWZ.exe 4356 CHHS.exe 4356 CHHS.exe 1840 WCMJJ.exe 1840 WCMJJ.exe 4328 HVPURFZ.exe 4328 HVPURFZ.exe 3192 ESV.exe 3192 ESV.exe 1856 GQOT.exe 1856 GQOT.exe 1788 IOUGMU.exe 1788 IOUGMU.exe 1572 XJDS.exe 1572 XJDS.exe 1020 LPL.exe 1020 LPL.exe 5008 AKUISF.exe 5008 AKUISF.exe 548 RKWNVLN.exe 548 RKWNVLN.exe 4184 ASYSH.exe 4184 ASYSH.exe 3620 ZIKV.exe 3620 ZIKV.exe 3108 QRMAX.exe 3108 QRMAX.exe 3096 ORTOGNA.exe 3096 ORTOGNA.exe 4328 ZJW.exe 4328 ZJW.exe 1876 CXBQZ.exe 1876 CXBQZ.exe 552 JNCQGQT.exe 552 JNCQGQT.exe 2332 GSA.exe 2332 GSA.exe 2976 MTIBWU.exe 2976 MTIBWU.exe 4672 IYNQD.exe 4672 IYNQD.exe 2376 URQILL.exe 2376 URQILL.exe 1048 IOO.exe 1048 IOO.exe 2888 ZXQL.exe 2888 ZXQL.exe 3652 NZHJSDF.exe 3652 NZHJSDF.exe 1060 TVGKP.exe 1060 TVGKP.exe 4684 MNNVG.exe 4684 MNNVG.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4892 e4a117a0311714ea836ce7564256d9b8_JaffaCakes118.exe 4892 e4a117a0311714ea836ce7564256d9b8_JaffaCakes118.exe 3096 IDRUQXG.exe 3096 IDRUQXG.exe 4572 FIXR.exe 4572 FIXR.exe 2148 ORZWA.exe 2148 ORZWA.exe 4184 BTVVGE.exe 4184 BTVVGE.exe 4460 UWZ.exe 4460 UWZ.exe 4356 CHHS.exe 4356 CHHS.exe 1840 WCMJJ.exe 1840 WCMJJ.exe 4328 HVPURFZ.exe 4328 HVPURFZ.exe 3192 ESV.exe 3192 ESV.exe 1856 GQOT.exe 1856 GQOT.exe 1788 IOUGMU.exe 1788 IOUGMU.exe 1572 XJDS.exe 1572 XJDS.exe 1020 LPL.exe 1020 LPL.exe 5008 AKUISF.exe 5008 AKUISF.exe 548 RKWNVLN.exe 548 RKWNVLN.exe 4184 ASYSH.exe 4184 ASYSH.exe 3620 ZIKV.exe 3620 ZIKV.exe 3108 QRMAX.exe 3108 QRMAX.exe 3096 ORTOGNA.exe 3096 ORTOGNA.exe 4328 ZJW.exe 4328 ZJW.exe 1876 CXBQZ.exe 1876 CXBQZ.exe 552 JNCQGQT.exe 552 JNCQGQT.exe 2332 GSA.exe 2332 GSA.exe 2976 MTIBWU.exe 2976 MTIBWU.exe 4672 IYNQD.exe 4672 IYNQD.exe 2376 URQILL.exe 2376 URQILL.exe 1048 IOO.exe 1048 IOO.exe 2888 ZXQL.exe 2888 ZXQL.exe 3652 NZHJSDF.exe 3652 NZHJSDF.exe 1060 TVGKP.exe 1060 TVGKP.exe 4684 MNNVG.exe 4684 MNNVG.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4892 wrote to memory of 5076 4892 e4a117a0311714ea836ce7564256d9b8_JaffaCakes118.exe 87 PID 4892 wrote to memory of 5076 4892 e4a117a0311714ea836ce7564256d9b8_JaffaCakes118.exe 87 PID 4892 wrote to memory of 5076 4892 e4a117a0311714ea836ce7564256d9b8_JaffaCakes118.exe 87 PID 5076 wrote to memory of 3096 5076 cmd.exe 91 PID 5076 wrote to memory of 3096 5076 cmd.exe 91 PID 5076 wrote to memory of 3096 5076 cmd.exe 91 PID 3096 wrote to memory of 3892 3096 IDRUQXG.exe 93 PID 3096 wrote to memory of 3892 3096 IDRUQXG.exe 93 PID 3096 wrote to memory of 3892 3096 IDRUQXG.exe 93 PID 3892 wrote to memory of 4572 3892 cmd.exe 97 PID 3892 wrote to memory of 4572 3892 cmd.exe 97 PID 3892 wrote to memory of 4572 3892 cmd.exe 97 PID 4572 wrote to memory of 2568 4572 FIXR.exe 98 PID 4572 wrote to memory of 2568 4572 FIXR.exe 98 PID 4572 wrote to memory of 2568 4572 FIXR.exe 98 PID 2568 wrote to memory of 2148 2568 cmd.exe 102 PID 2568 wrote to memory of 2148 2568 cmd.exe 102 PID 2568 wrote to memory of 2148 2568 cmd.exe 102 PID 2148 wrote to memory of 4592 2148 ORZWA.exe 103 PID 2148 wrote to memory of 4592 2148 ORZWA.exe 103 PID 2148 wrote to memory of 4592 2148 ORZWA.exe 103 PID 4592 wrote to memory of 4184 4592 cmd.exe 107 PID 4592 wrote to memory of 4184 4592 cmd.exe 107 PID 4592 wrote to memory of 4184 4592 cmd.exe 107 PID 4184 wrote to memory of 2224 4184 BTVVGE.exe 108 PID 4184 wrote to memory of 2224 4184 BTVVGE.exe 108 PID 4184 wrote to memory of 2224 4184 BTVVGE.exe 108 PID 2224 wrote to memory of 4460 2224 cmd.exe 112 PID 2224 wrote to memory of 4460 2224 cmd.exe 112 PID 2224 wrote to memory of 4460 2224 cmd.exe 112 PID 4460 wrote to memory of 1572 4460 UWZ.exe 115 PID 4460 wrote to memory of 1572 4460 UWZ.exe 115 PID 4460 wrote to memory of 1572 4460 UWZ.exe 115 PID 1572 wrote to memory of 4356 1572 cmd.exe 118 PID 1572 wrote to memory of 4356 1572 cmd.exe 118 PID 1572 wrote to memory of 4356 1572 cmd.exe 118 PID 4356 wrote to memory of 3924 4356 CHHS.exe 121 PID 4356 wrote to memory of 3924 4356 CHHS.exe 121 PID 4356 wrote to memory of 3924 4356 CHHS.exe 121 PID 3924 wrote to memory of 1840 3924 cmd.exe 125 PID 3924 wrote to memory of 1840 3924 cmd.exe 125 PID 3924 wrote to memory of 1840 3924 cmd.exe 125 PID 1840 wrote to memory of 2620 1840 WCMJJ.exe 127 PID 1840 wrote to memory of 2620 1840 WCMJJ.exe 127 PID 1840 wrote to memory of 2620 1840 WCMJJ.exe 127 PID 2620 wrote to memory of 4328 2620 cmd.exe 131 PID 2620 wrote to memory of 4328 2620 cmd.exe 131 PID 2620 wrote to memory of 4328 2620 cmd.exe 131 PID 4328 wrote to memory of 2312 4328 HVPURFZ.exe 132 PID 4328 wrote to memory of 2312 4328 HVPURFZ.exe 132 PID 4328 wrote to memory of 2312 4328 HVPURFZ.exe 132 PID 2312 wrote to memory of 3192 2312 cmd.exe 136 PID 2312 wrote to memory of 3192 2312 cmd.exe 136 PID 2312 wrote to memory of 3192 2312 cmd.exe 136 PID 3192 wrote to memory of 3408 3192 ESV.exe 137 PID 3192 wrote to memory of 3408 3192 ESV.exe 137 PID 3192 wrote to memory of 3408 3192 ESV.exe 137 PID 3408 wrote to memory of 1856 3408 cmd.exe 141 PID 3408 wrote to memory of 1856 3408 cmd.exe 141 PID 3408 wrote to memory of 1856 3408 cmd.exe 141 PID 1856 wrote to memory of 1036 1856 GQOT.exe 143 PID 1856 wrote to memory of 1036 1856 GQOT.exe 143 PID 1856 wrote to memory of 1036 1856 GQOT.exe 143 PID 1036 wrote to memory of 1788 1036 cmd.exe 147
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4a117a0311714ea836ce7564256d9b8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e4a117a0311714ea836ce7564256d9b8_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\IDRUQXG.exe.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\windows\IDRUQXG.exeC:\windows\IDRUQXG.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\FIXR.exe.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\windows\system\FIXR.exeC:\windows\system\FIXR.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ORZWA.exe.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\windows\ORZWA.exeC:\windows\ORZWA.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\BTVVGE.exe.bat" "8⤵
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\windows\system\BTVVGE.exeC:\windows\system\BTVVGE.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\UWZ.exe.bat" "10⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\windows\SysWOW64\UWZ.exeC:\windows\system32\UWZ.exe11⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\CHHS.exe.bat" "12⤵
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\windows\system\CHHS.exeC:\windows\system\CHHS.exe13⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\WCMJJ.exe.bat" "14⤵
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\windows\WCMJJ.exeC:\windows\WCMJJ.exe15⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\HVPURFZ.exe.bat" "16⤵
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\windows\SysWOW64\HVPURFZ.exeC:\windows\system32\HVPURFZ.exe17⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ESV.exe.bat" "18⤵
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\windows\ESV.exeC:\windows\ESV.exe19⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\GQOT.exe.bat" "20⤵
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\windows\SysWOW64\GQOT.exeC:\windows\system32\GQOT.exe21⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\IOUGMU.exe.bat" "22⤵
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\windows\IOUGMU.exeC:\windows\IOUGMU.exe23⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\XJDS.exe.bat" "24⤵PID:4280
-
C:\windows\SysWOW64\XJDS.exeC:\windows\system32\XJDS.exe25⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1572 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\LPL.exe.bat" "26⤵PID:2332
-
C:\windows\system\LPL.exeC:\windows\system\LPL.exe27⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\AKUISF.exe.bat" "28⤵PID:3940
-
C:\windows\system\AKUISF.exeC:\windows\system\AKUISF.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5008 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\RKWNVLN.exe.bat" "30⤵PID:948
-
C:\windows\SysWOW64\RKWNVLN.exeC:\windows\system32\RKWNVLN.exe31⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:548 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ASYSH.exe.bat" "32⤵PID:1876
-
C:\windows\system\ASYSH.exeC:\windows\system\ASYSH.exe33⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4184 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\ZIKV.exe.bat" "34⤵PID:2528
-
C:\windows\SysWOW64\ZIKV.exeC:\windows\system32\ZIKV.exe35⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3620 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\QRMAX.exe.bat" "36⤵PID:4564
-
C:\windows\system\QRMAX.exeC:\windows\system\QRMAX.exe37⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3108 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ORTOGNA.exe.bat" "38⤵PID:4336
-
C:\windows\ORTOGNA.exeC:\windows\ORTOGNA.exe39⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3096 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ZJW.exe.bat" "40⤵PID:3404
-
C:\windows\system\ZJW.exeC:\windows\system\ZJW.exe41⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4328 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\CXBQZ.exe.bat" "42⤵PID:3116
-
C:\windows\system\CXBQZ.exeC:\windows\system\CXBQZ.exe43⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1876 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\JNCQGQT.exe.bat" "44⤵PID:4744
-
C:\windows\JNCQGQT.exeC:\windows\JNCQGQT.exe45⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:552 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\GSA.exe.bat" "46⤵PID:2856
-
C:\windows\GSA.exeC:\windows\GSA.exe47⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2332 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\MTIBWU.exe.bat" "48⤵PID:4904
-
C:\windows\system\MTIBWU.exeC:\windows\system\MTIBWU.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2976 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\IYNQD.exe.bat" "50⤵PID:4788
-
C:\windows\SysWOW64\IYNQD.exeC:\windows\system32\IYNQD.exe51⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4672 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\URQILL.exe.bat" "52⤵PID:2472
-
C:\windows\system\URQILL.exeC:\windows\system\URQILL.exe53⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2376 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\IOO.exe.bat" "54⤵PID:5008
-
C:\windows\IOO.exeC:\windows\IOO.exe55⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1048 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ZXQL.exe.bat" "56⤵PID:4484
-
C:\windows\system\ZXQL.exeC:\windows\system\ZXQL.exe57⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\NZHJSDF.exe.bat" "58⤵PID:2368
-
C:\windows\NZHJSDF.exeC:\windows\NZHJSDF.exe59⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3652 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\TVGKP.exe.bat" "60⤵PID:3228
-
C:\windows\TVGKP.exeC:\windows\TVGKP.exe61⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\MNNVG.exe.bat" "62⤵PID:5000
-
C:\windows\MNNVG.exeC:\windows\MNNVG.exe63⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\FQRZLWE.exe.bat" "64⤵PID:1964
-
C:\windows\FQRZLWE.exeC:\windows\FQRZLWE.exe65⤵
- Executes dropped EXE
PID:2472 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ZEWI.exe.bat" "66⤵PID:4968
-
C:\windows\ZEWI.exeC:\windows\ZEWI.exe67⤵
- Executes dropped EXE
PID:5008 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\YWH.exe.bat" "68⤵PID:972
-
C:\windows\system\YWH.exeC:\windows\system\YWH.exe69⤵
- Executes dropped EXE
PID:4752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\PCRQ.exe.bat" "70⤵PID:2524
-
C:\windows\PCRQ.exeC:\windows\PCRQ.exe71⤵
- Executes dropped EXE
PID:1816 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\RZX.exe.bat" "72⤵PID:4828
-
C:\windows\system\RZX.exeC:\windows\system\RZX.exe73⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:2592 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\VCVYBA.exe.bat" "74⤵PID:4280
-
C:\windows\SysWOW64\VCVYBA.exeC:\windows\system32\VCVYBA.exe75⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2668 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\UAGBO.exe.bat" "76⤵PID:960
-
C:\windows\system\UAGBO.exeC:\windows\system\UAGBO.exe77⤵
- Executes dropped EXE
PID:1248 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\WYHVV.exe.bat" "78⤵PID:1136
-
C:\windows\SysWOW64\WYHVV.exeC:\windows\system32\WYHVV.exe79⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1108 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\AGO.exe.bat" "80⤵PID:2528
-
C:\windows\SysWOW64\AGO.exeC:\windows\system32\AGO.exe81⤵
- Executes dropped EXE
PID:4024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\LZRW.exe.bat" "82⤵PID:4184
-
C:\windows\SysWOW64\LZRW.exeC:\windows\system32\LZRW.exe83⤵
- Checks computer location settings
- Executes dropped EXE
PID:4064 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\WRMGP.exe.bat" "84⤵PID:752
-
C:\windows\WRMGP.exeC:\windows\WRMGP.exe85⤵
- Executes dropped EXE
PID:3316 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ZFRYAJU.exe.bat" "86⤵PID:3968
-
C:\windows\system\ZFRYAJU.exeC:\windows\system\ZFRYAJU.exe87⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4504 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\BCEK.exe.bat" "88⤵PID:4572
-
C:\windows\SysWOW64\BCEK.exeC:\windows\system32\BCEK.exe89⤵
- Executes dropped EXE
PID:5088 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\QFOWAMD.exe.bat" "90⤵PID:1952
-
C:\windows\QFOWAMD.exeC:\windows\QFOWAMD.exe91⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3236 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\BYR.exe.bat" "92⤵PID:4148
-
C:\windows\BYR.exeC:\windows\BYR.exe93⤵
- Executes dropped EXE
PID:2308 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\YVPEQ.exe.bat" "94⤵PID:3608
-
C:\windows\system\YVPEQ.exeC:\windows\system\YVPEQ.exe95⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4384 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\QZG.exe.bat" "96⤵PID:3228
-
C:\windows\QZG.exeC:\windows\QZG.exe97⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1416 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\WZOEV.exe.bat" "98⤵PID:3604
-
C:\windows\SysWOW64\WZOEV.exeC:\windows\system32\WZOEV.exe99⤵
- Checks computer location settings
- Executes dropped EXE
PID:440 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\EEAKF.exe.bat" "100⤵PID:4988
-
C:\windows\EEAKF.exeC:\windows\EEAKF.exe101⤵
- Checks computer location settings
- Executes dropped EXE
PID:948 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\CFIYXDB.exe.bat" "102⤵PID:1984
-
C:\windows\system\CFIYXDB.exeC:\windows\system\CFIYXDB.exe103⤵
- Checks computer location settings
- Executes dropped EXE
PID:2196 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\MCOKE.exe.bat" "104⤵PID:964
-
C:\windows\system\MCOKE.exeC:\windows\system\MCOKE.exe105⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4148 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\VLQXHJ.exe.bat" "106⤵PID:4808
-
C:\windows\VLQXHJ.exeC:\windows\VLQXHJ.exe107⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:3540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\LBRP.exe.bat" "108⤵PID:2200
-
C:\windows\system\LBRP.exeC:\windows\system\LBRP.exe109⤵
- Executes dropped EXE
PID:4828 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\JRK.exe.bat" "110⤵PID:2724
-
C:\windows\JRK.exeC:\windows\JRK.exe111⤵
- Executes dropped EXE
PID:1968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\PMJSGM.exe.bat" "112⤵PID:3924
-
C:\windows\system\PMJSGM.exeC:\windows\system\PMJSGM.exe113⤵
- Executes dropped EXE
PID:1908 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\VMJGPH.exe.bat" "114⤵PID:3648
-
C:\windows\VMJGPH.exeC:\windows\VMJGPH.exe115⤵
- Checks computer location settings
- Executes dropped EXE
PID:3992 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\FMLL.exe.bat" "116⤵PID:448
-
C:\windows\system\FMLL.exeC:\windows\system\FMLL.exe117⤵
- Executes dropped EXE
PID:1808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\UQCYLZC.exe.bat" "118⤵PID:1672
-
C:\windows\system\UQCYLZC.exeC:\windows\system\UQCYLZC.exe119⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2568 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\JGD.exe.bat" "120⤵PID:1564
-
C:\windows\system\JGD.exeC:\windows\system\JGD.exe121⤵
- Checks computer location settings
- Executes dropped EXE
PID:3104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ETIYC.exe.bat" "122⤵PID:1816
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-