Analysis
-
max time kernel
61s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 07:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
383709cb3885c660314067b7d9543bf3_JaffaCakes118.exe
Resource
win7-20240704-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
383709cb3885c660314067b7d9543bf3_JaffaCakes118.exe
Resource
win10v2004-20240709-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
383709cb3885c660314067b7d9543bf3_JaffaCakes118.exe
-
Size
251KB
-
MD5
383709cb3885c660314067b7d9543bf3
-
SHA1
0d3f6cc4e3f72f174351fc614ea54025e0715b93
-
SHA256
5e8bec3c94f5b8dd59824c28dccb4dc3f6b7cdade82160e7d2f6655f8a93628a
-
SHA512
42a4ff2c262ca601f7862dee8cac91ffb389111aa88a9c6d751721bba74fe80323daa8c84a6c5b2b66275d8ef12ed4136ff2157097a7f1a7327f5a5d55279db7
-
SSDEEP
6144:TRazhwlUx2EHSgoy+2eOvJWPz1X5TrUM1a:FkSgGOvJ45XVs
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2292 scvhost.exe 2264 uddmejc.exe 2676 lkdkjft.exe 2548 scvhost.exe 2008 wubapif.exe 1248 ialceri.exe 264 scvhost.exe 1936 ntchojy.exe 2904 scvhost.exe 1080 zojptim.exe 1692 tykxzki.exe 628 scvhost.exe 1912 ospfzdq.exe 1132 scvhost.exe 972 ygribkb.exe 2088 ndzinkc.exe 1580 scvhost.exe 2308 hntytey.exe 2636 mojtjjw.exe 2244 scvhost.exe 2572 jptyfvi.exe 3036 scvhost.exe 2060 tdvipca.exe 532 iadibuc.exe 1952 scvhost.exe 1360 khjlqml.exe 1288 vgviblk.exe 1480 scvhost.exe 1380 trvgszk.exe 608 lciyswl.exe 1784 scvhost.exe 628 lvrqujv.exe 1724 scvhost.exe 1016 gpwgmcd.exe 2432 pexwkkq.exe 1572 scvhost.exe 2920 hdatjpu.exe 2324 waibvhd.exe 2140 scvhost.exe 2880 tbsgrtp.exe 1296 scvhost.exe 1564 zzxwfuo.exe 2452 gkwbune.exe 1780 scvhost.exe 2860 npgolyh.exe 1620 scvhost.exe 2916 pcjrgzn.exe 2776 hyzwrav.exe 1808 scvhost.exe 1324 eogwkha.exe 2948 scvhost.exe 752 clnwlgn.exe 1992 hnvrtmt.exe 2004 scvhost.exe 1320 donexpf.exe 1548 wzbxxmf.exe 2448 scvhost.exe 2392 pmgrfsa.exe 1972 scvhost.exe 2596 eydxjbm.exe 1296 zahupik.exe 1224 scvhost.exe 664 zpfagqn.exe 1456 rdwfrru.exe -
Loads dropped DLL 64 IoCs
pid Process 2312 383709cb3885c660314067b7d9543bf3_JaffaCakes118.exe 2312 383709cb3885c660314067b7d9543bf3_JaffaCakes118.exe 2292 scvhost.exe 2292 scvhost.exe 2264 uddmejc.exe 2264 uddmejc.exe 2676 lkdkjft.exe 2676 lkdkjft.exe 2548 scvhost.exe 2548 scvhost.exe 2008 wubapif.exe 2008 wubapif.exe 1248 ialceri.exe 1248 ialceri.exe 264 scvhost.exe 264 scvhost.exe 1936 ntchojy.exe 1936 ntchojy.exe 2904 scvhost.exe 2904 scvhost.exe 1080 zojptim.exe 1080 zojptim.exe 1692 tykxzki.exe 1692 tykxzki.exe 628 scvhost.exe 628 scvhost.exe 1912 ospfzdq.exe 1912 ospfzdq.exe 1132 scvhost.exe 1132 scvhost.exe 972 ygribkb.exe 972 ygribkb.exe 2088 ndzinkc.exe 2088 ndzinkc.exe 1580 scvhost.exe 1580 scvhost.exe 2308 hntytey.exe 2308 hntytey.exe 2636 mojtjjw.exe 2636 mojtjjw.exe 2244 scvhost.exe 2244 scvhost.exe 2572 jptyfvi.exe 2572 jptyfvi.exe 3036 scvhost.exe 3036 scvhost.exe 2060 tdvipca.exe 2060 tdvipca.exe 532 iadibuc.exe 532 iadibuc.exe 1952 scvhost.exe 1952 scvhost.exe 1360 khjlqml.exe 1360 khjlqml.exe 1288 vgviblk.exe 1288 vgviblk.exe 1480 scvhost.exe 1480 scvhost.exe 1380 trvgszk.exe 1380 trvgszk.exe 608 lciyswl.exe 608 lciyswl.exe 1784 scvhost.exe 1784 scvhost.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "klbjrhy.exe" scvhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "scvhost.exe" jhrsrsu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "scvhost.exe" kubdzix.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "tdtttgx.exe" scvhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "scvhost.exe" epkzxry.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "nbesxdn.exe" scvhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "rdlqhqt.exe" zaxyhts.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "scvhost.exe" ohxpccp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "scvhost.exe" rdlqhqt.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "dhvapbd.exe" scvhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "fqeqcre.exe" scvhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "scvhost.exe" ntchojy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "abxhinq.exe" scvhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "abxhinq.exe" scvhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "ricfwvj.exe" scvhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "scvhost.exe" cbdtnmk.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "mojtjjw.exe" hntytey.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "fgvdado.exe" scvhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "hyzwrav.exe" pcjrgzn.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "wzbxxmf.exe" donexpf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "jubniti.exe" scvhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "scvhost.exe" lzygkws.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "oqupjwu.exe" rpccfsi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "zaxyhts.exe" scvhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "scvhost.exe" lciyswl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "donexpf.exe" scvhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "avkfppw.exe" scvhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "scvhost.exe" epbjuzq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "rrmlurd.exe" scvhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "nbesxdn.exe" scvhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "eukzeyz.exe" scvhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "scvhost.exe" pexwkkq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "scvhost.exe" gkwbune.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "dihfkrr.exe" scvhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "vsjsxye.exe" dhvapbd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "scvhost.exe" smmvfko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "scvhost.exe" ulatmfo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "scvhost.exe" yosxrrp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "scvhost.exe" tykxzki.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "scvhost.exe" xkanitf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "hjnduew.exe" scvhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "lydtaxk.exe" oxtgwuy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "scvhost.exe" orklrmo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "yosxrrp.exe" scvhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "scvhost.exe" fophgta.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "scvhost.exe" lobqcdh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "scvhost.exe" 383709cb3885c660314067b7d9543bf3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "scvhost.exe" 383709cb3885c660314067b7d9543bf3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "scvhost.exe" ospfzdq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "xkanitf.exe" scvhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "jwllfps.exe" scvhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "ylvuxlt.exe" scvhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "ndzinkc.exe" ygribkb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "scvhost.exe" bhiklpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "gxzdywm.exe" scvhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "nmlkepi.exe" vbgswsi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "bqtwqkb.exe" scvhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "bfughks.exe" scvhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "scvhost.exe" fmsmoym.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "scvhost.exe" ebbmrkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "scvhost.exe" bqtwqkb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "paacfeh.exe" scvhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "scvhost.exe" jptyfvi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "scvhost.exe" lvrqujv.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\WINDOWS\SysWOW64\scvhost.exe myipcmn.exe File created C:\WINDOWS\SysWOW64\yosxrrp.exe scvhost.exe File opened for modification C:\WINDOWS\SysWOW64\ndzinkc.exe ygribkb.exe File created C:\WINDOWS\SysWOW64\scvhost.exe trvgszk.exe File opened for modification C:\WINDOWS\SysWOW64\tbsgrtp.exe scvhost.exe File opened for modification C:\WINDOWS\SysWOW64\scvhost.exe tbsgrtp.exe File opened for modification C:\WINDOWS\SysWOW64\fmsmoym.exe scvhost.exe File created C:\WINDOWS\SysWOW64\bhiklpm.exe uznsqsc.exe File opened for modification C:\WINDOWS\SysWOW64\scvhost.exe flttwxs.exe File created C:\WINDOWS\SysWOW64\npgolyh.exe scvhost.exe File opened for modification C:\WINDOWS\SysWOW64\dancfbe.exe scvhost.exe File created C:\WINDOWS\SysWOW64\flttwxs.exe scvhost.exe File opened for modification C:\WINDOWS\SysWOW64\flttwxs.exe scvhost.exe File opened for modification C:\WINDOWS\SysWOW64\jhrsrsu.exe gxzdywm.exe File created C:\WINDOWS\SysWOW64\scvhost.exe nhrdxdw.exe File opened for modification C:\WINDOWS\SysWOW64\scvhost.exe ebbmrkg.exe File created C:\WINDOWS\SysWOW64\ohxpccp.exe scvhost.exe File created C:\WINDOWS\SysWOW64\scvhost.exe scvhost.exe File opened for modification C:\WINDOWS\SysWOW64\mojtjjw.exe hntytey.exe File opened for modification C:\WINDOWS\SysWOW64\scvhost.exe cbdtnmk.exe File created C:\WINDOWS\SysWOW64\scvhost.exe scvhost.exe File created C:\WINDOWS\SysWOW64\ndzinkc.exe ygribkb.exe File created C:\WINDOWS\SysWOW64\mojtjjw.exe hntytey.exe File created C:\WINDOWS\SysWOW64\scvhost.exe scvhost.exe File opened for modification C:\WINDOWS\SysWOW64\klbjrhy.exe scvhost.exe File created C:\WINDOWS\SysWOW64\cewhzan.exe scvhost.exe File created C:\WINDOWS\SysWOW64\vmnhxyv.exe scvhost.exe File opened for modification C:\WINDOWS\SysWOW64\vmnhxyv.exe scvhost.exe File opened for modification C:\WINDOWS\SysWOW64\nbesxdn.exe scvhost.exe File created C:\WINDOWS\SysWOW64\uddmejc.exe scvhost.exe File created C:\WINDOWS\SysWOW64\scvhost.exe scvhost.exe File opened for modification C:\WINDOWS\SysWOW64\fgvdado.exe scvhost.exe File opened for modification C:\WINDOWS\SysWOW64\rpccfsi.exe scvhost.exe File opened for modification C:\WINDOWS\SysWOW64\qhpkbyi.exe ylrfqwb.exe File created C:\WINDOWS\SysWOW64\scvhost.exe scvhost.exe File created C:\WINDOWS\SysWOW64\scvhost.exe scvhost.exe File opened for modification C:\WINDOWS\SysWOW64\rdlqhqt.exe zaxyhts.exe File created C:\WINDOWS\SysWOW64\fgvdado.exe scvhost.exe File opened for modification C:\WINDOWS\SysWOW64\scvhost.exe kufrxxq.exe File opened for modification C:\WINDOWS\SysWOW64\lciyswl.exe trvgszk.exe File created C:\WINDOWS\SysWOW64\qhpkbyi.exe ylrfqwb.exe File created C:\WINDOWS\SysWOW64\dancfbe.exe scvhost.exe File created C:\WINDOWS\SysWOW64\kllppls.exe rbyxhor.exe File created C:\WINDOWS\SysWOW64\uznsqsc.exe scvhost.exe File opened for modification C:\WINDOWS\SysWOW64\nmlkepi.exe vbgswsi.exe File opened for modification C:\WINDOWS\SysWOW64\ohxpccp.exe scvhost.exe File created C:\WINDOWS\SysWOW64\scvhost.exe scvhost.exe File opened for modification C:\WINDOWS\SysWOW64\scvhost.exe rdlqhqt.exe File created C:\WINDOWS\SysWOW64\scvhost.exe scvhost.exe File created C:\WINDOWS\SysWOW64\scvhost.exe scvhost.exe File created C:\WINDOWS\SysWOW64\scvhost.exe scvhost.exe File created C:\WINDOWS\SysWOW64\fnfgpox.exe klbjrhy.exe File created C:\WINDOWS\SysWOW64\lydtaxk.exe oxtgwuy.exe File opened for modification C:\WINDOWS\SysWOW64\scvhost.exe mngxkfj.exe File opened for modification C:\WINDOWS\SysWOW64\ialceri.exe wubapif.exe File opened for modification C:\WINDOWS\SysWOW64\scvhost.exe lvrqujv.exe File opened for modification C:\WINDOWS\SysWOW64\scvhost.exe iwkttep.exe File opened for modification C:\WINDOWS\SysWOW64\epkzxry.exe scvhost.exe File created C:\WINDOWS\SysWOW64\zaxyhts.exe scvhost.exe File opened for modification C:\WINDOWS\SysWOW64\wubapif.exe scvhost.exe File opened for modification C:\WINDOWS\SysWOW64\ntchojy.exe scvhost.exe File created C:\WINDOWS\SysWOW64\tbsgrtp.exe scvhost.exe File opened for modification C:\WINDOWS\SysWOW64\tdtttgx.exe scvhost.exe File opened for modification C:\WINDOWS\SysWOW64\lydtaxk.exe oxtgwuy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2292 2312 383709cb3885c660314067b7d9543bf3_JaffaCakes118.exe 30 PID 2312 wrote to memory of 2292 2312 383709cb3885c660314067b7d9543bf3_JaffaCakes118.exe 30 PID 2312 wrote to memory of 2292 2312 383709cb3885c660314067b7d9543bf3_JaffaCakes118.exe 30 PID 2312 wrote to memory of 2292 2312 383709cb3885c660314067b7d9543bf3_JaffaCakes118.exe 30 PID 2292 wrote to memory of 2264 2292 scvhost.exe 31 PID 2292 wrote to memory of 2264 2292 scvhost.exe 31 PID 2292 wrote to memory of 2264 2292 scvhost.exe 31 PID 2292 wrote to memory of 2264 2292 scvhost.exe 31 PID 2264 wrote to memory of 2676 2264 uddmejc.exe 32 PID 2264 wrote to memory of 2676 2264 uddmejc.exe 32 PID 2264 wrote to memory of 2676 2264 uddmejc.exe 32 PID 2264 wrote to memory of 2676 2264 uddmejc.exe 32 PID 2676 wrote to memory of 2548 2676 lkdkjft.exe 33 PID 2676 wrote to memory of 2548 2676 lkdkjft.exe 33 PID 2676 wrote to memory of 2548 2676 lkdkjft.exe 33 PID 2676 wrote to memory of 2548 2676 lkdkjft.exe 33 PID 2548 wrote to memory of 2008 2548 scvhost.exe 34 PID 2548 wrote to memory of 2008 2548 scvhost.exe 34 PID 2548 wrote to memory of 2008 2548 scvhost.exe 34 PID 2548 wrote to memory of 2008 2548 scvhost.exe 34 PID 2008 wrote to memory of 1248 2008 wubapif.exe 35 PID 2008 wrote to memory of 1248 2008 wubapif.exe 35 PID 2008 wrote to memory of 1248 2008 wubapif.exe 35 PID 2008 wrote to memory of 1248 2008 wubapif.exe 35 PID 1248 wrote to memory of 264 1248 ialceri.exe 36 PID 1248 wrote to memory of 264 1248 ialceri.exe 36 PID 1248 wrote to memory of 264 1248 ialceri.exe 36 PID 1248 wrote to memory of 264 1248 ialceri.exe 36 PID 264 wrote to memory of 1936 264 scvhost.exe 37 PID 264 wrote to memory of 1936 264 scvhost.exe 37 PID 264 wrote to memory of 1936 264 scvhost.exe 37 PID 264 wrote to memory of 1936 264 scvhost.exe 37 PID 1936 wrote to memory of 2904 1936 ntchojy.exe 38 PID 1936 wrote to memory of 2904 1936 ntchojy.exe 38 PID 1936 wrote to memory of 2904 1936 ntchojy.exe 38 PID 1936 wrote to memory of 2904 1936 ntchojy.exe 38 PID 2904 wrote to memory of 1080 2904 scvhost.exe 39 PID 2904 wrote to memory of 1080 2904 scvhost.exe 39 PID 2904 wrote to memory of 1080 2904 scvhost.exe 39 PID 2904 wrote to memory of 1080 2904 scvhost.exe 39 PID 1080 wrote to memory of 1692 1080 zojptim.exe 40 PID 1080 wrote to memory of 1692 1080 zojptim.exe 40 PID 1080 wrote to memory of 1692 1080 zojptim.exe 40 PID 1080 wrote to memory of 1692 1080 zojptim.exe 40 PID 1692 wrote to memory of 628 1692 tykxzki.exe 41 PID 1692 wrote to memory of 628 1692 tykxzki.exe 41 PID 1692 wrote to memory of 628 1692 tykxzki.exe 41 PID 1692 wrote to memory of 628 1692 tykxzki.exe 41 PID 628 wrote to memory of 1912 628 scvhost.exe 42 PID 628 wrote to memory of 1912 628 scvhost.exe 42 PID 628 wrote to memory of 1912 628 scvhost.exe 42 PID 628 wrote to memory of 1912 628 scvhost.exe 42 PID 1912 wrote to memory of 1132 1912 ospfzdq.exe 43 PID 1912 wrote to memory of 1132 1912 ospfzdq.exe 43 PID 1912 wrote to memory of 1132 1912 ospfzdq.exe 43 PID 1912 wrote to memory of 1132 1912 ospfzdq.exe 43 PID 1132 wrote to memory of 972 1132 scvhost.exe 44 PID 1132 wrote to memory of 972 1132 scvhost.exe 44 PID 1132 wrote to memory of 972 1132 scvhost.exe 44 PID 1132 wrote to memory of 972 1132 scvhost.exe 44 PID 972 wrote to memory of 2088 972 ygribkb.exe 45 PID 972 wrote to memory of 2088 972 ygribkb.exe 45 PID 972 wrote to memory of 2088 972 ygribkb.exe 45 PID 972 wrote to memory of 2088 972 ygribkb.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\383709cb3885c660314067b7d9543bf3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\383709cb3885c660314067b7d9543bf3_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\USERS\ADMIN\APPDATA\LOCAL\TEMP\383709CB3885C660314067B7D9543BF3_JAFFACAKES118.EXE2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\WINDOWS\SysWOW64\uddmejc.exe"C:\WINDOWS\SYSTEM32\uddmejc.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\WINDOWS\SysWOW64\lkdkjft.exe"C:\WINDOWS\SYSTEM32\lkdkjft.exe" mElTC:\WINDOWS\SYSWOW64\UDDMEJC.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\LKDKJFT.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\WINDOWS\SysWOW64\wubapif.exe"C:\WINDOWS\SYSTEM32\wubapif.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\WINDOWS\SysWOW64\ialceri.exe"C:\WINDOWS\SYSTEM32\ialceri.exe" mElTC:\WINDOWS\SYSWOW64\WUBAPIF.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\IALCERI.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:264 -
C:\WINDOWS\SysWOW64\ntchojy.exe"C:\WINDOWS\SYSTEM32\ntchojy.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\NTCHOJY.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\WINDOWS\SysWOW64\zojptim.exe"C:\WINDOWS\SYSTEM32\zojptim.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\WINDOWS\SysWOW64\tykxzki.exe"C:\WINDOWS\SYSTEM32\tykxzki.exe" mElTC:\WINDOWS\SYSWOW64\ZOJPTIM.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\TYKXZKI.EXE13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:628 -
C:\WINDOWS\SysWOW64\ospfzdq.exe"C:\WINDOWS\SYSTEM32\ospfzdq.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\OSPFZDQ.EXE15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\WINDOWS\SysWOW64\ygribkb.exe"C:\WINDOWS\SYSTEM32\ygribkb.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:972 -
C:\WINDOWS\SysWOW64\ndzinkc.exe"C:\WINDOWS\SYSTEM32\ndzinkc.exe" mElTC:\WINDOWS\SYSWOW64\YGRIBKB.EXE17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2088 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\NDZINKC.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1580 -
C:\WINDOWS\SysWOW64\hntytey.exe"C:\WINDOWS\SYSTEM32\hntytey.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE19⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
PID:2308 -
C:\WINDOWS\SysWOW64\mojtjjw.exe"C:\WINDOWS\SYSTEM32\mojtjjw.exe" mElTC:\WINDOWS\SYSWOW64\HNTYTEY.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2636 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\MOJTJJW.EXE21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2244 -
C:\WINDOWS\SysWOW64\jptyfvi.exe"C:\WINDOWS\SYSTEM32\jptyfvi.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:2572 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\JPTYFVI.EXE23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3036 -
C:\WINDOWS\SysWOW64\tdvipca.exe"C:\WINDOWS\SYSTEM32\tdvipca.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2060 -
C:\WINDOWS\SysWOW64\iadibuc.exe"C:\WINDOWS\SYSTEM32\iadibuc.exe" mElTC:\WINDOWS\SYSWOW64\TDVIPCA.EXE25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:532 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\IADIBUC.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1952 -
C:\WINDOWS\SysWOW64\khjlqml.exe"C:\WINDOWS\SYSTEM32\khjlqml.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1360 -
C:\WINDOWS\SysWOW64\vgviblk.exe"C:\WINDOWS\SYSTEM32\vgviblk.exe" mElTC:\WINDOWS\SYSWOW64\KHJLQML.EXE28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1288 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\VGVIBLK.EXE29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1480 -
C:\WINDOWS\SysWOW64\trvgszk.exe"C:\WINDOWS\SYSTEM32\trvgszk.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1380 -
C:\WINDOWS\SysWOW64\lciyswl.exe"C:\WINDOWS\SYSTEM32\lciyswl.exe" mElTC:\WINDOWS\SYSWOW64\TRVGSZK.EXE31⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:608 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\LCIYSWL.EXE32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1784 -
C:\WINDOWS\SysWOW64\lvrqujv.exe"C:\WINDOWS\SYSTEM32\lvrqujv.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE33⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:628 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\LVRQUJV.EXE34⤵
- Executes dropped EXE
PID:1724 -
C:\WINDOWS\SysWOW64\gpwgmcd.exe"C:\WINDOWS\SYSTEM32\gpwgmcd.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE35⤵
- Executes dropped EXE
PID:1016 -
C:\WINDOWS\SysWOW64\pexwkkq.exe"C:\WINDOWS\SYSTEM32\pexwkkq.exe" mElTC:\WINDOWS\SYSWOW64\GPWGMCD.EXE36⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2432 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\PEXWKKQ.EXE37⤵
- Executes dropped EXE
PID:1572 -
C:\WINDOWS\SysWOW64\hdatjpu.exe"C:\WINDOWS\SYSTEM32\hdatjpu.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE38⤵
- Executes dropped EXE
PID:2920 -
C:\WINDOWS\SysWOW64\waibvhd.exe"C:\WINDOWS\SYSTEM32\waibvhd.exe" mElTC:\WINDOWS\SYSWOW64\HDATJPU.EXE39⤵
- Executes dropped EXE
PID:2324 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\WAIBVHD.EXE40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2140 -
C:\WINDOWS\SysWOW64\tbsgrtp.exe"C:\WINDOWS\SYSTEM32\tbsgrtp.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE41⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2880 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\TBSGRTP.EXE42⤵
- Executes dropped EXE
PID:1296 -
C:\WINDOWS\SysWOW64\zzxwfuo.exe"C:\WINDOWS\SYSTEM32\zzxwfuo.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE43⤵
- Executes dropped EXE
PID:1564 -
C:\WINDOWS\SysWOW64\gkwbune.exe"C:\WINDOWS\SYSTEM32\gkwbune.exe" mElTC:\WINDOWS\SYSWOW64\ZZXWFUO.EXE44⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2452 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\GKWBUNE.EXE45⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1780 -
C:\WINDOWS\SysWOW64\npgolyh.exe"C:\WINDOWS\SYSTEM32\npgolyh.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE46⤵
- Executes dropped EXE
PID:2860 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\NPGOLYH.EXE47⤵
- Executes dropped EXE
PID:1620 -
C:\WINDOWS\SysWOW64\pcjrgzn.exe"C:\WINDOWS\SYSTEM32\pcjrgzn.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE48⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2916 -
C:\WINDOWS\SysWOW64\hyzwrav.exe"C:\WINDOWS\SYSTEM32\hyzwrav.exe" mElTC:\WINDOWS\SYSWOW64\PCJRGZN.EXE49⤵
- Executes dropped EXE
PID:2776 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\HYZWRAV.EXE50⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1808 -
C:\WINDOWS\SysWOW64\eogwkha.exe"C:\WINDOWS\SYSTEM32\eogwkha.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE51⤵
- Executes dropped EXE
PID:1324 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\EOGWKHA.EXE52⤵
- Executes dropped EXE
PID:2948 -
C:\WINDOWS\SysWOW64\clnwlgn.exe"C:\WINDOWS\SYSTEM32\clnwlgn.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE53⤵
- Executes dropped EXE
PID:752 -
C:\WINDOWS\SysWOW64\hnvrtmt.exe"C:\WINDOWS\SYSTEM32\hnvrtmt.exe" mElTC:\WINDOWS\SYSWOW64\CLNWLGN.EXE54⤵
- Executes dropped EXE
PID:1992 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\HNVRTMT.EXE55⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2004 -
C:\WINDOWS\SysWOW64\donexpf.exe"C:\WINDOWS\SYSTEM32\donexpf.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE56⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1320 -
C:\WINDOWS\SysWOW64\wzbxxmf.exe"C:\WINDOWS\SYSTEM32\wzbxxmf.exe" mElTC:\WINDOWS\SYSWOW64\DONEXPF.EXE57⤵
- Executes dropped EXE
PID:1548 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\WZBXXMF.EXE58⤵
- Executes dropped EXE
PID:2448 -
C:\WINDOWS\SysWOW64\pmgrfsa.exe"C:\WINDOWS\SYSTEM32\pmgrfsa.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE59⤵
- Executes dropped EXE
PID:2392 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\PMGRFSA.EXE60⤵
- Executes dropped EXE
PID:1972 -
C:\WINDOWS\SysWOW64\eydxjbm.exe"C:\WINDOWS\SYSTEM32\eydxjbm.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE61⤵
- Executes dropped EXE
PID:2596 -
C:\WINDOWS\SysWOW64\zahupik.exe"C:\WINDOWS\SYSTEM32\zahupik.exe" mElTC:\WINDOWS\SYSWOW64\EYDXJBM.EXE62⤵
- Executes dropped EXE
PID:1296 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\ZAHUPIK.EXE63⤵
- Executes dropped EXE
PID:1224 -
C:\WINDOWS\SysWOW64\zpfagqn.exe"C:\WINDOWS\SYSTEM32\zpfagqn.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE64⤵
- Executes dropped EXE
PID:664 -
C:\WINDOWS\SysWOW64\rdwfrru.exe"C:\WINDOWS\SYSTEM32\rdwfrru.exe" mElTC:\WINDOWS\SYSWOW64\ZPFAGQN.EXE65⤵
- Executes dropped EXE
PID:1456 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\RDWFRRU.EXE66⤵PID:2772
-
C:\WINDOWS\SysWOW64\obdfkqa.exe"C:\WINDOWS\SYSTEM32\obdfkqa.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE67⤵PID:2144
-
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\OBDFKQA.EXE68⤵
- Adds Run key to start application
PID:1288 -
C:\WINDOWS\SysWOW64\avkfppw.exe"C:\WINDOWS\SYSTEM32\avkfppw.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE69⤵PID:828
-
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\AVKFPPW.EXE70⤵PID:1808
-
C:\WINDOWS\SysWOW64\ylrfqwb.exe"C:\WINDOWS\SYSTEM32\ylrfqwb.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE71⤵
- Drops file in System32 directory
PID:2200 -
C:\WINDOWS\SysWOW64\qhpkbyi.exe"C:\WINDOWS\SYSTEM32\qhpkbyi.exe" mElTC:\WINDOWS\SYSWOW64\YLRFQWB.EXE72⤵PID:588
-
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\QHPKBYI.EXE73⤵PID:1696
-
C:\WINDOWS\SysWOW64\susnwyp.exe"C:\WINDOWS\SYSTEM32\susnwyp.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE74⤵PID:876
-
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\SUSNWYP.EXE75⤵
- Drops file in System32 directory
PID:872 -
C:\WINDOWS\SysWOW64\psrnpxc.exe"C:\WINDOWS\SYSTEM32\psrnpxc.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE76⤵PID:2052
-
C:\WINDOWS\SysWOW64\zosfwsd.exe"C:\WINDOWS\SYSTEM32\zosfwsd.exe" mElTC:\WINDOWS\SYSWOW64\PSRNPXC.EXE77⤵PID:2192
-
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\ZOSFWSD.EXE78⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2820 -
C:\WINDOWS\SysWOW64\dihfkrr.exe"C:\WINDOWS\SYSTEM32\dihfkrr.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE79⤵PID:2636
-
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\DIHFKRR.EXE80⤵
- Adds Run key to start application
PID:372 -
C:\WINDOWS\SysWOW64\xkanitf.exe"C:\WINDOWS\SYSTEM32\xkanitf.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE81⤵
- Adds Run key to start application
PID:1608 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\XKANITF.EXE82⤵
- Adds Run key to start application
PID:760 -
C:\WINDOWS\SysWOW64\hjnduew.exe"C:\WINDOWS\SYSTEM32\hjnduew.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE83⤵PID:2008
-
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\HJNDUEW.EXE84⤵PID:2988
-
C:\WINDOWS\SysWOW64\cesluye.exe"C:\WINDOWS\SYSTEM32\cesluye.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE85⤵PID:1996
-
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\CESLUYE.EXE86⤵PID:2796
-
C:\WINDOWS\SysWOW64\tlsizun.exe"C:\WINDOWS\SYSTEM32\tlsizun.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE87⤵PID:1720
-
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\TLSIZUN.EXE88⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:1352 -
C:\WINDOWS\SysWOW64\tdtttgx.exe"C:\WINDOWS\SYSTEM32\tdtttgx.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE89⤵PID:1372
-
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\TDTTTGX.EXE90⤵PID:2184
-
C:\WINDOWS\SysWOW64\vvsqlcf.exe"C:\WINDOWS\SYSTEM32\vvsqlcf.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE91⤵PID:1708
-
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\VVSQLCF.EXE92⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2024 -
C:\WINDOWS\SysWOW64\klbjrhy.exe"C:\WINDOWS\SYSTEM32\klbjrhy.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE93⤵
- Drops file in System32 directory
PID:2268 -
C:\WINDOWS\SysWOW64\fnfgpox.exe"C:\WINDOWS\SYSTEM32\fnfgpox.exe" mElTC:\WINDOWS\SYSWOW64\KLBJRHY.EXE94⤵PID:1804
-
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\FNFGPOX.EXE95⤵
- Adds Run key to start application
PID:1016 -
C:\WINDOWS\SysWOW64\jwllfps.exe"C:\WINDOWS\SYSTEM32\jwllfps.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE96⤵PID:2644
-
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\JWLLFPS.EXE97⤵PID:2584
-
C:\WINDOWS\SysWOW64\oxtgwuy.exe"C:\WINDOWS\SYSTEM32\oxtgwuy.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE98⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2628 -
C:\WINDOWS\SysWOW64\lydtaxk.exe"C:\WINDOWS\SYSTEM32\lydtaxk.exe" mElTC:\WINDOWS\SYSWOW64\OXTGWUY.EXE99⤵PID:2548
-
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\LYDTAXK.EXE100⤵PID:1956
-
C:\WINDOWS\SysWOW64\iwkttep.exe"C:\WINDOWS\SYSTEM32\iwkttep.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE101⤵
- Drops file in System32 directory
PID:3016 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\IWKTTEP.EXE102⤵PID:760
-
C:\WINDOWS\SysWOW64\flruudc.exe"C:\WINDOWS\SYSTEM32\flruudc.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE103⤵PID:1780
-
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\FLRUUDC.EXE104⤵
- Drops file in System32 directory
PID:2888 -
C:\WINDOWS\SysWOW64\fmsmoym.exe"C:\WINDOWS\SYSTEM32\fmsmoym.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE105⤵
- Adds Run key to start application
PID:2208 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\FMSMOYM.EXE106⤵PID:2260
-
C:\WINDOWS\SysWOW64\eiejkpv.exe"C:\WINDOWS\SYSTEM32\eiejkpv.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE107⤵PID:444
-
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\EIEJKPV.EXE108⤵
- Drops file in System32 directory
PID:608 -
C:\WINDOWS\SysWOW64\dancfbe.exe"C:\WINDOWS\SYSTEM32\dancfbe.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE109⤵PID:688
-
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\DANCFBE.EXE110⤵
- Adds Run key to start application
PID:2388 -
C:\WINDOWS\SysWOW64\abxhinq.exe"C:\WINDOWS\SYSTEM32\abxhinq.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE111⤵PID:2376
-
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\ABXHINQ.EXE112⤵PID:2116
-
C:\WINDOWS\SysWOW64\vwcxagz.exe"C:\WINDOWS\SYSTEM32\vwcxagz.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE113⤵PID:1684
-
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\VWCXAGZ.EXE114⤵PID:1232
-
C:\WINDOWS\SysWOW64\rbyxhor.exe"C:\WINDOWS\SYSTEM32\rbyxhor.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE115⤵
- Drops file in System32 directory
PID:1860 -
C:\WINDOWS\SysWOW64\kllppls.exe"C:\WINDOWS\SYSTEM32\kllppls.exe" mElTC:\WINDOWS\SYSWOW64\RBYXHOR.EXE116⤵PID:2448
-
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\KLLPPLS.EXE117⤵
- Drops file in System32 directory
PID:3020 -
C:\WINDOWS\SysWOW64\uznsqsc.exe"C:\WINDOWS\SYSTEM32\uznsqsc.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE118⤵
- Drops file in System32 directory
PID:3004 -
C:\WINDOWS\SysWOW64\bhiklpm.exe"C:\WINDOWS\SYSTEM32\bhiklpm.exe" mElTC:\WINDOWS\SYSWOW64\UZNSQSC.EXE119⤵
- Adds Run key to start application
PID:2616 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\BHIKLPM.EXE120⤵
- Adds Run key to start application
PID:1296 -
C:\WINDOWS\SysWOW64\dhvapbd.exe"C:\WINDOWS\SYSTEM32\dhvapbd.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE121⤵
- Adds Run key to start application
PID:1940 -
C:\WINDOWS\SysWOW64\vsjsxye.exe"C:\WINDOWS\SYSTEM32\vsjsxye.exe" mElTC:\WINDOWS\SYSWOW64\DHVAPBD.EXE122⤵PID:2760
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-