Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 04:38
Behavioral task
behavioral1
Sample
bde8461dab77fc8fc5727aa9435a986c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bde8461dab77fc8fc5727aa9435a986c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bde8461dab77fc8fc5727aa9435a986c_JaffaCakes118.exe
-
Size
505KB
-
MD5
bde8461dab77fc8fc5727aa9435a986c
-
SHA1
2d84dcb21b757b0295a54f5360a73e5eb4cbb3b9
-
SHA256
005b207cc6ab0ec674dd939928998b1ab7dc64d68bd8287a250a83c59c3822d5
-
SHA512
d9c7b803fe8e713046dafaf7822e91cc5e3ebb255a7b77ccdae04c3821534d69d9e8bec3150f11784b9be4b6663c9df0b6c9b9e55a90be3d6aaada5996829b81
-
SSDEEP
12288:aB/eHxF7z3QYEVut0uRDJYea2eUSBTD7fWotEIQB+IKi8hKkRnY:qmRRz3Q5YiuEeuUs3EIKKi8jRnY
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2708 tcerthsf.exe 2068 vfcmaxiq.exe 2016 hoyhlsyo.exe 1284 cjdpdlgl.exe 2272 wptsgjnl.exe 2568 gduhwqah.exe 752 inlfomif.exe 1500 pvhxibsy.exe 2588 pkecakvm.exe 2864 cazfisat.exe 1200 zygfjzni.exe 1992 jbvqwcuc.exe 808 gcgdafgl.exe 1700 qxgniagj.exe 600 qqhgcmqz.exe 2908 aafqxqxu.exe 1032 ztgarkhk.exe 2620 saioodip.exe 2440 wuqnnnsu.exe 2308 gtclfmat.exe 2344 rpddnhbr.exe 1764 bzsoakpl.exe 2004 omcdgoox.exe 2528 agitrssh.exe 896 krxvnvyb.exe 2508 xhayvdei.exe 2640 kgvbemkq.exe 2896 xwqdmmpf.exe 300 kvsgvunm.exe 1276 uxirqxbg.exe 2816 etjbyscl.exe 2432 osngiqjd.exe 2292 tmvghbui.exe 1036 dekmmrvl.exe 1904 lmgegofd.exe 2960 yomustjn.exe 1164 cehwabpu.exe 2348 pgnemftv.exe 2156 zcowbiub.exe 2320 jedhodav.exe 2056 ruyzjakn.exe 2760 bqzjqvlk.exe 2732 jxnjkkuc.exe 2764 sacuyniw.exe 772 gnukdrhj.exe 2064 ngspalpw.exe 1756 axnrjlvd.exe 1504 nnqustbk.exe 2208 wyfefwhm.exe 644 joahnfmt.exe 696 uvmegdmt.exe 2260 euqcqcut.exe 824 rllfzcza.exe 1540 djohikfh.exe 3036 lvnmfenu.exe 2560 bznhjrko.exe 2796 isunylsb.exe 2992 umacjqek.exe 1508 fepiwgyn.exe 2372 sgvphslx.exe 848 cfznsrko.exe 2124 olrpgava.exe 2600 ykvnyzda.exe 2312 liyphhih.exe -
Loads dropped DLL 64 IoCs
pid Process 2900 bde8461dab77fc8fc5727aa9435a986c_JaffaCakes118.exe 2900 bde8461dab77fc8fc5727aa9435a986c_JaffaCakes118.exe 2708 tcerthsf.exe 2708 tcerthsf.exe 2068 vfcmaxiq.exe 2068 vfcmaxiq.exe 2016 hoyhlsyo.exe 2016 hoyhlsyo.exe 1284 cjdpdlgl.exe 1284 cjdpdlgl.exe 2272 wptsgjnl.exe 2272 wptsgjnl.exe 2568 gduhwqah.exe 2568 gduhwqah.exe 752 inlfomif.exe 752 inlfomif.exe 1500 pvhxibsy.exe 1500 pvhxibsy.exe 2588 pkecakvm.exe 2588 pkecakvm.exe 2864 cazfisat.exe 2864 cazfisat.exe 1200 zygfjzni.exe 1200 zygfjzni.exe 1992 jbvqwcuc.exe 1992 jbvqwcuc.exe 808 gcgdafgl.exe 808 gcgdafgl.exe 1700 qxgniagj.exe 1700 qxgniagj.exe 600 qqhgcmqz.exe 600 qqhgcmqz.exe 2908 aafqxqxu.exe 2908 aafqxqxu.exe 1032 ztgarkhk.exe 1032 ztgarkhk.exe 2620 saioodip.exe 2620 saioodip.exe 2440 wuqnnnsu.exe 2440 wuqnnnsu.exe 2308 gtclfmat.exe 2308 gtclfmat.exe 2344 rpddnhbr.exe 2344 rpddnhbr.exe 1764 bzsoakpl.exe 1764 bzsoakpl.exe 2004 omcdgoox.exe 2004 omcdgoox.exe 2528 agitrssh.exe 2528 agitrssh.exe 896 krxvnvyb.exe 896 krxvnvyb.exe 2508 xhayvdei.exe 2508 xhayvdei.exe 2640 kgvbemkq.exe 2640 kgvbemkq.exe 2896 xwqdmmpf.exe 2896 xwqdmmpf.exe 300 kvsgvunm.exe 300 kvsgvunm.exe 1276 uxirqxbg.exe 1276 uxirqxbg.exe 2816 etjbyscl.exe 2816 etjbyscl.exe -
resource yara_rule behavioral1/memory/2900-1-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/2900-4-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/2900-3-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/2900-2-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/2900-8-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/files/0x000a000000012283-9.dat themida behavioral1/memory/2708-17-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/2708-16-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/2708-22-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/2068-35-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/2068-31-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/2068-36-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/2016-45-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/2016-57-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/2016-56-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/1284-70-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/2272-80-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/2568-92-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/752-102-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/1500-115-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/2588-124-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/2864-136-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/1200-146-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/1992-159-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/808-168-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/1700-182-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/600-190-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/2908-199-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/1032-205-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/2620-212-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/2440-219-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/2308-226-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/2344-235-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/1764-240-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/2004-247-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/2528-255-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/896-261-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/2508-268-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/2640-275-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/2896-282-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/300-289-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/1276-296-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/2816-303-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/2432-310-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/2292-317-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/1036-324-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/1904-331-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/2960-338-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/1164-345-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/2348-353-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/2156-360-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/2320-366-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/2056-373-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/2760-381-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/2732-389-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/2764-396-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/772-401-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/2064-410-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/1756-417-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/1504-422-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/2208-430-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/644-436-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/696-443-0x0000000000400000-0x00000000005BE000-memory.dmp themida behavioral1/memory/2260-452-0x0000000000400000-0x00000000005BE000-memory.dmp themida -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\uffrahwz.exe kcpgfmix.exe File created C:\Windows\SysWOW64\btfjknge.exe oucgbfix.exe File created C:\Windows\SysWOW64\tviglrfx.exe htuqsebn.exe File opened for modification C:\Windows\SysWOW64\gptkgnbn.exe tnnuvixe.exe File created C:\Windows\SysWOW64\vnlqiiwl.exe lkwgvfqr.exe File opened for modification C:\Windows\SysWOW64\pomicaeg.exe cprgushy.exe File created C:\Windows\SysWOW64\qbcjijfr.exe ddhgzbak.exe File created C:\Windows\SysWOW64\bufdakgi.exe rntfqlzj.exe File opened for modification C:\Windows\SysWOW64\xbdmherb.exe kkirywmu.exe File opened for modification C:\Windows\SysWOW64\gbptdpoa.exe tluqnprt.exe File opened for modification C:\Windows\SysWOW64\gahryeiy.exe qwhwurld.exe File created C:\Windows\SysWOW64\mmyvftvv.exe znwtwlpn.exe File opened for modification C:\Windows\SysWOW64\yupwgqag.exe lhxzamtb.exe File opened for modification C:\Windows\SysWOW64\ahokarct.exe mmfvundo.exe File opened for modification C:\Windows\SysWOW64\frfvfaxf.exe sengzwya.exe File created C:\Windows\SysWOW64\bkpnapao.exe olukrhvh.exe File created C:\Windows\SysWOW64\uzuunwyr.exe llufxolu.exe File opened for modification C:\Windows\SysWOW64\qhrzjxoo.exe gebowuhm.exe File opened for modification C:\Windows\SysWOW64\cnkrlaoa.exe qoppdajt.exe File created C:\Windows\SysWOW64\zdakyudy.exe miiutyel.exe File created C:\Windows\SysWOW64\zgkfimxr.exe mppcamsk.exe File created C:\Windows\SysWOW64\xukyqvdx.exe kepvzufq.exe File opened for modification C:\Windows\SysWOW64\irhocuuv.exe vtemtupg.exe File created C:\Windows\SysWOW64\igtosvvd.exe yssrtnih.exe File opened for modification C:\Windows\SysWOW64\jepvaiym.exe zczlnejs.exe File created C:\Windows\SysWOW64\inaqnlgk.exe yzabxebo.exe File created C:\Windows\SysWOW64\ztgarkhk.exe aafqxqxu.exe File created C:\Windows\SysWOW64\bsyyyndi.exe oysinazh.exe File created C:\Windows\SysWOW64\hpvswpng.exe urapnhhz.exe File opened for modification C:\Windows\SysWOW64\gralclys.exe ttgqudal.exe File created C:\Windows\SysWOW64\zmgzpvst.exe mrwcjrth.exe File opened for modification C:\Windows\SysWOW64\pvhxibsy.exe inlfomif.exe File opened for modification C:\Windows\SysWOW64\gcgdafgl.exe jbvqwcuc.exe File opened for modification C:\Windows\SysWOW64\togmoucf.exe hmswchxv.exe File created C:\Windows\SysWOW64\daundadu.exe qjzkusfn.exe File created C:\Windows\SysWOW64\nelemdco.exe bfqbdvey.exe File opened for modification C:\Windows\SysWOW64\ndxqdjto.exe abrasxhf.exe File created C:\Windows\SysWOW64\couxmyua.exe ptchhuwv.exe File opened for modification C:\Windows\SysWOW64\vivynalp.exe hvmihemc.exe File created C:\Windows\SysWOW64\tcsnqxfd.exe jvoqfyyd.exe File opened for modification C:\Windows\SysWOW64\mviitryv.exe cklygwkb.exe File created C:\Windows\SysWOW64\jgtirqtp.exe wiyfiini.exe File created C:\Windows\SysWOW64\ozxzfzvr.exe biuxwzpk.exe File opened for modification C:\Windows\SysWOW64\gxovphrd.exe uvifeunu.exe File opened for modification C:\Windows\SysWOW64\rtllqfjp.exe frfvfaxf.exe File created C:\Windows\SysWOW64\lobqcdhd.exe ybkawziz.exe File created C:\Windows\SysWOW64\fkhyoktr.exe vdvtvlmr.exe File created C:\Windows\SysWOW64\tfkcbljv.exe jcvroiub.exe File created C:\Windows\SysWOW64\fiqotsta.exe trnllknt.exe File opened for modification C:\Windows\SysWOW64\znwtwlpn.exe pzddgekr.exe File created C:\Windows\SysWOW64\wznkwnft.exe jmvvqjgg.exe File opened for modification C:\Windows\SysWOW64\zbsqtihz.exe mkynkibk.exe File created C:\Windows\SysWOW64\owfwrmxy.exe burggztp.exe File opened for modification C:\Windows\SysWOW64\lkzcivrs.exe yxhmvrsn.exe File created C:\Windows\SysWOW64\subnwmtl.exe ijldbjnr.exe File created C:\Windows\SysWOW64\sevzbtep.exe iqdcllrs.exe File created C:\Windows\SysWOW64\spduadlz.exe fzisjvfs.exe File opened for modification C:\Windows\SysWOW64\uyqpvsmp.exe hivmnsgi.exe File created C:\Windows\SysWOW64\ohhrsduk.exe ethtcwhn.exe File opened for modification C:\Windows\SysWOW64\uraktpof.exe hpuchkkw.exe File opened for modification C:\Windows\SysWOW64\unkisokk.exe kzjlcgfn.exe File opened for modification C:\Windows\SysWOW64\acdglwmd.exe nplqfsny.exe File opened for modification C:\Windows\SysWOW64\xozetbdn.exe kyebktyg.exe File opened for modification C:\Windows\SysWOW64\subnwmtl.exe ijldbjnr.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vfcmaxiq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bwftbkns.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vkuqnbga.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language riiyuqqd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gxovphrd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcpgfmix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fozlxdos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gnniumsp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xukyqvdx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oopenvwh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zmgzpvst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xowwxfip.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rqmevmmz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oulsxnbm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdvtvlmr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ugblwzah.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rtstxtwo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qlqqycum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cklygwkb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oysinazh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mvwbnkga.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uyudchfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aafqxqxu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sengzwya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msxkihye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hvyvelsr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdgjxspd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yejysoox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eoqdiicr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yrrdmkey.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tcerthsf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language owfwrmxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gcvvbpdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wwdovqca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language whvkfjwc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ssncayrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxkqgvtc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscgkwjh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mppcamsk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vtemtupg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ivqujdys.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language juoyjbku.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language whfnpxjh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pkecakvm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language luwciovr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eiywtemr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uyzfykce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bznogbit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language umacjqek.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tdvipcak.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language blchbflb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bkpnapao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lyseywio.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pomicaeg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nuzszgnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abalmrrw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omcdgoox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gczzeoci.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language haxmfzcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cehwabpu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dqmvlvmv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xloixylt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcmjnzye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gduhwqah.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2900 bde8461dab77fc8fc5727aa9435a986c_JaffaCakes118.exe 2708 tcerthsf.exe 2068 vfcmaxiq.exe 2016 hoyhlsyo.exe 1284 cjdpdlgl.exe 2272 wptsgjnl.exe 2568 gduhwqah.exe 752 inlfomif.exe 1500 pvhxibsy.exe 2588 pkecakvm.exe 2864 cazfisat.exe 1200 zygfjzni.exe 1992 jbvqwcuc.exe 808 gcgdafgl.exe 1700 qxgniagj.exe 600 qqhgcmqz.exe 2908 aafqxqxu.exe 1032 ztgarkhk.exe 2620 saioodip.exe 2440 wuqnnnsu.exe 2308 gtclfmat.exe 2344 rpddnhbr.exe 1764 bzsoakpl.exe 2004 omcdgoox.exe 2528 agitrssh.exe 896 krxvnvyb.exe 2508 xhayvdei.exe 2640 kgvbemkq.exe 2896 xwqdmmpf.exe 300 kvsgvunm.exe 1276 uxirqxbg.exe 2816 etjbyscl.exe 2432 osngiqjd.exe 2292 tmvghbui.exe 1036 dekmmrvl.exe 1904 lmgegofd.exe 2960 yomustjn.exe 1164 cehwabpu.exe 2348 pgnemftv.exe 2156 zcowbiub.exe 2320 jedhodav.exe 2056 ruyzjakn.exe 2760 bqzjqvlk.exe 2732 jxnjkkuc.exe 2764 sacuyniw.exe 772 gnukdrhj.exe 2064 ngspalpw.exe 1756 axnrjlvd.exe 1504 nnqustbk.exe 2208 wyfefwhm.exe 644 joahnfmt.exe 696 uvmegdmt.exe 2260 euqcqcut.exe 824 rllfzcza.exe 1540 djohikfh.exe 3036 lvnmfenu.exe 2560 bznhjrko.exe 2796 isunylsb.exe 2992 umacjqek.exe 1508 fepiwgyn.exe 2372 sgvphslx.exe 848 cfznsrko.exe 2124 olrpgava.exe 2600 ykvnyzda.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2900 wrote to memory of 2708 2900 bde8461dab77fc8fc5727aa9435a986c_JaffaCakes118.exe 30 PID 2900 wrote to memory of 2708 2900 bde8461dab77fc8fc5727aa9435a986c_JaffaCakes118.exe 30 PID 2900 wrote to memory of 2708 2900 bde8461dab77fc8fc5727aa9435a986c_JaffaCakes118.exe 30 PID 2900 wrote to memory of 2708 2900 bde8461dab77fc8fc5727aa9435a986c_JaffaCakes118.exe 30 PID 2708 wrote to memory of 2068 2708 tcerthsf.exe 31 PID 2708 wrote to memory of 2068 2708 tcerthsf.exe 31 PID 2708 wrote to memory of 2068 2708 tcerthsf.exe 31 PID 2708 wrote to memory of 2068 2708 tcerthsf.exe 31 PID 2068 wrote to memory of 2016 2068 vfcmaxiq.exe 32 PID 2068 wrote to memory of 2016 2068 vfcmaxiq.exe 32 PID 2068 wrote to memory of 2016 2068 vfcmaxiq.exe 32 PID 2068 wrote to memory of 2016 2068 vfcmaxiq.exe 32 PID 2016 wrote to memory of 1284 2016 hoyhlsyo.exe 33 PID 2016 wrote to memory of 1284 2016 hoyhlsyo.exe 33 PID 2016 wrote to memory of 1284 2016 hoyhlsyo.exe 33 PID 2016 wrote to memory of 1284 2016 hoyhlsyo.exe 33 PID 1284 wrote to memory of 2272 1284 cjdpdlgl.exe 34 PID 1284 wrote to memory of 2272 1284 cjdpdlgl.exe 34 PID 1284 wrote to memory of 2272 1284 cjdpdlgl.exe 34 PID 1284 wrote to memory of 2272 1284 cjdpdlgl.exe 34 PID 2272 wrote to memory of 2568 2272 wptsgjnl.exe 35 PID 2272 wrote to memory of 2568 2272 wptsgjnl.exe 35 PID 2272 wrote to memory of 2568 2272 wptsgjnl.exe 35 PID 2272 wrote to memory of 2568 2272 wptsgjnl.exe 35 PID 2568 wrote to memory of 752 2568 gduhwqah.exe 36 PID 2568 wrote to memory of 752 2568 gduhwqah.exe 36 PID 2568 wrote to memory of 752 2568 gduhwqah.exe 36 PID 2568 wrote to memory of 752 2568 gduhwqah.exe 36 PID 752 wrote to memory of 1500 752 inlfomif.exe 37 PID 752 wrote to memory of 1500 752 inlfomif.exe 37 PID 752 wrote to memory of 1500 752 inlfomif.exe 37 PID 752 wrote to memory of 1500 752 inlfomif.exe 37 PID 1500 wrote to memory of 2588 1500 pvhxibsy.exe 38 PID 1500 wrote to memory of 2588 1500 pvhxibsy.exe 38 PID 1500 wrote to memory of 2588 1500 pvhxibsy.exe 38 PID 1500 wrote to memory of 2588 1500 pvhxibsy.exe 38 PID 2588 wrote to memory of 2864 2588 pkecakvm.exe 39 PID 2588 wrote to memory of 2864 2588 pkecakvm.exe 39 PID 2588 wrote to memory of 2864 2588 pkecakvm.exe 39 PID 2588 wrote to memory of 2864 2588 pkecakvm.exe 39 PID 2864 wrote to memory of 1200 2864 cazfisat.exe 40 PID 2864 wrote to memory of 1200 2864 cazfisat.exe 40 PID 2864 wrote to memory of 1200 2864 cazfisat.exe 40 PID 2864 wrote to memory of 1200 2864 cazfisat.exe 40 PID 1200 wrote to memory of 1992 1200 zygfjzni.exe 41 PID 1200 wrote to memory of 1992 1200 zygfjzni.exe 41 PID 1200 wrote to memory of 1992 1200 zygfjzni.exe 41 PID 1200 wrote to memory of 1992 1200 zygfjzni.exe 41 PID 1992 wrote to memory of 808 1992 jbvqwcuc.exe 42 PID 1992 wrote to memory of 808 1992 jbvqwcuc.exe 42 PID 1992 wrote to memory of 808 1992 jbvqwcuc.exe 42 PID 1992 wrote to memory of 808 1992 jbvqwcuc.exe 42 PID 808 wrote to memory of 1700 808 gcgdafgl.exe 43 PID 808 wrote to memory of 1700 808 gcgdafgl.exe 43 PID 808 wrote to memory of 1700 808 gcgdafgl.exe 43 PID 808 wrote to memory of 1700 808 gcgdafgl.exe 43 PID 1700 wrote to memory of 600 1700 qxgniagj.exe 44 PID 1700 wrote to memory of 600 1700 qxgniagj.exe 44 PID 1700 wrote to memory of 600 1700 qxgniagj.exe 44 PID 1700 wrote to memory of 600 1700 qxgniagj.exe 44 PID 600 wrote to memory of 2908 600 qqhgcmqz.exe 45 PID 600 wrote to memory of 2908 600 qqhgcmqz.exe 45 PID 600 wrote to memory of 2908 600 qqhgcmqz.exe 45 PID 600 wrote to memory of 2908 600 qqhgcmqz.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\bde8461dab77fc8fc5727aa9435a986c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bde8461dab77fc8fc5727aa9435a986c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\tcerthsf.exeC:\Windows\system32\tcerthsf.exe 660 "C:\Users\Admin\AppData\Local\Temp\bde8461dab77fc8fc5727aa9435a986c_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\vfcmaxiq.exeC:\Windows\system32\vfcmaxiq.exe 708 "C:\Windows\SysWOW64\tcerthsf.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\hoyhlsyo.exeC:\Windows\system32\hoyhlsyo.exe 624 "C:\Windows\SysWOW64\vfcmaxiq.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\cjdpdlgl.exeC:\Windows\system32\cjdpdlgl.exe 628 "C:\Windows\SysWOW64\hoyhlsyo.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\wptsgjnl.exeC:\Windows\system32\wptsgjnl.exe 636 "C:\Windows\SysWOW64\cjdpdlgl.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\gduhwqah.exeC:\Windows\system32\gduhwqah.exe 724 "C:\Windows\SysWOW64\wptsgjnl.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\inlfomif.exeC:\Windows\system32\inlfomif.exe 640 "C:\Windows\SysWOW64\gduhwqah.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\pvhxibsy.exeC:\Windows\system32\pvhxibsy.exe 732 "C:\Windows\SysWOW64\inlfomif.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\pkecakvm.exeC:\Windows\system32\pkecakvm.exe 656 "C:\Windows\SysWOW64\pvhxibsy.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\cazfisat.exeC:\Windows\system32\cazfisat.exe 740 "C:\Windows\SysWOW64\pkecakvm.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\zygfjzni.exeC:\Windows\system32\zygfjzni.exe 692 "C:\Windows\SysWOW64\cazfisat.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\jbvqwcuc.exeC:\Windows\system32\jbvqwcuc.exe 748 "C:\Windows\SysWOW64\zygfjzni.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\gcgdafgl.exeC:\Windows\system32\gcgdafgl.exe 700 "C:\Windows\SysWOW64\jbvqwcuc.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\SysWOW64\qxgniagj.exeC:\Windows\system32\qxgniagj.exe 764 "C:\Windows\SysWOW64\gcgdafgl.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\qqhgcmqz.exeC:\Windows\system32\qqhgcmqz.exe 664 "C:\Windows\SysWOW64\qxgniagj.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:600 -
C:\Windows\SysWOW64\aafqxqxu.exeC:\Windows\system32\aafqxqxu.exe 768 "C:\Windows\SysWOW64\qqhgcmqz.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2908 -
C:\Windows\SysWOW64\ztgarkhk.exeC:\Windows\system32\ztgarkhk.exe 672 "C:\Windows\SysWOW64\aafqxqxu.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1032 -
C:\Windows\SysWOW64\saioodip.exeC:\Windows\system32\saioodip.exe 784 "C:\Windows\SysWOW64\ztgarkhk.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2620 -
C:\Windows\SysWOW64\wuqnnnsu.exeC:\Windows\system32\wuqnnnsu.exe 772 "C:\Windows\SysWOW64\saioodip.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2440 -
C:\Windows\SysWOW64\gtclfmat.exeC:\Windows\system32\gtclfmat.exe 776 "C:\Windows\SysWOW64\wuqnnnsu.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2308 -
C:\Windows\SysWOW64\rpddnhbr.exeC:\Windows\system32\rpddnhbr.exe 788 "C:\Windows\SysWOW64\gtclfmat.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2344 -
C:\Windows\SysWOW64\bzsoakpl.exeC:\Windows\system32\bzsoakpl.exe 792 "C:\Windows\SysWOW64\rpddnhbr.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1764 -
C:\Windows\SysWOW64\omcdgoox.exeC:\Windows\system32\omcdgoox.exe 796 "C:\Windows\SysWOW64\bzsoakpl.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2004 -
C:\Windows\SysWOW64\agitrssh.exeC:\Windows\system32\agitrssh.exe 808 "C:\Windows\SysWOW64\omcdgoox.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2528 -
C:\Windows\SysWOW64\krxvnvyb.exeC:\Windows\system32\krxvnvyb.exe 800 "C:\Windows\SysWOW64\agitrssh.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:896 -
C:\Windows\SysWOW64\xhayvdei.exeC:\Windows\system32\xhayvdei.exe 780 "C:\Windows\SysWOW64\krxvnvyb.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2508 -
C:\Windows\SysWOW64\kgvbemkq.exeC:\Windows\system32\kgvbemkq.exe 804 "C:\Windows\SysWOW64\xhayvdei.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2640 -
C:\Windows\SysWOW64\xwqdmmpf.exeC:\Windows\system32\xwqdmmpf.exe 760 "C:\Windows\SysWOW64\kgvbemkq.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2896 -
C:\Windows\SysWOW64\kvsgvunm.exeC:\Windows\system32\kvsgvunm.exe 820 "C:\Windows\SysWOW64\xwqdmmpf.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:300 -
C:\Windows\SysWOW64\uxirqxbg.exeC:\Windows\system32\uxirqxbg.exe 816 "C:\Windows\SysWOW64\kvsgvunm.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1276 -
C:\Windows\SysWOW64\etjbyscl.exeC:\Windows\system32\etjbyscl.exe 832 "C:\Windows\SysWOW64\uxirqxbg.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2816 -
C:\Windows\SysWOW64\osngiqjd.exeC:\Windows\system32\osngiqjd.exe 840 "C:\Windows\SysWOW64\etjbyscl.exe"33⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2432 -
C:\Windows\SysWOW64\tmvghbui.exeC:\Windows\system32\tmvghbui.exe 824 "C:\Windows\SysWOW64\osngiqjd.exe"34⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2292 -
C:\Windows\SysWOW64\dekmmrvl.exeC:\Windows\system32\dekmmrvl.exe 836 "C:\Windows\SysWOW64\tmvghbui.exe"35⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1036 -
C:\Windows\SysWOW64\lmgegofd.exeC:\Windows\system32\lmgegofd.exe 828 "C:\Windows\SysWOW64\dekmmrvl.exe"36⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1904 -
C:\Windows\SysWOW64\yomustjn.exeC:\Windows\system32\yomustjn.exe 844 "C:\Windows\SysWOW64\lmgegofd.exe"37⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2960 -
C:\Windows\SysWOW64\cehwabpu.exeC:\Windows\system32\cehwabpu.exe 848 "C:\Windows\SysWOW64\yomustjn.exe"38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1164 -
C:\Windows\SysWOW64\pgnemftv.exeC:\Windows\system32\pgnemftv.exe 852 "C:\Windows\SysWOW64\cehwabpu.exe"39⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2348 -
C:\Windows\SysWOW64\zcowbiub.exeC:\Windows\system32\zcowbiub.exe 856 "C:\Windows\SysWOW64\pgnemftv.exe"40⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2156 -
C:\Windows\SysWOW64\jedhodav.exeC:\Windows\system32\jedhodav.exe 860 "C:\Windows\SysWOW64\zcowbiub.exe"41⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2320 -
C:\Windows\SysWOW64\ruyzjakn.exeC:\Windows\system32\ruyzjakn.exe 864 "C:\Windows\SysWOW64\jedhodav.exe"42⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2056 -
C:\Windows\SysWOW64\bqzjqvlk.exeC:\Windows\system32\bqzjqvlk.exe 876 "C:\Windows\SysWOW64\ruyzjakn.exe"43⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2760 -
C:\Windows\SysWOW64\jxnjkkuc.exeC:\Windows\system32\jxnjkkuc.exe 872 "C:\Windows\SysWOW64\bqzjqvlk.exe"44⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2732 -
C:\Windows\SysWOW64\sacuyniw.exeC:\Windows\system32\sacuyniw.exe 880 "C:\Windows\SysWOW64\jxnjkkuc.exe"45⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2764 -
C:\Windows\SysWOW64\gnukdrhj.exeC:\Windows\system32\gnukdrhj.exe 892 "C:\Windows\SysWOW64\sacuyniw.exe"46⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:772 -
C:\Windows\SysWOW64\ngspalpw.exeC:\Windows\system32\ngspalpw.exe 868 "C:\Windows\SysWOW64\gnukdrhj.exe"47⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2064 -
C:\Windows\SysWOW64\axnrjlvd.exeC:\Windows\system32\axnrjlvd.exe 884 "C:\Windows\SysWOW64\ngspalpw.exe"48⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1756 -
C:\Windows\SysWOW64\nnqustbk.exeC:\Windows\system32\nnqustbk.exe 896 "C:\Windows\SysWOW64\axnrjlvd.exe"49⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1504 -
C:\Windows\SysWOW64\wyfefwhm.exeC:\Windows\system32\wyfefwhm.exe 888 "C:\Windows\SysWOW64\nnqustbk.exe"50⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2208 -
C:\Windows\SysWOW64\joahnfmt.exeC:\Windows\system32\joahnfmt.exe 908 "C:\Windows\SysWOW64\wyfefwhm.exe"51⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:644 -
C:\Windows\SysWOW64\uvmegdmt.exeC:\Windows\system32\uvmegdmt.exe 900 "C:\Windows\SysWOW64\joahnfmt.exe"52⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:696 -
C:\Windows\SysWOW64\euqcqcut.exeC:\Windows\system32\euqcqcut.exe 904 "C:\Windows\SysWOW64\uvmegdmt.exe"53⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2260 -
C:\Windows\SysWOW64\rllfzcza.exeC:\Windows\system32\rllfzcza.exe 912 "C:\Windows\SysWOW64\euqcqcut.exe"54⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:824 -
C:\Windows\SysWOW64\djohikfh.exeC:\Windows\system32\djohikfh.exe 812 "C:\Windows\SysWOW64\rllfzcza.exe"55⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1540 -
C:\Windows\SysWOW64\lvnmfenu.exeC:\Windows\system32\lvnmfenu.exe 928 "C:\Windows\SysWOW64\djohikfh.exe"56⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3036 -
C:\Windows\SysWOW64\bznhjrko.exeC:\Windows\system32\bznhjrko.exe 916 "C:\Windows\SysWOW64\lvnmfenu.exe"57⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2560 -
C:\Windows\SysWOW64\isunylsb.exeC:\Windows\system32\isunylsb.exe 924 "C:\Windows\SysWOW64\bznhjrko.exe"58⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2796 -
C:\Windows\SysWOW64\umacjqek.exeC:\Windows\system32\umacjqek.exe 932 "C:\Windows\SysWOW64\isunylsb.exe"59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2992 -
C:\Windows\SysWOW64\fepiwgyn.exeC:\Windows\system32\fepiwgyn.exe 936 "C:\Windows\SysWOW64\umacjqek.exe"60⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1508 -
C:\Windows\SysWOW64\sgvphslx.exeC:\Windows\system32\sgvphslx.exe 948 "C:\Windows\SysWOW64\fepiwgyn.exe"61⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2372 -
C:\Windows\SysWOW64\cfznsrko.exeC:\Windows\system32\cfznsrko.exe 940 "C:\Windows\SysWOW64\sgvphslx.exe"62⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:848 -
C:\Windows\SysWOW64\olrpgava.exeC:\Windows\system32\olrpgava.exe 920 "C:\Windows\SysWOW64\cfznsrko.exe"63⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2124 -
C:\Windows\SysWOW64\ykvnyzda.exeC:\Windows\system32\ykvnyzda.exe 952 "C:\Windows\SysWOW64\olrpgava.exe"64⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2600 -
C:\Windows\SysWOW64\liyphhih.exeC:\Windows\system32\liyphhih.exe 944 "C:\Windows\SysWOW64\ykvnyzda.exe"65⤵
- Executes dropped EXE
PID:2312 -
C:\Windows\SysWOW64\vhcnrgih.exeC:\Windows\system32\vhcnrgih.exe 960 "C:\Windows\SysWOW64\liyphhih.exe"66⤵PID:1932
-
C:\Windows\SysWOW64\ghokceph.exeC:\Windows\system32\ghokceph.exe 976 "C:\Windows\SysWOW64\vhcnrgih.exe"67⤵PID:1664
-
C:\Windows\SysWOW64\sjuavrui.exeC:\Windows\system32\sjuavrui.exe 964 "C:\Windows\SysWOW64\ghokceph.exe"68⤵PID:952
-
C:\Windows\SysWOW64\fweqbnbv.exeC:\Windows\system32\fweqbnbv.exe 984 "C:\Windows\SysWOW64\sjuavrui.exe"69⤵PID:2460
-
C:\Windows\SysWOW64\smgskvyc.exeC:\Windows\system32\smgskvyc.exe 972 "C:\Windows\SysWOW64\fweqbnbv.exe"70⤵PID:2080
-
C:\Windows\SysWOW64\ctlquugc.exeC:\Windows\system32\ctlquugc.exe 968 "C:\Windows\SysWOW64\smgskvyc.exe"71⤵PID:1704
-
C:\Windows\SysWOW64\mwaahxmw.exeC:\Windows\system32\mwaahxmw.exe 980 "C:\Windows\SysWOW64\ctlquugc.exe"72⤵PID:2756
-
C:\Windows\SysWOW64\zmddyfsl.exeC:\Windows\system32\zmddyfsl.exe 992 "C:\Windows\SysWOW64\mwaahxmw.exe"73⤵PID:2176
-
C:\Windows\SysWOW64\jthaiwzd.exeC:\Windows\system32\jthaiwzd.exe 988 "C:\Windows\SysWOW64\zmddyfsl.exe"74⤵PID:2248
-
C:\Windows\SysWOW64\twwlvzff.exeC:\Windows\system32\twwlvzff.exe 996 "C:\Windows\SysWOW64\jthaiwzd.exe"75⤵PID:1824
-
C:\Windows\SysWOW64\gurnehlm.exeC:\Windows\system32\gurnehlm.exe 1008 "C:\Windows\SysWOW64\twwlvzff.exe"76⤵PID:1956
-
C:\Windows\SysWOW64\tluqnprt.exeC:\Windows\system32\tluqnprt.exe 1000 "C:\Windows\SysWOW64\gurnehlm.exe"77⤵
- Drops file in System32 directory
PID:2904 -
C:\Windows\SysWOW64\gbptdpoa.exeC:\Windows\system32\gbptdpoa.exe 1004 "C:\Windows\SysWOW64\tluqnprt.exe"78⤵PID:1600
-
C:\Windows\SysWOW64\tdvipcak.exeC:\Windows\system32\tdvipcak.exe 1020 "C:\Windows\SysWOW64\gbptdpoa.exe"79⤵
- System Location Discovery: System Language Discovery
PID:2744 -
C:\Windows\SysWOW64\ddhgzbak.exeC:\Windows\system32\ddhgzbak.exe 1012 "C:\Windows\SysWOW64\tdvipcak.exe"80⤵
- Drops file in System32 directory
PID:2580 -
C:\Windows\SysWOW64\qbcjijfr.exeC:\Windows\system32\qbcjijfr.exe 1016 "C:\Windows\SysWOW64\ddhgzbak.exe"81⤵PID:1052
-
C:\Windows\SysWOW64\aertdemt.exeC:\Windows\system32\aertdemt.exe 1028 "C:\Windows\SysWOW64\qbcjijfr.exe"82⤵PID:292
-
C:\Windows\SysWOW64\mgxboqyv.exeC:\Windows\system32\mgxboqyv.exe 1032 "C:\Windows\SysWOW64\aertdemt.exe"83⤵PID:992
-
C:\Windows\SysWOW64\ztpquuxh.exeC:\Windows\system32\ztpquuxh.exe 1036 "C:\Windows\SysWOW64\mgxboqyv.exe"84⤵PID:2464
-
C:\Windows\SysWOW64\bhpokcke.exeC:\Windows\system32\bhpokcke.exe 1048 "C:\Windows\SysWOW64\ztpquuxh.exe"85⤵PID:1612
-
C:\Windows\SysWOW64\ouzdqyjj.exeC:\Windows\system32\ouzdqyjj.exe 1044 "C:\Windows\SysWOW64\bhpokcke.exe"86⤵PID:1232
-
C:\Windows\SysWOW64\bwftbkns.exeC:\Windows\system32\bwftbkns.exe 1056 "C:\Windows\SysWOW64\ouzdqyjj.exe"87⤵
- System Location Discovery: System Language Discovery
PID:1028 -
C:\Windows\SysWOW64\lvrqujvs.exeC:\Windows\system32\lvrqujvs.exe 1060 "C:\Windows\SysWOW64\bwftbkns.exe"88⤵PID:2340
-
C:\Windows\SysWOW64\ypxgfvzc.exeC:\Windows\system32\ypxgfvzc.exe 1040 "C:\Windows\SysWOW64\lvrqujvs.exe"89⤵PID:1780
-
C:\Windows\SysWOW64\lkhwlryg.exeC:\Windows\system32\lkhwlryg.exe 1064 "C:\Windows\SysWOW64\ypxgfvzc.exe"90⤵PID:1772
-
C:\Windows\SysWOW64\yenlwecq.exeC:\Windows\system32\yenlwecq.exe 1068 "C:\Windows\SysWOW64\lkhwlryg.exe"91⤵PID:2424
-
C:\Windows\SysWOW64\kcpgfmix.exeC:\Windows\system32\kcpgfmix.exe 1052 "C:\Windows\SysWOW64\yenlwecq.exe"92⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1544 -
C:\Windows\SysWOW64\uffrahwz.exeC:\Windows\system32\uffrahwz.exe 1084 "C:\Windows\SysWOW64\kcpgfmix.exe"93⤵PID:2860
-
C:\Windows\SysWOW64\epubnkct.exeC:\Windows\system32\epubnkct.exe 1072 "C:\Windows\SysWOW64\uffrahwz.exe"94⤵PID:1996
-
C:\Windows\SysWOW64\rgpewsia.exeC:\Windows\system32\rgpewsia.exe 956 "C:\Windows\SysWOW64\epubnkct.exe"95⤵PID:2332
-
C:\Windows\SysWOW64\ethtcwhn.exeC:\Windows\system32\ethtcwhn.exe 1088 "C:\Windows\SysWOW64\rgpewsia.exe"96⤵
- Drops file in System32 directory
PID:2220 -
C:\Windows\SysWOW64\ohhrsduk.exeC:\Windows\system32\ohhrsduk.exe 756 "C:\Windows\SysWOW64\ethtcwhn.exe"97⤵PID:2420
-
C:\Windows\SysWOW64\burggztp.exeC:\Windows\system32\burggztp.exe 1096 "C:\Windows\SysWOW64\ohhrsduk.exe"98⤵
- Drops file in System32 directory
PID:2116 -
C:\Windows\SysWOW64\owfwrmxy.exeC:\Windows\system32\owfwrmxy.exe 1092 "C:\Windows\SysWOW64\burggztp.exe"99⤵
- System Location Discovery: System Language Discovery
PID:2256 -
C:\Windows\SysWOW64\bnazaucf.exeC:\Windows\system32\bnazaucf.exe 1100 "C:\Windows\SysWOW64\owfwrmxy.exe"100⤵PID:1596
-
C:\Windows\SysWOW64\lxpjnpjh.exeC:\Windows\system32\lxpjnpjh.exe 1116 "C:\Windows\SysWOW64\bnazaucf.exe"101⤵PID:2000
-
C:\Windows\SysWOW64\ykhztthm.exeC:\Windows\system32\ykhztthm.exe 1104 "C:\Windows\SysWOW64\lxpjnpjh.exe"102⤵PID:1296
-
C:\Windows\SysWOW64\hyzwravj.exeC:\Windows\system32\hyzwravj.exe 1124 "C:\Windows\SysWOW64\ykhztthm.exe"103⤵PID:1112
-
C:\Windows\SysWOW64\vlrmxetw.exeC:\Windows\system32\vlrmxetw.exe 1112 "C:\Windows\SysWOW64\hyzwravj.exe"104⤵PID:2120
-
C:\Windows\SysWOW64\icmpfezd.exeC:\Windows\system32\icmpfezd.exe 1108 "C:\Windows\SysWOW64\vlrmxetw.exe"105⤵PID:2784
-
C:\Windows\SysWOW64\rqmevmmz.exeC:\Windows\system32\rqmevmmz.exe 1128 "C:\Windows\SysWOW64\icmpfezd.exe"106⤵
- System Location Discovery: System Language Discovery
PID:496 -
C:\Windows\SysWOW64\edecbqlm.exeC:\Windows\system32\edecbqlm.exe 1132 "C:\Windows\SysWOW64\rqmevmmz.exe"107⤵PID:1392
-
C:\Windows\SysWOW64\rbzwkyqt.exeC:\Windows\system32\rbzwkyqt.exe 1120 "C:\Windows\SysWOW64\edecbqlm.exe"108⤵PID:2820
-
C:\Windows\SysWOW64\bhzuixvq.exeC:\Windows\system32\bhzuixvq.exe 1136 "C:\Windows\SysWOW64\rbzwkyqt.exe"109⤵PID:688
-
C:\Windows\SysWOW64\ourknbcu.exeC:\Windows\system32\ourknbcu.exe 1144 "C:\Windows\SysWOW64\bhzuixvq.exe"110⤵PID:2436
-
C:\Windows\SysWOW64\btmmwjak.exeC:\Windows\system32\btmmwjak.exe 1140 "C:\Windows\SysWOW64\ourknbcu.exe"111⤵PID:2968
-
C:\Windows\SysWOW64\lvbxjmoe.exeC:\Windows\system32\lvbxjmoe.exe 1148 "C:\Windows\SysWOW64\btmmwjak.exe"112⤵PID:2680
-
C:\Windows\SysWOW64\yxhmvrsn.exeC:\Windows\system32\yxhmvrsn.exe 1152 "C:\Windows\SysWOW64\lvbxjmoe.exe"113⤵
- Drops file in System32 directory
PID:1604 -
C:\Windows\SysWOW64\lkzcivrs.exeC:\Windows\system32\lkzcivrs.exe 1156 "C:\Windows\SysWOW64\yxhmvrsn.exe"114⤵PID:2412
-
C:\Windows\SysWOW64\xmfsuhwc.exeC:\Windows\system32\xmfsuhwc.exe 1160 "C:\Windows\SysWOW64\lkzcivrs.exe"115⤵PID:1484
-
C:\Windows\SysWOW64\hpuchkkw.exeC:\Windows\system32\hpuchkkw.exe 1164 "C:\Windows\SysWOW64\xmfsuhwc.exe"116⤵
- Drops file in System32 directory
PID:1680 -
C:\Windows\SysWOW64\uraktpof.exeC:\Windows\system32\uraktpof.exe 1168 "C:\Windows\SysWOW64\hpuchkkw.exe"117⤵PID:2212
-
C:\Windows\SysWOW64\heszytns.exeC:\Windows\system32\heszytns.exe 1172 "C:\Windows\SysWOW64\uraktpof.exe"118⤵PID:852
-
C:\Windows\SysWOW64\rphkuwtm.exeC:\Windows\system32\rphkuwtm.exe 1080 "C:\Windows\SysWOW64\heszytns.exe"119⤵PID:2396
-
C:\Windows\SysWOW64\efcncwzt.exeC:\Windows\system32\efcncwzt.exe 1184 "C:\Windows\SysWOW64\rphkuwtm.exe"120⤵PID:2964
-
C:\Windows\SysWOW64\oqrxpzfw.exeC:\Windows\system32\oqrxpzfw.exe 1180 "C:\Windows\SysWOW64\efcncwzt.exe"121⤵PID:2824
-
C:\Windows\SysWOW64\bguayhld.exeC:\Windows\system32\bguayhld.exe 1188 "C:\Windows\SysWOW64\oqrxpzfw.exe"122⤵PID:2624
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-