Analysis
-
max time kernel
150s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 13:50
Behavioral task
behavioral1
Sample
c0e0b659eecf02fe6170b8b3c309b143_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c0e0b659eecf02fe6170b8b3c309b143_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c0e0b659eecf02fe6170b8b3c309b143_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
c0e0b659eecf02fe6170b8b3c309b143
-
SHA1
6e448f13224c0273969a1e050f7441b229cb0aa8
-
SHA256
29192c865b623585b24a068513c40871e4cca4b79e0a81044b383ab62752ed2e
-
SHA512
8d4e662aa31a543760d29d080425dd6872dfc712aeb1eb2e756137d195d67262d478288ce68dead004deac2063dc8c6f21c2169d898e1d2ba37bff6e49cf8b64
-
SSDEEP
24576:8CLp12csRNJECtmYbuzhSsX2GuC7VF3Lbb5XnnktVD:hvNsvKUmYkhbM8lxXn
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2700 ehewrb.exe 1816 ymscuu.exe 2364 ffsmuw.exe 1796 cvzuvd.exe 3004 mgoxjy.exe 1832 lcacfx.exe 1372 ypssls.exe 2400 bgjhdo.exe 2740 ljzszs.exe 2588 pzdnvg.exe 2760 umxugh.exe 2240 xwnstx.exe 960 cjgamh.exe 2396 juffbb.exe 2320 rvefqq.exe 2568 tqgilq.exe 1636 fknxwv.exe 2428 pvcijy.exe 2912 zuofcw.exe 2772 nhyvha.exe 2504 xsvfvd.exe 560 kffvaz.exe 536 wzllmm.exe 1188 hgxiel.exe 2500 twslnt.exe 3048 bhqqcm.exe 1632 ngttln.exe 2336 vogtfk.exe 2748 iebvnk.exe 2668 vdeyws.exe 2680 fciwgr.exe 2296 pbutzq.exe 2572 czpwhy.exe 1664 mcfgvt.exe 592 yelogg.exe 2524 jzlgwa.exe 1624 wqgjei.exe 2620 gawtsl.exe 3000 trywam.exe 2712 ccogvp.exe 1732 psjbex.exe 924 arvgow.exe 608 mtboaa.exe 2520 zgkege.exe 324 jraobh.exe 1976 whdrjp.exe 2784 jyxusp.exe 2968 tineft.exe 1956 gveulw.exe 884 ndsufm.exe 2828 ajjotd.exe 2408 kivmeb.exe 1600 xvfcsf.exe 1336 hcrhcw.exe 2848 uhacqn.exe 2876 husrwr.exe 1128 moyhiv.exe 1788 wvkeau.exe 1768 ipqulg.exe 3012 wczkrk.exe 1524 dvypge.exe 1364 qmbsxe.exe 2764 dkwufm.exe 2012 mnlftp.exe -
Loads dropped DLL 64 IoCs
pid Process 2904 c0e0b659eecf02fe6170b8b3c309b143_JaffaCakes118.exe 2904 c0e0b659eecf02fe6170b8b3c309b143_JaffaCakes118.exe 2700 ehewrb.exe 2700 ehewrb.exe 1816 ymscuu.exe 1816 ymscuu.exe 2364 ffsmuw.exe 2364 ffsmuw.exe 1796 cvzuvd.exe 1796 cvzuvd.exe 3004 mgoxjy.exe 3004 mgoxjy.exe 1832 lcacfx.exe 1832 lcacfx.exe 1372 ypssls.exe 1372 ypssls.exe 2400 bgjhdo.exe 2400 bgjhdo.exe 2740 ljzszs.exe 2740 ljzszs.exe 2588 pzdnvg.exe 2588 pzdnvg.exe 2760 umxugh.exe 2760 umxugh.exe 2240 xwnstx.exe 2240 xwnstx.exe 960 cjgamh.exe 960 cjgamh.exe 2396 juffbb.exe 2396 juffbb.exe 2320 rvefqq.exe 2320 rvefqq.exe 2568 tqgilq.exe 2568 tqgilq.exe 1636 fknxwv.exe 1636 fknxwv.exe 2428 pvcijy.exe 2428 pvcijy.exe 2912 zuofcw.exe 2912 zuofcw.exe 2772 nhyvha.exe 2772 nhyvha.exe 2504 xsvfvd.exe 2504 xsvfvd.exe 560 kffvaz.exe 560 kffvaz.exe 536 wzllmm.exe 536 wzllmm.exe 1188 hgxiel.exe 1188 hgxiel.exe 2500 twslnt.exe 2500 twslnt.exe 3048 bhqqcm.exe 3048 bhqqcm.exe 1632 ngttln.exe 1632 ngttln.exe 2336 vogtfk.exe 2336 vogtfk.exe 2748 iebvnk.exe 2748 iebvnk.exe 2668 vdeyws.exe 2668 vdeyws.exe 2680 fciwgr.exe 2680 fciwgr.exe -
resource yara_rule behavioral1/memory/2904-10-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/2904-9-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/2904-13-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/2904-12-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/2904-11-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/files/0x000f000000012015-24.dat themida behavioral1/memory/2904-17-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/2700-26-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/2700-32-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/2700-31-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/2700-27-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/1816-41-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/1816-40-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/1816-43-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/1816-54-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/2364-69-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/1796-77-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/3004-89-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/1832-99-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/1372-111-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/2400-121-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/2740-132-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/2588-146-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/2760-155-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/2240-166-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/960-176-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/2396-187-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/2320-199-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/2568-208-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/1636-213-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/2428-220-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/2912-227-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/2772-234-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/2504-241-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/560-248-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/536-255-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/1188-262-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/2500-269-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/3048-276-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/1632-283-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/2336-290-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/2748-297-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/2668-304-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/2680-313-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/2296-318-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/2572-325-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/1664-332-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/592-341-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/2524-346-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/1624-355-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/2620-360-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/3000-367-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/2712-374-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/1732-381-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/924-388-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/608-395-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/2520-402-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/324-409-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/1976-416-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/2784-423-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/2968-430-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/1956-437-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/884-444-0x0000000000400000-0x0000000000690000-memory.dmp themida behavioral1/memory/2828-451-0x0000000000400000-0x0000000000690000-memory.dmp themida -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\cjyqyp.exe xirbnc.exe File created C:\Windows\SysWOW64\jshjlc.exe wfxlfy.exe File created C:\Windows\SysWOW64\kjfznd.exe xpyjur.exe File created C:\Windows\SysWOW64\rvefqq.exe juffbb.exe File opened for modification C:\Windows\SysWOW64\dhxucw.exe qrcrto.exe File opened for modification C:\Windows\SysWOW64\edsbqp.exe sexzhh.exe File opened for modification C:\Windows\SysWOW64\xwokmx.exe olzayc.exe File opened for modification C:\Windows\SysWOW64\eskmpn.exe rchjgn.exe File opened for modification C:\Windows\SysWOW64\aazxhg.exe nkeuyy.exe File opened for modification C:\Windows\SysWOW64\hhgrnq.exe xwrhrm.exe File created C:\Windows\SysWOW64\cndboe.exe ptxtus.exe File opened for modification C:\Windows\SysWOW64\ixumkc.exe ddoezp.exe File created C:\Windows\SysWOW64\xxkcev.exe kypavn.exe File created C:\Windows\SysWOW64\adzwpt.exe nneugt.exe File created C:\Windows\SysWOW64\fnspqm.exe saiakj.exe File opened for modification C:\Windows\SysWOW64\dmtdji.exe qsnnxw.exe File opened for modification C:\Windows\SysWOW64\mgoxjy.exe cvzuvd.exe File opened for modification C:\Windows\SysWOW64\wczkrk.exe ipqulg.exe File opened for modification C:\Windows\SysWOW64\mnlftp.exe dkwufm.exe File opened for modification C:\Windows\SysWOW64\cwakcj.exe sukagg.exe File created C:\Windows\SysWOW64\davqib.exe tpgfvy.exe File opened for modification C:\Windows\SysWOW64\ernris.exe vlmuss.exe File opened for modification C:\Windows\SysWOW64\zukfyp.exe mehlph.exe File opened for modification C:\Windows\SysWOW64\gyslte.exe tixile.exe File opened for modification C:\Windows\SysWOW64\hahasz.exe uybkgn.exe File opened for modification C:\Windows\SysWOW64\wkwvji.exe kltsba.exe File opened for modification C:\Windows\SysWOW64\zonokp.exe myslbh.exe File created C:\Windows\SysWOW64\qprkal.exe duzuuh.exe File created C:\Windows\SysWOW64\dziusa.exe qbnrjs.exe File opened for modification C:\Windows\SysWOW64\nutntx.exe dkecyu.exe File opened for modification C:\Windows\SysWOW64\smmcvd.exe ibwsah.exe File created C:\Windows\SysWOW64\gmsczo.exe ukmmoj.exe File created C:\Windows\SysWOW64\bvqmdo.exe rhqonh.exe File created C:\Windows\SysWOW64\jueyrp.exe agebti.exe File created C:\Windows\SysWOW64\ernris.exe vlmuss.exe File opened for modification C:\Windows\SysWOW64\viwmip.exe iktjag.exe File created C:\Windows\SysWOW64\vjkwvp.exe itptfp.exe File created C:\Windows\SysWOW64\xwnstx.exe umxugh.exe File opened for modification C:\Windows\SysWOW64\ccogvp.exe trywam.exe File opened for modification C:\Windows\SysWOW64\avlicq.exe nxqfui.exe File opened for modification C:\Windows\SysWOW64\ghimau.exe wthpkn.exe File created C:\Windows\SysWOW64\furgcd.exe tdwdud.exe File opened for modification C:\Windows\SysWOW64\bzdplf.exe neuzfj.exe File opened for modification C:\Windows\SysWOW64\ogssmj.exe belcbe.exe File opened for modification C:\Windows\SysWOW64\xfjnpq.exe kgokgi.exe File created C:\Windows\SysWOW64\ntwtdg.exe brqdsu.exe File created C:\Windows\SysWOW64\uqhpjv.exe kchsln.exe File opened for modification C:\Windows\SysWOW64\oqlbqf.exe bzrzhx.exe File created C:\Windows\SysWOW64\nutntx.exe dkecyu.exe File opened for modification C:\Windows\SysWOW64\juikmb.exe wwnidb.exe File opened for modification C:\Windows\SysWOW64\imrrkk.exe vslkqy.exe File opened for modification C:\Windows\SysWOW64\mvblys.exe dhboil.exe File created C:\Windows\SysWOW64\wdaluk.exe jjuvix.exe File opened for modification C:\Windows\SysWOW64\adzwpt.exe nneugt.exe File created C:\Windows\SysWOW64\jvlfxi.exe witqje.exe File created C:\Windows\SysWOW64\uhumlu.exe hrajdm.exe File created C:\Windows\SysWOW64\zydlwn.exe pkdogf.exe File opened for modification C:\Windows\SysWOW64\belcbe.exe rbwsnb.exe File opened for modification C:\Windows\SysWOW64\nrhknj.exe dkvmvk.exe File created C:\Windows\SysWOW64\pusgtw.exe chiqoa.exe File opened for modification C:\Windows\SysWOW64\ippnhc.exe vrmlyc.exe File opened for modification C:\Windows\SysWOW64\olzayc.exe bjtsfp.exe File created C:\Windows\SysWOW64\sydppd.exe fiamgv.exe File created C:\Windows\SysWOW64\zrlwtl.exe meugnp.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xbdacl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zlttpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xckmlz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gzsoym.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language werjle.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdsmfy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vslkqy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ojbrpy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language owjxvs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cavpoc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hkxmjh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hmgsnz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lcacfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xwrhrm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mzlcic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ozgzma.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdmpdn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language osdbkv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kpaubp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dnyfrc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zjqdlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vogtfk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wwnidb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qkgnqh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gmsczo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vodlwn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fufgzg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language buqjxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abtxet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c0e0b659eecf02fe6170b8b3c309b143_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jueyrp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ocehnw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hqeuoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kupkfi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wrudmo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvkjvt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xnunqk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fknxwv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kfzijw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language awcryl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gasekj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oyyxgg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language grtdnz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcbfuk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language artxqs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ibfsuc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xwokmx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pwpgml.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gezcax.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mkzqxi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ogssmj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iyaabk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xwdvyb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sukagg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language olzayc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zafjti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nosxbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jfgyag.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfjnpq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrighq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language izkgka.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvypge.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yiznle.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lhwdcb.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2904 c0e0b659eecf02fe6170b8b3c309b143_JaffaCakes118.exe 2700 ehewrb.exe 1816 ymscuu.exe 2364 ffsmuw.exe 1796 cvzuvd.exe 3004 mgoxjy.exe 1832 lcacfx.exe 1372 ypssls.exe 2400 bgjhdo.exe 2740 ljzszs.exe 2588 pzdnvg.exe 2760 umxugh.exe 2240 xwnstx.exe 960 cjgamh.exe 2396 juffbb.exe 2320 rvefqq.exe 2568 tqgilq.exe 1636 fknxwv.exe 2428 pvcijy.exe 2912 zuofcw.exe 2772 nhyvha.exe 2504 xsvfvd.exe 560 kffvaz.exe 536 wzllmm.exe 1188 hgxiel.exe 2500 twslnt.exe 3048 bhqqcm.exe 1632 ngttln.exe 2336 vogtfk.exe 2748 iebvnk.exe 2668 vdeyws.exe 2680 fciwgr.exe 2296 pbutzq.exe 2572 czpwhy.exe 1664 mcfgvt.exe 592 yelogg.exe 2524 jzlgwa.exe 1624 wqgjei.exe 2620 gawtsl.exe 3000 trywam.exe 2712 ccogvp.exe 1732 psjbex.exe 924 arvgow.exe 608 mtboaa.exe 2520 zgkege.exe 324 jraobh.exe 1976 whdrjp.exe 2784 jyxusp.exe 2968 tineft.exe 1956 gveulw.exe 884 ndsufm.exe 2828 ajjotd.exe 2408 kivmeb.exe 1600 xvfcsf.exe 1336 hcrhcw.exe 2848 uhacqn.exe 2876 husrwr.exe 1128 moyhiv.exe 1788 wvkeau.exe 1768 ipqulg.exe 3012 wczkrk.exe 1524 dvypge.exe 1364 qmbsxe.exe 2764 dkwufm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2700 2904 c0e0b659eecf02fe6170b8b3c309b143_JaffaCakes118.exe 29 PID 2904 wrote to memory of 2700 2904 c0e0b659eecf02fe6170b8b3c309b143_JaffaCakes118.exe 29 PID 2904 wrote to memory of 2700 2904 c0e0b659eecf02fe6170b8b3c309b143_JaffaCakes118.exe 29 PID 2904 wrote to memory of 2700 2904 c0e0b659eecf02fe6170b8b3c309b143_JaffaCakes118.exe 29 PID 2700 wrote to memory of 1816 2700 ehewrb.exe 30 PID 2700 wrote to memory of 1816 2700 ehewrb.exe 30 PID 2700 wrote to memory of 1816 2700 ehewrb.exe 30 PID 2700 wrote to memory of 1816 2700 ehewrb.exe 30 PID 1816 wrote to memory of 2364 1816 ymscuu.exe 31 PID 1816 wrote to memory of 2364 1816 ymscuu.exe 31 PID 1816 wrote to memory of 2364 1816 ymscuu.exe 31 PID 1816 wrote to memory of 2364 1816 ymscuu.exe 31 PID 2364 wrote to memory of 1796 2364 ffsmuw.exe 32 PID 2364 wrote to memory of 1796 2364 ffsmuw.exe 32 PID 2364 wrote to memory of 1796 2364 ffsmuw.exe 32 PID 2364 wrote to memory of 1796 2364 ffsmuw.exe 32 PID 1796 wrote to memory of 3004 1796 cvzuvd.exe 33 PID 1796 wrote to memory of 3004 1796 cvzuvd.exe 33 PID 1796 wrote to memory of 3004 1796 cvzuvd.exe 33 PID 1796 wrote to memory of 3004 1796 cvzuvd.exe 33 PID 3004 wrote to memory of 1832 3004 mgoxjy.exe 34 PID 3004 wrote to memory of 1832 3004 mgoxjy.exe 34 PID 3004 wrote to memory of 1832 3004 mgoxjy.exe 34 PID 3004 wrote to memory of 1832 3004 mgoxjy.exe 34 PID 1832 wrote to memory of 1372 1832 lcacfx.exe 35 PID 1832 wrote to memory of 1372 1832 lcacfx.exe 35 PID 1832 wrote to memory of 1372 1832 lcacfx.exe 35 PID 1832 wrote to memory of 1372 1832 lcacfx.exe 35 PID 1372 wrote to memory of 2400 1372 ypssls.exe 36 PID 1372 wrote to memory of 2400 1372 ypssls.exe 36 PID 1372 wrote to memory of 2400 1372 ypssls.exe 36 PID 1372 wrote to memory of 2400 1372 ypssls.exe 36 PID 2400 wrote to memory of 2740 2400 bgjhdo.exe 37 PID 2400 wrote to memory of 2740 2400 bgjhdo.exe 37 PID 2400 wrote to memory of 2740 2400 bgjhdo.exe 37 PID 2400 wrote to memory of 2740 2400 bgjhdo.exe 37 PID 2740 wrote to memory of 2588 2740 ljzszs.exe 38 PID 2740 wrote to memory of 2588 2740 ljzszs.exe 38 PID 2740 wrote to memory of 2588 2740 ljzszs.exe 38 PID 2740 wrote to memory of 2588 2740 ljzszs.exe 38 PID 2588 wrote to memory of 2760 2588 pzdnvg.exe 39 PID 2588 wrote to memory of 2760 2588 pzdnvg.exe 39 PID 2588 wrote to memory of 2760 2588 pzdnvg.exe 39 PID 2588 wrote to memory of 2760 2588 pzdnvg.exe 39 PID 2760 wrote to memory of 2240 2760 umxugh.exe 40 PID 2760 wrote to memory of 2240 2760 umxugh.exe 40 PID 2760 wrote to memory of 2240 2760 umxugh.exe 40 PID 2760 wrote to memory of 2240 2760 umxugh.exe 40 PID 2240 wrote to memory of 960 2240 xwnstx.exe 41 PID 2240 wrote to memory of 960 2240 xwnstx.exe 41 PID 2240 wrote to memory of 960 2240 xwnstx.exe 41 PID 2240 wrote to memory of 960 2240 xwnstx.exe 41 PID 960 wrote to memory of 2396 960 cjgamh.exe 42 PID 960 wrote to memory of 2396 960 cjgamh.exe 42 PID 960 wrote to memory of 2396 960 cjgamh.exe 42 PID 960 wrote to memory of 2396 960 cjgamh.exe 42 PID 2396 wrote to memory of 2320 2396 juffbb.exe 43 PID 2396 wrote to memory of 2320 2396 juffbb.exe 43 PID 2396 wrote to memory of 2320 2396 juffbb.exe 43 PID 2396 wrote to memory of 2320 2396 juffbb.exe 43 PID 2320 wrote to memory of 2568 2320 rvefqq.exe 44 PID 2320 wrote to memory of 2568 2320 rvefqq.exe 44 PID 2320 wrote to memory of 2568 2320 rvefqq.exe 44 PID 2320 wrote to memory of 2568 2320 rvefqq.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0e0b659eecf02fe6170b8b3c309b143_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c0e0b659eecf02fe6170b8b3c309b143_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\ehewrb.exeC:\Windows\system32\ehewrb.exe 628 "C:\Users\Admin\AppData\Local\Temp\c0e0b659eecf02fe6170b8b3c309b143_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\ymscuu.exeC:\Windows\system32\ymscuu.exe 632 "C:\Windows\SysWOW64\ehewrb.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\ffsmuw.exeC:\Windows\system32\ffsmuw.exe 636 "C:\Windows\SysWOW64\ymscuu.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\cvzuvd.exeC:\Windows\system32\cvzuvd.exe 640 "C:\Windows\SysWOW64\ffsmuw.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\mgoxjy.exeC:\Windows\system32\mgoxjy.exe 716 "C:\Windows\SysWOW64\cvzuvd.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\lcacfx.exeC:\Windows\system32\lcacfx.exe 660 "C:\Windows\SysWOW64\mgoxjy.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\ypssls.exeC:\Windows\system32\ypssls.exe 724 "C:\Windows\SysWOW64\lcacfx.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\bgjhdo.exeC:\Windows\system32\bgjhdo.exe 664 "C:\Windows\SysWOW64\ypssls.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\ljzszs.exeC:\Windows\system32\ljzszs.exe 732 "C:\Windows\SysWOW64\bgjhdo.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\pzdnvg.exeC:\Windows\system32\pzdnvg.exe 652 "C:\Windows\SysWOW64\ljzszs.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\umxugh.exeC:\Windows\system32\umxugh.exe 744 "C:\Windows\SysWOW64\pzdnvg.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\xwnstx.exeC:\Windows\system32\xwnstx.exe 748 "C:\Windows\SysWOW64\umxugh.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\cjgamh.exeC:\Windows\system32\cjgamh.exe 752 "C:\Windows\SysWOW64\xwnstx.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\juffbb.exeC:\Windows\system32\juffbb.exe 736 "C:\Windows\SysWOW64\cjgamh.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\rvefqq.exeC:\Windows\system32\rvefqq.exe 668 "C:\Windows\SysWOW64\juffbb.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\tqgilq.exeC:\Windows\system32\tqgilq.exe 676 "C:\Windows\SysWOW64\rvefqq.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2568 -
C:\Windows\SysWOW64\fknxwv.exeC:\Windows\system32\fknxwv.exe 776 "C:\Windows\SysWOW64\tqgilq.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1636 -
C:\Windows\SysWOW64\pvcijy.exeC:\Windows\system32\pvcijy.exe 768 "C:\Windows\SysWOW64\fknxwv.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2428 -
C:\Windows\SysWOW64\zuofcw.exeC:\Windows\system32\zuofcw.exe 764 "C:\Windows\SysWOW64\pvcijy.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2912 -
C:\Windows\SysWOW64\nhyvha.exeC:\Windows\system32\nhyvha.exe 780 "C:\Windows\SysWOW64\zuofcw.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2772 -
C:\Windows\SysWOW64\xsvfvd.exeC:\Windows\system32\xsvfvd.exe 772 "C:\Windows\SysWOW64\nhyvha.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2504 -
C:\Windows\SysWOW64\kffvaz.exeC:\Windows\system32\kffvaz.exe 788 "C:\Windows\SysWOW64\xsvfvd.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:560 -
C:\Windows\SysWOW64\wzllmm.exeC:\Windows\system32\wzllmm.exe 792 "C:\Windows\SysWOW64\kffvaz.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:536 -
C:\Windows\SysWOW64\hgxiel.exeC:\Windows\system32\hgxiel.exe 796 "C:\Windows\SysWOW64\wzllmm.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1188 -
C:\Windows\SysWOW64\twslnt.exeC:\Windows\system32\twslnt.exe 800 "C:\Windows\SysWOW64\hgxiel.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2500 -
C:\Windows\SysWOW64\bhqqcm.exeC:\Windows\system32\bhqqcm.exe 808 "C:\Windows\SysWOW64\twslnt.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3048 -
C:\Windows\SysWOW64\ngttln.exeC:\Windows\system32\ngttln.exe 804 "C:\Windows\SysWOW64\bhqqcm.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1632 -
C:\Windows\SysWOW64\vogtfk.exeC:\Windows\system32\vogtfk.exe 816 "C:\Windows\SysWOW64\ngttln.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2336 -
C:\Windows\SysWOW64\iebvnk.exeC:\Windows\system32\iebvnk.exe 784 "C:\Windows\SysWOW64\vogtfk.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2748 -
C:\Windows\SysWOW64\vdeyws.exeC:\Windows\system32\vdeyws.exe 820 "C:\Windows\SysWOW64\iebvnk.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2668 -
C:\Windows\SysWOW64\fciwgr.exeC:\Windows\system32\fciwgr.exe 836 "C:\Windows\SysWOW64\vdeyws.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2680 -
C:\Windows\SysWOW64\pbutzq.exeC:\Windows\system32\pbutzq.exe 824 "C:\Windows\SysWOW64\fciwgr.exe"33⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2296 -
C:\Windows\SysWOW64\czpwhy.exeC:\Windows\system32\czpwhy.exe 812 "C:\Windows\SysWOW64\pbutzq.exe"34⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2572 -
C:\Windows\SysWOW64\mcfgvt.exeC:\Windows\system32\mcfgvt.exe 848 "C:\Windows\SysWOW64\czpwhy.exe"35⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1664 -
C:\Windows\SysWOW64\yelogg.exeC:\Windows\system32\yelogg.exe 828 "C:\Windows\SysWOW64\mcfgvt.exe"36⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:592 -
C:\Windows\SysWOW64\jzlgwa.exeC:\Windows\system32\jzlgwa.exe 844 "C:\Windows\SysWOW64\yelogg.exe"37⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2524 -
C:\Windows\SysWOW64\wqgjei.exeC:\Windows\system32\wqgjei.exe 832 "C:\Windows\SysWOW64\jzlgwa.exe"38⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1624 -
C:\Windows\SysWOW64\gawtsl.exeC:\Windows\system32\gawtsl.exe 860 "C:\Windows\SysWOW64\wqgjei.exe"39⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2620 -
C:\Windows\SysWOW64\trywam.exeC:\Windows\system32\trywam.exe 840 "C:\Windows\SysWOW64\gawtsl.exe"40⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3000 -
C:\Windows\SysWOW64\ccogvp.exeC:\Windows\system32\ccogvp.exe 864 "C:\Windows\SysWOW64\trywam.exe"41⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2712 -
C:\Windows\SysWOW64\psjbex.exeC:\Windows\system32\psjbex.exe 852 "C:\Windows\SysWOW64\ccogvp.exe"42⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1732 -
C:\Windows\SysWOW64\arvgow.exeC:\Windows\system32\arvgow.exe 868 "C:\Windows\SysWOW64\psjbex.exe"43⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:924 -
C:\Windows\SysWOW64\mtboaa.exeC:\Windows\system32\mtboaa.exe 880 "C:\Windows\SysWOW64\arvgow.exe"44⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:608 -
C:\Windows\SysWOW64\zgkege.exeC:\Windows\system32\zgkege.exe 872 "C:\Windows\SysWOW64\mtboaa.exe"45⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2520 -
C:\Windows\SysWOW64\jraobh.exeC:\Windows\system32\jraobh.exe 884 "C:\Windows\SysWOW64\zgkege.exe"46⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:324 -
C:\Windows\SysWOW64\whdrjp.exeC:\Windows\system32\whdrjp.exe 876 "C:\Windows\SysWOW64\jraobh.exe"47⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1976 -
C:\Windows\SysWOW64\jyxusp.exeC:\Windows\system32\jyxusp.exe 888 "C:\Windows\SysWOW64\whdrjp.exe"48⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2784 -
C:\Windows\SysWOW64\tineft.exeC:\Windows\system32\tineft.exe 896 "C:\Windows\SysWOW64\jyxusp.exe"49⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2968 -
C:\Windows\SysWOW64\gveulw.exeC:\Windows\system32\gveulw.exe 856 "C:\Windows\SysWOW64\tineft.exe"50⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1956 -
C:\Windows\SysWOW64\ndsufm.exeC:\Windows\system32\ndsufm.exe 900 "C:\Windows\SysWOW64\gveulw.exe"51⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:884 -
C:\Windows\SysWOW64\ajjotd.exeC:\Windows\system32\ajjotd.exe 892 "C:\Windows\SysWOW64\ndsufm.exe"52⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2828 -
C:\Windows\SysWOW64\kivmeb.exeC:\Windows\system32\kivmeb.exe 912 "C:\Windows\SysWOW64\ajjotd.exe"53⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2408 -
C:\Windows\SysWOW64\xvfcsf.exeC:\Windows\system32\xvfcsf.exe 904 "C:\Windows\SysWOW64\kivmeb.exe"54⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1600 -
C:\Windows\SysWOW64\hcrhcw.exeC:\Windows\system32\hcrhcw.exe 908 "C:\Windows\SysWOW64\xvfcsf.exe"55⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1336 -
C:\Windows\SysWOW64\uhacqn.exeC:\Windows\system32\uhacqn.exe 916 "C:\Windows\SysWOW64\hcrhcw.exe"56⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2848 -
C:\Windows\SysWOW64\husrwr.exeC:\Windows\system32\husrwr.exe 924 "C:\Windows\SysWOW64\uhacqn.exe"57⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2876 -
C:\Windows\SysWOW64\moyhiv.exeC:\Windows\system32\moyhiv.exe 920 "C:\Windows\SysWOW64\husrwr.exe"58⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1128 -
C:\Windows\SysWOW64\wvkeau.exeC:\Windows\system32\wvkeau.exe 932 "C:\Windows\SysWOW64\moyhiv.exe"59⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1788 -
C:\Windows\SysWOW64\ipqulg.exeC:\Windows\system32\ipqulg.exe 944 "C:\Windows\SysWOW64\wvkeau.exe"60⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1768 -
C:\Windows\SysWOW64\wczkrk.exeC:\Windows\system32\wczkrk.exe 940 "C:\Windows\SysWOW64\ipqulg.exe"61⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3012 -
C:\Windows\SysWOW64\dvypge.exeC:\Windows\system32\dvypge.exe 936 "C:\Windows\SysWOW64\wczkrk.exe"62⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1524 -
C:\Windows\SysWOW64\qmbsxe.exeC:\Windows\system32\qmbsxe.exe 928 "C:\Windows\SysWOW64\dvypge.exe"63⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1364 -
C:\Windows\SysWOW64\dkwufm.exeC:\Windows\system32\dkwufm.exe 948 "C:\Windows\SysWOW64\qmbsxe.exe"64⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2764 -
C:\Windows\SysWOW64\mnlftp.exeC:\Windows\system32\mnlftp.exe 956 "C:\Windows\SysWOW64\dkwufm.exe"65⤵
- Executes dropped EXE
PID:2012 -
C:\Windows\SysWOW64\zprmec.exeC:\Windows\system32\zprmec.exe 952 "C:\Windows\SysWOW64\mnlftp.exe"66⤵PID:2816
-
C:\Windows\SysWOW64\mgupnc.exeC:\Windows\system32\mgupnc.exe 976 "C:\Windows\SysWOW64\zprmec.exe"67⤵PID:2480
-
C:\Windows\SysWOW64\bzrkwy.exeC:\Windows\system32\bzrkwy.exe 964 "C:\Windows\SysWOW64\mgupnc.exe"68⤵PID:2228
-
C:\Windows\SysWOW64\pmaacu.exeC:\Windows\system32\pmaacu.exe 972 "C:\Windows\SysWOW64\bzrkwy.exe"69⤵PID:2132
-
C:\Windows\SysWOW64\yabxab.exeC:\Windows\system32\yabxab.exe 968 "C:\Windows\SysWOW64\pmaacu.exe"70⤵PID:2268
-
C:\Windows\SysWOW64\lrwajj.exeC:\Windows\system32\lrwajj.exe 984 "C:\Windows\SysWOW64\yabxab.exe"71⤵PID:2856
-
C:\Windows\SysWOW64\ypzcrs.exeC:\Windows\system32\ypzcrs.exe 988 "C:\Windows\SysWOW64\lrwajj.exe"72⤵PID:2272
-
C:\Windows\SysWOW64\lgtxas.exeC:\Windows\system32\lgtxas.exe 960 "C:\Windows\SysWOW64\ypzcrs.exe"73⤵PID:1296
-
C:\Windows\SysWOW64\yiznle.exeC:\Windows\system32\yiznle.exe 992 "C:\Windows\SysWOW64\lgtxas.exe"74⤵
- System Location Discovery: System Language Discovery
PID:1480 -
C:\Windows\SysWOW64\ikpxzh.exeC:\Windows\system32\ikpxzh.exe 996 "C:\Windows\SysWOW64\yiznle.exe"75⤵PID:2100
-
C:\Windows\SysWOW64\vxgned.exeC:\Windows\system32\vxgned.exe 1000 "C:\Windows\SysWOW64\ikpxzh.exe"76⤵PID:908
-
C:\Windows\SysWOW64\fiwxag.exeC:\Windows\system32\fiwxag.exe 1008 "C:\Windows\SysWOW64\vxgned.exe"77⤵PID:984
-
C:\Windows\SysWOW64\ryraio.exeC:\Windows\system32\ryraio.exe 1012 "C:\Windows\SysWOW64\fiwxag.exe"78⤵PID:2528
-
C:\Windows\SysWOW64\extdrx.exeC:\Windows\system32\extdrx.exe 1004 "C:\Windows\SysWOW64\ryraio.exe"79⤵PID:2064
-
C:\Windows\SysWOW64\ozjnes.exeC:\Windows\system32\ozjnes.exe 1020 "C:\Windows\SysWOW64\extdrx.exe"80⤵PID:1716
-
C:\Windows\SysWOW64\bmsdsw.exeC:\Windows\system32\bmsdsw.exe 1016 "C:\Windows\SysWOW64\ozjnes.exe"81⤵PID:3064
-
C:\Windows\SysWOW64\lataid.exeC:\Windows\system32\lataid.exe 1028 "C:\Windows\SysWOW64\bmsdsw.exe"82⤵PID:2924
-
C:\Windows\SysWOW64\ynlqoh.exeC:\Windows\system32\ynlqoh.exe 1048 "C:\Windows\SysWOW64\lataid.exe"83⤵PID:2632
-
C:\Windows\SysWOW64\iyaabk.exeC:\Windows\system32\iyaabk.exe 1032 "C:\Windows\SysWOW64\ynlqoh.exe"84⤵
- System Location Discovery: System Language Discovery
PID:1984 -
C:\Windows\SysWOW64\sxeytj.exeC:\Windows\system32\sxeytj.exe 1040 "C:\Windows\SysWOW64\iyaabk.exe"85⤵PID:2324
-
C:\Windows\SysWOW64\fwhacj.exeC:\Windows\system32\fwhacj.exe 1036 "C:\Windows\SysWOW64\sxeytj.exe"86⤵PID:2508
-
C:\Windows\SysWOW64\pywlpm.exeC:\Windows\system32\pywlpm.exe 1052 "C:\Windows\SysWOW64\fwhacj.exe"87⤵PID:2988
-
C:\Windows\SysWOW64\cprnyu.exeC:\Windows\system32\cprnyu.exe 1044 "C:\Windows\SysWOW64\pywlpm.exe"88⤵PID:2440
-
C:\Windows\SysWOW64\pnuqgc.exeC:\Windows\system32\pnuqgc.exe 1060 "C:\Windows\SysWOW64\cprnyu.exe"89⤵PID:1044
-
C:\Windows\SysWOW64\chayah.exeC:\Windows\system32\chayah.exe 1056 "C:\Windows\SysWOW64\pnuqgc.exe"90⤵PID:2348
-
C:\Windows\SysWOW64\pcjvgl.exeC:\Windows\system32\pcjvgl.exe 1068 "C:\Windows\SysWOW64\chayah.exe"91⤵PID:3028
-
C:\Windows\SysWOW64\bwpdrp.exeC:\Windows\system32\bwpdrp.exe 1064 "C:\Windows\SysWOW64\pcjvgl.exe"92⤵PID:832
-
C:\Windows\SysWOW64\lhnoes.exeC:\Windows\system32\lhnoes.exe 1084 "C:\Windows\SysWOW64\bwpdrp.exe"93⤵PID:1532
-
C:\Windows\SysWOW64\ybtdqf.exeC:\Windows\system32\ybtdqf.exe 1080 "C:\Windows\SysWOW64\lhnoes.exe"94⤵PID:1228
-
C:\Windows\SysWOW64\lwctvj.exeC:\Windows\system32\lwctvj.exe 1072 "C:\Windows\SysWOW64\ybtdqf.exe"95⤵PID:2980
-
C:\Windows\SysWOW64\ymxwej.exeC:\Windows\system32\ymxwej.exe 1076 "C:\Windows\SysWOW64\lwctvj.exe"96⤵PID:2952
-
C:\Windows\SysWOW64\iaytcq.exeC:\Windows\system32\iaytcq.exe 1088 "C:\Windows\SysWOW64\ymxwej.exe"97⤵PID:2060
-
C:\Windows\SysWOW64\vnpjiu.exeC:\Windows\system32\vnpjiu.exe 1096 "C:\Windows\SysWOW64\iaytcq.exe"98⤵PID:2944
-
C:\Windows\SysWOW64\fqftvx.exeC:\Windows\system32\fqftvx.exe 980 "C:\Windows\SysWOW64\vnpjiu.exe"99⤵PID:1620
-
C:\Windows\SysWOW64\slwjbb.exeC:\Windows\system32\slwjbb.exe 1100 "C:\Windows\SysWOW64\fqftvx.exe"100⤵PID:1936
-
C:\Windows\SysWOW64\cnmtww.exeC:\Windows\system32\cnmtww.exe 1108 "C:\Windows\SysWOW64\slwjbb.exe"101⤵PID:1548
-
C:\Windows\SysWOW64\mybejz.exeC:\Windows\system32\mybejz.exe 1104 "C:\Windows\SysWOW64\cnmtww.exe"102⤵PID:2844
-
C:\Windows\SysWOW64\zlttpd.exeC:\Windows\system32\zlttpd.exe 1116 "C:\Windows\SysWOW64\mybejz.exe"103⤵
- System Location Discovery: System Language Discovery
PID:2040 -
C:\Windows\SysWOW64\mcowyl.exeC:\Windows\system32\mcowyl.exe 1112 "C:\Windows\SysWOW64\zlttpd.exe"104⤵PID:2052
-
C:\Windows\SysWOW64\wmdgto.exeC:\Windows\system32\wmdgto.exe 1124 "C:\Windows\SysWOW64\mcowyl.exe"105⤵PID:1880
-
C:\Windows\SysWOW64\bdyjcp.exeC:\Windows\system32\bdyjcp.exe 1120 "C:\Windows\SysWOW64\wmdgto.exe"106⤵PID:2016
-
C:\Windows\SysWOW64\otbmkx.exeC:\Windows\system32\otbmkx.exe 1132 "C:\Windows\SysWOW64\bdyjcp.exe"107⤵PID:1400
-
C:\Windows\SysWOW64\xhbbae.exeC:\Windows\system32\xhbbae.exe 1128 "C:\Windows\SysWOW64\otbmkx.exe"108⤵PID:1204
-
C:\Windows\SysWOW64\kgweje.exeC:\Windows\system32\kgweje.exe 1136 "C:\Windows\SysWOW64\xhbbae.exe"109⤵PID:2208
-
C:\Windows\SysWOW64\xwrhrm.exeC:\Windows\system32\xwrhrm.exe 1140 "C:\Windows\SysWOW64\kgweje.exe"110⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2592 -
C:\Windows\SysWOW64\hhgrnq.exeC:\Windows\system32\hhgrnq.exe 1144 "C:\Windows\SysWOW64\xwrhrm.exe"111⤵PID:1504
-
C:\Windows\SysWOW64\uxjuvy.exeC:\Windows\system32\uxjuvy.exe 1148 "C:\Windows\SysWOW64\hhgrnq.exe"112⤵PID:1500
-
C:\Windows\SysWOW64\gzpjhc.exeC:\Windows\system32\gzpjhc.exe 1152 "C:\Windows\SysWOW64\uxjuvy.exe"113⤵PID:2172
-
C:\Windows\SysWOW64\umzzmg.exeC:\Windows\system32\umzzmg.exe 1156 "C:\Windows\SysWOW64\gzpjhc.exe"114⤵PID:492
-
C:\Windows\SysWOW64\hdbcvo.exeC:\Windows\system32\hdbcvo.exe 1160 "C:\Windows\SysWOW64\umzzmg.exe"115⤵PID:2996
-
C:\Windows\SysWOW64\qrcrto.exeC:\Windows\system32\qrcrto.exe 1164 "C:\Windows\SysWOW64\hdbcvo.exe"116⤵
- Drops file in System32 directory
PID:2188 -
C:\Windows\SysWOW64\dhxucw.exeC:\Windows\system32\dhxucw.exe 1168 "C:\Windows\SysWOW64\qrcrto.exe"117⤵PID:1980
-
C:\Windows\SysWOW64\qjdjni.exeC:\Windows\system32\qjdjni.exe 1172 "C:\Windows\SysWOW64\dhxucw.exe"118⤵PID:2368
-
C:\Windows\SysWOW64\daymwi.exeC:\Windows\system32\daymwi.exe 1184 "C:\Windows\SysWOW64\qjdjni.exe"119⤵PID:2708
-
C:\Windows\SysWOW64\qvpcbm.exeC:\Windows\system32\qvpcbm.exe 1176 "C:\Windows\SysWOW64\daymwi.exe"120⤵PID:1564
-
C:\Windows\SysWOW64\axfmpp.exeC:\Windows\system32\axfmpp.exe 1180 "C:\Windows\SysWOW64\qvpcbm.exe"121⤵PID:1560
-
C:\Windows\SysWOW64\mzlcic.exeC:\Windows\system32\mzlcic.exe 1188 "C:\Windows\SysWOW64\axfmpp.exe"122⤵
- System Location Discovery: System Language Discovery
PID:2644
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-