Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 15:08
Static task
static1
Behavioral task
behavioral1
Sample
afb7fc5edc8dcdc3e746a823a3058fdc_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
afb7fc5edc8dcdc3e746a823a3058fdc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
afb7fc5edc8dcdc3e746a823a3058fdc_JaffaCakes118.exe
-
Size
76KB
-
MD5
afb7fc5edc8dcdc3e746a823a3058fdc
-
SHA1
b93edf43f7d712a9ebc5435588206a84cb8cac8b
-
SHA256
dcc6864883f770c4ccaf486be9975ce581c5c3593df630c0df78b856f0c4c09d
-
SHA512
ed28b215c41a3d9b2b0620439f42ec0e510bdb2e2897fbed4bde4488cf2a65e628ca1c2a007fe193e85d40e11e628862a54c988b099e070a75d3000e9eb6dc1d
-
SSDEEP
384:3Jo/3taMWKFSIWUIvBIqyrBzSFeClW1HmbGXLjGU/rHWxjDU80zL:ZovcW32BIq8zSFeeOHH7y0rHWtDJ0z
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2512 cmd.exe -
Executes dropped EXE 64 IoCs
pid Process 3068 mh100.exe 768 mh100.exe 2812 mh100.exe 3008 mh100.exe 2772 mh100.exe 2748 mh100.exe 2732 mh100.exe 2096 mh100.exe 1664 mh100.exe 2116 mh100.exe 2904 mh100.exe 2912 mh100.exe 236 mh100.exe 1472 mh100.exe 2708 mh100.exe 2172 mh100.exe 2368 mh100.exe 2372 mh100.exe 684 mh100.exe 2212 mh100.exe 3020 mh100.exe 1616 mh100.exe 1476 mh100.exe 2484 mh100.exe 2548 mh100.exe 568 mh100.exe 1096 mh100.exe 1768 mh100.exe 1016 mh100.exe 2692 mh100.exe 3060 mh100.exe 2380 mh100.exe 2260 mh100.exe 2816 mh100.exe 2804 mh100.exe 2896 mh100.exe 2856 mh100.exe 2780 mh100.exe 2688 mh100.exe 2184 mh100.exe 1132 mh100.exe 2088 mh100.exe 1664 mh100.exe 2340 mh100.exe 2932 mh100.exe 2700 mh100.exe 2912 mh100.exe 1976 mh100.exe 2120 mh100.exe 2216 mh100.exe 2944 mh100.exe 2936 mh100.exe 748 mh100.exe 2604 mh100.exe 2312 mh100.exe 1936 mh100.exe 316 mh100.exe 2972 mh100.exe 1668 mh100.exe 1636 mh100.exe 2436 mh100.exe 2964 mh100.exe 2556 mh100.exe 1876 mh100.exe -
Loads dropped DLL 64 IoCs
pid Process 900 afb7fc5edc8dcdc3e746a823a3058fdc_JaffaCakes118.exe 900 afb7fc5edc8dcdc3e746a823a3058fdc_JaffaCakes118.exe 3068 mh100.exe 3068 mh100.exe 768 mh100.exe 768 mh100.exe 2812 mh100.exe 2812 mh100.exe 3008 mh100.exe 3008 mh100.exe 2772 mh100.exe 2772 mh100.exe 2748 mh100.exe 2748 mh100.exe 2732 mh100.exe 2732 mh100.exe 2096 mh100.exe 2096 mh100.exe 1664 mh100.exe 1664 mh100.exe 2116 mh100.exe 2116 mh100.exe 2904 mh100.exe 2904 mh100.exe 2912 mh100.exe 2912 mh100.exe 236 mh100.exe 236 mh100.exe 1472 mh100.exe 1472 mh100.exe 2708 mh100.exe 2708 mh100.exe 2172 mh100.exe 2172 mh100.exe 2368 mh100.exe 2368 mh100.exe 2372 mh100.exe 2372 mh100.exe 684 mh100.exe 684 mh100.exe 2212 mh100.exe 2212 mh100.exe 3020 mh100.exe 3020 mh100.exe 1616 mh100.exe 1616 mh100.exe 1476 mh100.exe 1476 mh100.exe 2484 mh100.exe 2484 mh100.exe 2548 mh100.exe 2548 mh100.exe 568 mh100.exe 568 mh100.exe 1096 mh100.exe 1096 mh100.exe 1768 mh100.exe 1768 mh100.exe 1016 mh100.exe 1016 mh100.exe 2692 mh100.exe 2692 mh100.exe 3060 mh100.exe 3060 mh100.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe File created C:\Windows\SysWOW64\mh100.exe mh100.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mh100.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mh100.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mh100.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mh100.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mh100.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mh100.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mh100.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mh100.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mh100.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mh100.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mh100.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mh100.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mh100.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mh100.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mh100.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mh100.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mh100.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mh100.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mh100.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mh100.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mh100.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mh100.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mh100.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mh100.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mh100.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mh100.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mh100.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mh100.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mh100.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mh100.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mh100.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mh100.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mh100.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mh100.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 900 afb7fc5edc8dcdc3e746a823a3058fdc_JaffaCakes118.exe 900 afb7fc5edc8dcdc3e746a823a3058fdc_JaffaCakes118.exe 900 afb7fc5edc8dcdc3e746a823a3058fdc_JaffaCakes118.exe 900 afb7fc5edc8dcdc3e746a823a3058fdc_JaffaCakes118.exe 3068 mh100.exe 3068 mh100.exe 3068 mh100.exe 3068 mh100.exe 768 mh100.exe 768 mh100.exe 768 mh100.exe 768 mh100.exe 2812 mh100.exe 2812 mh100.exe 2812 mh100.exe 2812 mh100.exe 3008 mh100.exe 3008 mh100.exe 3008 mh100.exe 3008 mh100.exe 2772 mh100.exe 2772 mh100.exe 2772 mh100.exe 2772 mh100.exe 2748 mh100.exe 2748 mh100.exe 2748 mh100.exe 2748 mh100.exe 2732 mh100.exe 2732 mh100.exe 2732 mh100.exe 2732 mh100.exe 2096 mh100.exe 2096 mh100.exe 2096 mh100.exe 2096 mh100.exe 1664 mh100.exe 1664 mh100.exe 1664 mh100.exe 1664 mh100.exe 2116 mh100.exe 2116 mh100.exe 2116 mh100.exe 2116 mh100.exe 2904 mh100.exe 2904 mh100.exe 2904 mh100.exe 2904 mh100.exe 2912 mh100.exe 2912 mh100.exe 2912 mh100.exe 2912 mh100.exe 236 mh100.exe 236 mh100.exe 236 mh100.exe 236 mh100.exe 1472 mh100.exe 1472 mh100.exe 1472 mh100.exe 1472 mh100.exe 2708 mh100.exe 2708 mh100.exe 2708 mh100.exe 2708 mh100.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 900 wrote to memory of 3068 900 afb7fc5edc8dcdc3e746a823a3058fdc_JaffaCakes118.exe 30 PID 900 wrote to memory of 3068 900 afb7fc5edc8dcdc3e746a823a3058fdc_JaffaCakes118.exe 30 PID 900 wrote to memory of 3068 900 afb7fc5edc8dcdc3e746a823a3058fdc_JaffaCakes118.exe 30 PID 900 wrote to memory of 3068 900 afb7fc5edc8dcdc3e746a823a3058fdc_JaffaCakes118.exe 30 PID 900 wrote to memory of 2512 900 afb7fc5edc8dcdc3e746a823a3058fdc_JaffaCakes118.exe 31 PID 900 wrote to memory of 2512 900 afb7fc5edc8dcdc3e746a823a3058fdc_JaffaCakes118.exe 31 PID 900 wrote to memory of 2512 900 afb7fc5edc8dcdc3e746a823a3058fdc_JaffaCakes118.exe 31 PID 900 wrote to memory of 2512 900 afb7fc5edc8dcdc3e746a823a3058fdc_JaffaCakes118.exe 31 PID 3068 wrote to memory of 768 3068 mh100.exe 33 PID 3068 wrote to memory of 768 3068 mh100.exe 33 PID 3068 wrote to memory of 768 3068 mh100.exe 33 PID 3068 wrote to memory of 768 3068 mh100.exe 33 PID 3068 wrote to memory of 2720 3068 mh100.exe 34 PID 3068 wrote to memory of 2720 3068 mh100.exe 34 PID 3068 wrote to memory of 2720 3068 mh100.exe 34 PID 3068 wrote to memory of 2720 3068 mh100.exe 34 PID 768 wrote to memory of 2812 768 mh100.exe 36 PID 768 wrote to memory of 2812 768 mh100.exe 36 PID 768 wrote to memory of 2812 768 mh100.exe 36 PID 768 wrote to memory of 2812 768 mh100.exe 36 PID 768 wrote to memory of 2860 768 mh100.exe 37 PID 768 wrote to memory of 2860 768 mh100.exe 37 PID 768 wrote to memory of 2860 768 mh100.exe 37 PID 768 wrote to memory of 2860 768 mh100.exe 37 PID 2812 wrote to memory of 3008 2812 mh100.exe 39 PID 2812 wrote to memory of 3008 2812 mh100.exe 39 PID 2812 wrote to memory of 3008 2812 mh100.exe 39 PID 2812 wrote to memory of 3008 2812 mh100.exe 39 PID 2812 wrote to memory of 2896 2812 mh100.exe 40 PID 2812 wrote to memory of 2896 2812 mh100.exe 40 PID 2812 wrote to memory of 2896 2812 mh100.exe 40 PID 2812 wrote to memory of 2896 2812 mh100.exe 40 PID 3008 wrote to memory of 2772 3008 mh100.exe 42 PID 3008 wrote to memory of 2772 3008 mh100.exe 42 PID 3008 wrote to memory of 2772 3008 mh100.exe 42 PID 3008 wrote to memory of 2772 3008 mh100.exe 42 PID 3008 wrote to memory of 2636 3008 mh100.exe 43 PID 3008 wrote to memory of 2636 3008 mh100.exe 43 PID 3008 wrote to memory of 2636 3008 mh100.exe 43 PID 3008 wrote to memory of 2636 3008 mh100.exe 43 PID 2772 wrote to memory of 2748 2772 mh100.exe 45 PID 2772 wrote to memory of 2748 2772 mh100.exe 45 PID 2772 wrote to memory of 2748 2772 mh100.exe 45 PID 2772 wrote to memory of 2748 2772 mh100.exe 45 PID 2772 wrote to memory of 2656 2772 mh100.exe 46 PID 2772 wrote to memory of 2656 2772 mh100.exe 46 PID 2772 wrote to memory of 2656 2772 mh100.exe 46 PID 2772 wrote to memory of 2656 2772 mh100.exe 46 PID 2748 wrote to memory of 2732 2748 mh100.exe 49 PID 2748 wrote to memory of 2732 2748 mh100.exe 49 PID 2748 wrote to memory of 2732 2748 mh100.exe 49 PID 2748 wrote to memory of 2732 2748 mh100.exe 49 PID 2748 wrote to memory of 2100 2748 mh100.exe 50 PID 2748 wrote to memory of 2100 2748 mh100.exe 50 PID 2748 wrote to memory of 2100 2748 mh100.exe 50 PID 2748 wrote to memory of 2100 2748 mh100.exe 50 PID 2732 wrote to memory of 2096 2732 mh100.exe 52 PID 2732 wrote to memory of 2096 2732 mh100.exe 52 PID 2732 wrote to memory of 2096 2732 mh100.exe 52 PID 2732 wrote to memory of 2096 2732 mh100.exe 52 PID 2732 wrote to memory of 664 2732 mh100.exe 53 PID 2732 wrote to memory of 664 2732 mh100.exe 53 PID 2732 wrote to memory of 664 2732 mh100.exe 53 PID 2732 wrote to memory of 664 2732 mh100.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\afb7fc5edc8dcdc3e746a823a3058fdc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\afb7fc5edc8dcdc3e746a823a3058fdc_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2096 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1664 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2116 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2904 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2912 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:236 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1472 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2708 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2172 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2368 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2372 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:684 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2212 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3020 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1616 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1476 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2484 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2548 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:568 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1096 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1768 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1016 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2692 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3060 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2380 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2260 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2816 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe36⤵
- Executes dropped EXE
PID:2804 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe37⤵
- Executes dropped EXE
PID:2896 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2856 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2780 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2688 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe41⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2184 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1132 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe43⤵
- Executes dropped EXE
PID:2088 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe44⤵
- Executes dropped EXE
PID:1664 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2340 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2932 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2700 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe48⤵
- Executes dropped EXE
PID:2912 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1976 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2120 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2216 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe52⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2944 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe53⤵
- Executes dropped EXE
PID:2936 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe54⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:748 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe55⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2604 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe56⤵
- Executes dropped EXE
PID:2312 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe57⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1936 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe58⤵
- Executes dropped EXE
PID:316 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe59⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2972 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe60⤵
- Executes dropped EXE
PID:1668 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe61⤵
- Executes dropped EXE
PID:1636 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe62⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2436 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe63⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2964 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe64⤵
- Executes dropped EXE
PID:2556 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1876 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe66⤵PID:2480
-
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe67⤵PID:1540
-
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe68⤵
- System Location Discovery: System Language Discovery
PID:2524 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe69⤵PID:1532
-
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe70⤵PID:2528
-
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe71⤵PID:2996
-
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe72⤵PID:2716
-
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe73⤵PID:2768
-
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe74⤵PID:2868
-
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe75⤵PID:2788
-
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe76⤵
- System Location Discovery: System Language Discovery
PID:2636 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe77⤵PID:2516
-
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe78⤵
- Drops file in System32 directory
PID:2748 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe79⤵
- System Location Discovery: System Language Discovery
PID:620 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe80⤵
- System Location Discovery: System Language Discovery
PID:584 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe81⤵
- Drops file in System32 directory
PID:1984 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe82⤵PID:2672
-
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe83⤵PID:1236
-
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe84⤵
- Drops file in System32 directory
PID:2924 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe85⤵PID:2952
-
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe86⤵
- Drops file in System32 directory
PID:1988 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe87⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2104 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe88⤵
- Drops file in System32 directory
PID:2064 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe89⤵
- Drops file in System32 directory
PID:2376 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe90⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2060 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe91⤵
- Drops file in System32 directory
PID:3036 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe92⤵
- System Location Discovery: System Language Discovery
PID:2628 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe93⤵
- Drops file in System32 directory
PID:1064 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe94⤵PID:840
-
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe95⤵PID:1176
-
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe96⤵
- Drops file in System32 directory
PID:668 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe97⤵PID:2212
-
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe98⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:644 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe99⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1480 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe100⤵
- Drops file in System32 directory
PID:1696 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe101⤵
- Drops file in System32 directory
PID:1088 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe102⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:936 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe103⤵
- System Location Discovery: System Language Discovery
PID:1888 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe104⤵PID:1740
-
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe105⤵PID:1444
-
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe106⤵PID:1584
-
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe107⤵
- System Location Discovery: System Language Discovery
PID:1540 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe108⤵
- Drops file in System32 directory
PID:2524 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe109⤵
- Drops file in System32 directory
PID:1532 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe110⤵PID:928
-
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe111⤵PID:2796
-
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe112⤵
- Drops file in System32 directory
PID:2852 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe113⤵
- System Location Discovery: System Language Discovery
PID:2744 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe114⤵PID:3008
-
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe115⤵PID:2824
-
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe116⤵
- Drops file in System32 directory
PID:2168 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe117⤵
- Drops file in System32 directory
PID:2780 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe118⤵
- Drops file in System32 directory
PID:1344 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe119⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2100 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe120⤵PID:2712
-
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe121⤵
- Drops file in System32 directory
PID:2096 -
C:\Windows\SysWOW64\mh100.exeC:\Windows\system32\mh100.exe122⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2596
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-