Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240729-en -
resource tags
arch:x64arch:x86image:win10v2004-20240729-enlocale:en-usos:windows10-2004-x64system -
submitted
28/07/2024, 00:46
Static task
static1
Behavioral task
behavioral1
Sample
0400434332731d9eb14c563f4288e399_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
0400434332731d9eb14c563f4288e399_JaffaCakes118.exe
-
Size
189KB
-
MD5
0400434332731d9eb14c563f4288e399
-
SHA1
106403e076374d84dc3755e1d111f6b7cd93a3fd
-
SHA256
95bda3688357336465a824f8427407ab89ba98a2d2f3b3c345ef906ddde26c53
-
SHA512
68e90b5d253d2d6fdc73ba35b3bec98d2d7eb82f57c4f55586fc5b44bc3eb42d2be6dc74fb5cbd668683ad3e6d72af53fade4756d68bd68a8061c5ccabd76722
-
SSDEEP
1536:EvQBeOGtrYSSsrc93UBIfdC67m6AJiqjt3ufT/FRxZOYoOrk4J:EhOm2sI93UufdC67ciyt3ujFf7oOrZ
Malware Config
Signatures
-
Detect Blackmoon payload 64 IoCs
resource yara_rule behavioral2/memory/2504-6-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1692-8-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1708-18-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1816-25-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4296-30-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/436-49-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4128-54-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3192-62-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/548-63-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2592-98-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2008-105-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2340-112-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2012-155-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3352-186-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2840-198-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4368-203-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3876-210-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2236-217-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3464-225-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4340-234-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/392-238-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/656-260-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2864-267-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3968-296-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5032-313-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4352-323-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3648-335-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3100-342-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/752-346-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1728-356-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/516-270-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4864-253-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/412-246-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1244-242-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4784-192-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4036-180-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2104-385-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1348-173-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3860-167-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4040-157-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4424-149-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2924-143-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4368-396-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3332-137-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3588-131-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4408-125-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4652-406-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2212-88-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2760-81-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1532-80-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4756-74-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2864-38-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3976-36-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1976-427-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4184-464-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/228-516-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/220-533-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4452-601-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3252-624-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4604-656-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4388-767-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3464-783-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1812-804-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5108-850-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1692 lxfxxrx.exe 1708 1hnhhn.exe 1816 xxffrxr.exe 4296 hntttt.exe 3976 dvjpv.exe 2864 flxrlfx.exe 436 bbthbt.exe 4128 ddjjj.exe 3192 vjjvj.exe 548 rrffxff.exe 4756 ttnhbn.exe 1532 ppdjp.exe 2760 rxrrlrr.exe 2212 hbhnhb.exe 2592 vvvvp.exe 2008 1xxlxrl.exe 2340 thbnht.exe 2160 pvvvp.exe 2736 lffrrrr.exe 4408 hnhnhn.exe 3588 vpjdd.exe 3332 frflllx.exe 2924 bttnnt.exe 4424 hhtttb.exe 2012 9jppj.exe 4040 xrrflll.exe 3860 bthnbn.exe 1348 pppjj.exe 4036 llfllxx.exe 3352 5nbbtb.exe 4784 pdppv.exe 2840 frffxlf.exe 4368 nbbhbb.exe 1544 vpjvj.exe 3876 rrlfflf.exe 4960 hnttnb.exe 1476 dddvp.exe 2236 jjjjj.exe 2548 rxllffx.exe 3464 ttnnhb.exe 1656 hbntht.exe 4340 vvjpd.exe 392 rrfrlfl.exe 1244 frxrxxf.exe 412 hhnnhh.exe 4928 vjjvp.exe 4864 lrfrxrr.exe 4028 tnhhtt.exe 656 djvjj.exe 3976 jjjdv.exe 2864 lrllfrr.exe 516 xxfxxxx.exe 436 nntnnt.exe 3776 ddpvp.exe 2108 pjdpp.exe 3872 lxrxlll.exe 5104 lrlfrrr.exe 2368 hhnntb.exe 4008 hbtnnn.exe 3968 jjjjj.exe 1532 lrxxxfl.exe 1988 hbtnhh.exe 3720 ddvjd.exe 3096 jjpjv.exe -
resource yara_rule behavioral2/memory/2504-6-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1692-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1708-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1708-18-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1816-25-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4296-30-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/436-49-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3192-56-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4128-54-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3192-62-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/548-63-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2592-98-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2008-105-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2340-112-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2012-155-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3352-186-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4368-199-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2840-198-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4368-203-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3876-210-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2236-217-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2548-221-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3464-225-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4340-234-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/392-238-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/656-260-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2864-267-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3968-296-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5032-313-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4352-323-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1060-327-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3648-335-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3648-331-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3720-303-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3100-342-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/752-346-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1728-356-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5104-283-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/516-270-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4864-253-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/412-246-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1244-242-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2708-372-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2840-194-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4784-192-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4036-180-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4036-175-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2104-385-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1348-173-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3860-167-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4040-157-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4424-149-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4368-392-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2924-143-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4368-396-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3332-137-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3588-131-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4408-125-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4652-406-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2592-93-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2212-88-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2760-81-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1532-80-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4756-74-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfxxxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9ddpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7vvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbnbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxffxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djdjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddjjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3vdvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnhbbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5nnnhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjddp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlxrlrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjddv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddjpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjdvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlfxxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3lxxrrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hthbtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrrlfxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhhbtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbhnbb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2504 wrote to memory of 1692 2504 0400434332731d9eb14c563f4288e399_JaffaCakes118.exe 83 PID 2504 wrote to memory of 1692 2504 0400434332731d9eb14c563f4288e399_JaffaCakes118.exe 83 PID 2504 wrote to memory of 1692 2504 0400434332731d9eb14c563f4288e399_JaffaCakes118.exe 83 PID 1692 wrote to memory of 1708 1692 lxfxxrx.exe 84 PID 1692 wrote to memory of 1708 1692 lxfxxrx.exe 84 PID 1692 wrote to memory of 1708 1692 lxfxxrx.exe 84 PID 1708 wrote to memory of 1816 1708 1hnhhn.exe 85 PID 1708 wrote to memory of 1816 1708 1hnhhn.exe 85 PID 1708 wrote to memory of 1816 1708 1hnhhn.exe 85 PID 1816 wrote to memory of 4296 1816 xxffrxr.exe 189 PID 1816 wrote to memory of 4296 1816 xxffrxr.exe 189 PID 1816 wrote to memory of 4296 1816 xxffrxr.exe 189 PID 4296 wrote to memory of 3976 4296 hntttt.exe 135 PID 4296 wrote to memory of 3976 4296 hntttt.exe 135 PID 4296 wrote to memory of 3976 4296 hntttt.exe 135 PID 3976 wrote to memory of 2864 3976 dvjpv.exe 90 PID 3976 wrote to memory of 2864 3976 dvjpv.exe 90 PID 3976 wrote to memory of 2864 3976 dvjpv.exe 90 PID 2864 wrote to memory of 436 2864 flxrlfx.exe 138 PID 2864 wrote to memory of 436 2864 flxrlfx.exe 138 PID 2864 wrote to memory of 436 2864 flxrlfx.exe 138 PID 436 wrote to memory of 4128 436 bbthbt.exe 92 PID 436 wrote to memory of 4128 436 bbthbt.exe 92 PID 436 wrote to memory of 4128 436 bbthbt.exe 92 PID 4128 wrote to memory of 3192 4128 ddjjj.exe 93 PID 4128 wrote to memory of 3192 4128 ddjjj.exe 93 PID 4128 wrote to memory of 3192 4128 ddjjj.exe 93 PID 3192 wrote to memory of 548 3192 vjjvj.exe 94 PID 3192 wrote to memory of 548 3192 vjjvj.exe 94 PID 3192 wrote to memory of 548 3192 vjjvj.exe 94 PID 548 wrote to memory of 4756 548 rrffxff.exe 95 PID 548 wrote to memory of 4756 548 rrffxff.exe 95 PID 548 wrote to memory of 4756 548 rrffxff.exe 95 PID 4756 wrote to memory of 1532 4756 ttnhbn.exe 96 PID 4756 wrote to memory of 1532 4756 ttnhbn.exe 96 PID 4756 wrote to memory of 1532 4756 ttnhbn.exe 96 PID 1532 wrote to memory of 2760 1532 ppdjp.exe 98 PID 1532 wrote to memory of 2760 1532 ppdjp.exe 98 PID 1532 wrote to memory of 2760 1532 ppdjp.exe 98 PID 2760 wrote to memory of 2212 2760 rxrrlrr.exe 99 PID 2760 wrote to memory of 2212 2760 rxrrlrr.exe 99 PID 2760 wrote to memory of 2212 2760 rxrrlrr.exe 99 PID 2212 wrote to memory of 2592 2212 hbhnhb.exe 100 PID 2212 wrote to memory of 2592 2212 hbhnhb.exe 100 PID 2212 wrote to memory of 2592 2212 hbhnhb.exe 100 PID 2592 wrote to memory of 2008 2592 vvvvp.exe 101 PID 2592 wrote to memory of 2008 2592 vvvvp.exe 101 PID 2592 wrote to memory of 2008 2592 vvvvp.exe 101 PID 2008 wrote to memory of 2340 2008 1xxlxrl.exe 102 PID 2008 wrote to memory of 2340 2008 1xxlxrl.exe 102 PID 2008 wrote to memory of 2340 2008 1xxlxrl.exe 102 PID 2340 wrote to memory of 2160 2340 thbnht.exe 103 PID 2340 wrote to memory of 2160 2340 thbnht.exe 103 PID 2340 wrote to memory of 2160 2340 thbnht.exe 103 PID 2160 wrote to memory of 2736 2160 pvvvp.exe 104 PID 2160 wrote to memory of 2736 2160 pvvvp.exe 104 PID 2160 wrote to memory of 2736 2160 pvvvp.exe 104 PID 2736 wrote to memory of 4408 2736 lffrrrr.exe 105 PID 2736 wrote to memory of 4408 2736 lffrrrr.exe 105 PID 2736 wrote to memory of 4408 2736 lffrrrr.exe 105 PID 4408 wrote to memory of 3588 4408 hnhnhn.exe 1201 PID 4408 wrote to memory of 3588 4408 hnhnhn.exe 1201 PID 4408 wrote to memory of 3588 4408 hnhnhn.exe 1201 PID 3588 wrote to memory of 3332 3588 vpjdd.exe 697
Processes
-
C:\Users\Admin\AppData\Local\Temp\0400434332731d9eb14c563f4288e399_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0400434332731d9eb14c563f4288e399_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2504 -
\??\c:\lxfxxrx.exec:\lxfxxrx.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1692 -
\??\c:\1hnhhn.exec:\1hnhhn.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1708 -
\??\c:\xxffrxr.exec:\xxffrxr.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1816 -
\??\c:\hntttt.exec:\hntttt.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4296 -
\??\c:\dvjpv.exec:\dvjpv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3976 -
\??\c:\flxrlfx.exec:\flxrlfx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2864 -
\??\c:\bbthbt.exec:\bbthbt.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:436 -
\??\c:\ddjjj.exec:\ddjjj.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4128 -
\??\c:\vjjvj.exec:\vjjvj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3192 -
\??\c:\rrffxff.exec:\rrffxff.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:548 -
\??\c:\ttnhbn.exec:\ttnhbn.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4756 -
\??\c:\ppdjp.exec:\ppdjp.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1532 -
\??\c:\rxrrlrr.exec:\rxrrlrr.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2760 -
\??\c:\hbhnhb.exec:\hbhnhb.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2212 -
\??\c:\vvvvp.exec:\vvvvp.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2592 -
\??\c:\1xxlxrl.exec:\1xxlxrl.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2008 -
\??\c:\thbnht.exec:\thbnht.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2340 -
\??\c:\pvvvp.exec:\pvvvp.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2160 -
\??\c:\lffrrrr.exec:\lffrrrr.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2736 -
\??\c:\hnhnhn.exec:\hnhnhn.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4408 -
\??\c:\vpjdd.exec:\vpjdd.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3588 -
\??\c:\frflllx.exec:\frflllx.exe23⤵
- Executes dropped EXE
PID:3332 -
\??\c:\bttnnt.exec:\bttnnt.exe24⤵
- Executes dropped EXE
PID:2924 -
\??\c:\hhtttb.exec:\hhtttb.exe25⤵
- Executes dropped EXE
PID:4424 -
\??\c:\9jppj.exec:\9jppj.exe26⤵
- Executes dropped EXE
PID:2012 -
\??\c:\xrrflll.exec:\xrrflll.exe27⤵
- Executes dropped EXE
PID:4040 -
\??\c:\bthnbn.exec:\bthnbn.exe28⤵
- Executes dropped EXE
PID:3860 -
\??\c:\pppjj.exec:\pppjj.exe29⤵
- Executes dropped EXE
PID:1348 -
\??\c:\llfllxx.exec:\llfllxx.exe30⤵
- Executes dropped EXE
PID:4036 -
\??\c:\5nbbtb.exec:\5nbbtb.exe31⤵
- Executes dropped EXE
PID:3352 -
\??\c:\pdppv.exec:\pdppv.exe32⤵
- Executes dropped EXE
PID:4784 -
\??\c:\frffxlf.exec:\frffxlf.exe33⤵
- Executes dropped EXE
PID:2840 -
\??\c:\nbbhbb.exec:\nbbhbb.exe34⤵
- Executes dropped EXE
PID:4368 -
\??\c:\vpjvj.exec:\vpjvj.exe35⤵
- Executes dropped EXE
PID:1544 -
\??\c:\rrlfflf.exec:\rrlfflf.exe36⤵
- Executes dropped EXE
PID:3876 -
\??\c:\hnttnb.exec:\hnttnb.exe37⤵
- Executes dropped EXE
PID:4960 -
\??\c:\dddvp.exec:\dddvp.exe38⤵
- Executes dropped EXE
PID:1476 -
\??\c:\jjjjj.exec:\jjjjj.exe39⤵
- Executes dropped EXE
PID:2236 -
\??\c:\rxllffx.exec:\rxllffx.exe40⤵
- Executes dropped EXE
PID:2548 -
\??\c:\ttnnhb.exec:\ttnnhb.exe41⤵
- Executes dropped EXE
PID:3464 -
\??\c:\hbntht.exec:\hbntht.exe42⤵
- Executes dropped EXE
PID:1656 -
\??\c:\vvjpd.exec:\vvjpd.exe43⤵
- Executes dropped EXE
PID:4340 -
\??\c:\rrfrlfl.exec:\rrfrlfl.exe44⤵
- Executes dropped EXE
PID:392 -
\??\c:\frxrxxf.exec:\frxrxxf.exe45⤵
- Executes dropped EXE
PID:1244 -
\??\c:\hhnnhh.exec:\hhnnhh.exe46⤵
- Executes dropped EXE
PID:412 -
\??\c:\vjjvp.exec:\vjjvp.exe47⤵
- Executes dropped EXE
PID:4928 -
\??\c:\lrfrxrr.exec:\lrfrxrr.exe48⤵
- Executes dropped EXE
PID:4864 -
\??\c:\tnhhtt.exec:\tnhhtt.exe49⤵
- Executes dropped EXE
PID:4028 -
\??\c:\djvjj.exec:\djvjj.exe50⤵
- Executes dropped EXE
PID:656 -
\??\c:\jjjdv.exec:\jjjdv.exe51⤵
- Executes dropped EXE
PID:3976 -
\??\c:\lrllfrr.exec:\lrllfrr.exe52⤵
- Executes dropped EXE
PID:2864 -
\??\c:\xxfxxxx.exec:\xxfxxxx.exe53⤵
- Executes dropped EXE
PID:516 -
\??\c:\nntnnt.exec:\nntnnt.exe54⤵
- Executes dropped EXE
PID:436 -
\??\c:\ddpvp.exec:\ddpvp.exe55⤵
- Executes dropped EXE
PID:3776 -
\??\c:\pjdpp.exec:\pjdpp.exe56⤵
- Executes dropped EXE
PID:2108 -
\??\c:\lxrxlll.exec:\lxrxlll.exe57⤵
- Executes dropped EXE
PID:3872 -
\??\c:\lrlfrrr.exec:\lrlfrrr.exe58⤵
- Executes dropped EXE
PID:5104 -
\??\c:\hhnntb.exec:\hhnntb.exe59⤵
- Executes dropped EXE
PID:2368 -
\??\c:\hbtnnn.exec:\hbtnnn.exe60⤵
- Executes dropped EXE
PID:4008 -
\??\c:\jjjjj.exec:\jjjjj.exe61⤵
- Executes dropped EXE
PID:3968 -
\??\c:\lrxxxfl.exec:\lrxxxfl.exe62⤵
- Executes dropped EXE
PID:1532 -
\??\c:\hbtnhh.exec:\hbtnhh.exe63⤵
- Executes dropped EXE
PID:1988 -
\??\c:\ddvjd.exec:\ddvjd.exe64⤵
- Executes dropped EXE
PID:3720 -
\??\c:\jjpjv.exec:\jjpjv.exe65⤵
- Executes dropped EXE
PID:3096 -
\??\c:\frxrllx.exec:\frxrllx.exe66⤵PID:5032
-
\??\c:\nttbbn.exec:\nttbbn.exe67⤵PID:2008
-
\??\c:\hbhbbb.exec:\hbhbbb.exe68⤵PID:1088
-
\??\c:\dpjjj.exec:\dpjjj.exe69⤵PID:4352
-
\??\c:\fxflrff.exec:\fxflrff.exe70⤵PID:2080
-
\??\c:\llfflrx.exec:\llfflrx.exe71⤵PID:1060
-
\??\c:\bntbhn.exec:\bntbhn.exe72⤵PID:3648
-
\??\c:\nnbbbb.exec:\nnbbbb.exe73⤵PID:1716
-
\??\c:\dvdjp.exec:\dvdjp.exe74⤵PID:3100
-
\??\c:\lrfxffx.exec:\lrfxffx.exe75⤵PID:752
-
\??\c:\flffflr.exec:\flffflr.exe76⤵PID:3008
-
\??\c:\hbhnnh.exec:\hbhnnh.exe77⤵PID:4012
-
\??\c:\jdddj.exec:\jdddj.exe78⤵PID:1728
-
\??\c:\xlllrxl.exec:\xlllrxl.exe79⤵PID:4440
-
\??\c:\rffrlfx.exec:\rffrlfx.exe80⤵PID:1596
-
\??\c:\htbhnn.exec:\htbhnn.exe81⤵PID:2544
-
\??\c:\tttbbt.exec:\tttbbt.exe82⤵PID:976
-
\??\c:\9ddpv.exec:\9ddpv.exe83⤵
- System Location Discovery: System Language Discovery
PID:1224 -
\??\c:\lrxllfr.exec:\lrxllfr.exe84⤵PID:2708
-
\??\c:\htnbbb.exec:\htnbbb.exe85⤵PID:1788
-
\??\c:\ddppd.exec:\ddppd.exe86⤵PID:2552
-
\??\c:\flrlxrr.exec:\flrlxrr.exe87⤵PID:2104
-
\??\c:\5lrrlrf.exec:\5lrrlrf.exe88⤵PID:1108
-
\??\c:\bhntnt.exec:\bhntnt.exe89⤵PID:3172
-
\??\c:\jdvvd.exec:\jdvvd.exe90⤵PID:4368
-
\??\c:\lrrfxxl.exec:\lrrfxxl.exe91⤵PID:1544
-
\??\c:\rlllfxx.exec:\rlllfxx.exe92⤵PID:3876
-
\??\c:\thbbht.exec:\thbbht.exe93⤵PID:4652
-
\??\c:\jjvvp.exec:\jjvvp.exe94⤵PID:5004
-
\??\c:\vjvvv.exec:\vjvvv.exe95⤵PID:4284
-
\??\c:\lxxrfll.exec:\lxxrfll.exe96⤵PID:2528
-
\??\c:\bbttbn.exec:\bbttbn.exe97⤵PID:5096
-
\??\c:\bhbbbh.exec:\bhbbbh.exe98⤵PID:4344
-
\??\c:\pdppp.exec:\pdppp.exe99⤵PID:3728
-
\??\c:\dvppj.exec:\dvppj.exe100⤵PID:1976
-
\??\c:\flrlrlf.exec:\flrlrlf.exe101⤵PID:1752
-
\??\c:\tthnhn.exec:\tthnhn.exe102⤵PID:2120
-
\??\c:\bnnnnn.exec:\bnnnnn.exe103⤵PID:1812
-
\??\c:\pvppd.exec:\pvppd.exe104⤵PID:3592
-
\??\c:\rxlxxxf.exec:\rxlxxxf.exe105⤵PID:4296
-
\??\c:\xfffxrl.exec:\xfffxrl.exe106⤵PID:4912
-
\??\c:\ddddp.exec:\ddddp.exe107⤵PID:2408
-
\??\c:\lrflxxf.exec:\lrflxxf.exe108⤵PID:5084
-
\??\c:\bthbtb.exec:\bthbtb.exe109⤵PID:5056
-
\??\c:\ddppp.exec:\ddppp.exe110⤵PID:2112
-
\??\c:\tttbbb.exec:\tttbbb.exe111⤵PID:1032
-
\??\c:\htbnnb.exec:\htbnnb.exe112⤵PID:4184
-
\??\c:\pdvdd.exec:\pdvdd.exe113⤵PID:3836
-
\??\c:\ffrfrlr.exec:\ffrfrlr.exe114⤵PID:548
-
\??\c:\rlfffxx.exec:\rlfffxx.exe115⤵PID:5108
-
\??\c:\vjpvp.exec:\vjpvp.exe116⤵PID:4460
-
\??\c:\3pjjj.exec:\3pjjj.exe117⤵PID:4064
-
\??\c:\xlxxxxx.exec:\xlxxxxx.exe118⤵PID:4860
-
\??\c:\1btnhh.exec:\1btnhh.exe119⤵PID:4072
-
\??\c:\rxrfflr.exec:\rxrfflr.exe120⤵PID:2416
-
\??\c:\hnbbbb.exec:\hnbbbb.exe121⤵PID:1988
-
\??\c:\hhnhbh.exec:\hhnhbh.exe122⤵PID:3720
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-