Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 18:10
Static task
static1
Behavioral task
behavioral1
Sample
c95957329509e85be203b997a0ee87e9_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c95957329509e85be203b997a0ee87e9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c95957329509e85be203b997a0ee87e9_JaffaCakes118.exe
-
Size
20KB
-
MD5
c95957329509e85be203b997a0ee87e9
-
SHA1
23dc500e1216165a56e6e073ba9601a89679f321
-
SHA256
84e1bdbb0fa818eaf49ac20f64496bbe4e2eee422f76a5c81a26db26825b9fb5
-
SHA512
526fb075391a453572130a7fa3d967222e60e26c20af3ca011ad8c3155edfcfab2b8dc090d8e2fe90a44ca36c2dd749d89fcc5b36b3bbeaebbe4cce938322326
-
SSDEEP
384:9860X2vDB5ygyn1dpgubknUdzItKkdiF3ymWYKnIo72YaSAUMsoeAGzPo+:SNX2952n5n0+zy4FYnLqYaSbMmpPf
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3136 kcien32.exe 5036 kcien32.exe 2216 kcien32.exe 840 kcien32.exe 3900 kcien32.exe 3932 kcien32.exe 3580 kcien32.exe 4808 kcien32.exe 4136 kcien32.exe 3304 kcien32.exe 4904 kcien32.exe 1824 kcien32.exe 1188 kcien32.exe 3684 kcien32.exe 1728 kcien32.exe 4836 kcien32.exe 2024 kcien32.exe 4624 kcien32.exe 1008 kcien32.exe 4592 kcien32.exe 4548 kcien32.exe 2756 kcien32.exe 4408 kcien32.exe 3912 kcien32.exe 3984 kcien32.exe 3784 kcien32.exe 1976 kcien32.exe 3396 kcien32.exe 3048 kcien32.exe 3204 kcien32.exe 3692 kcien32.exe 816 kcien32.exe 3160 kcien32.exe 212 kcien32.exe 64 kcien32.exe 808 kcien32.exe 3628 kcien32.exe 3840 kcien32.exe 1832 kcien32.exe 4788 kcien32.exe 2568 kcien32.exe 1092 kcien32.exe 1912 kcien32.exe 4272 kcien32.exe 4460 kcien32.exe 1380 kcien32.exe 1300 kcien32.exe 1472 kcien32.exe 2360 kcien32.exe 2024 kcien32.exe 2144 kcien32.exe 1816 kcien32.exe 4000 kcien32.exe 4504 kcien32.exe 4520 kcien32.exe 4376 kcien32.exe 4408 kcien32.exe 1404 kcien32.exe 5092 kcien32.exe 4356 kcien32.exe 4856 kcien32.exe 3624 kcien32.exe 2320 kcien32.exe 1576 kcien32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\kcien32.exe kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.exe kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.exe kcien32.exe File created C:\Windows\SysWOW64\kcien32.exe kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.exe kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.exe kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.ini kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.exe kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.exe kcien32.exe File created C:\Windows\SysWOW64\kcien32.exe kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.ini kcien32.exe File created C:\Windows\SysWOW64\kcien32.exe kcien32.exe File created C:\Windows\SysWOW64\kcien32.exe kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.exe kcien32.exe File created C:\Windows\SysWOW64\kcien32.exe kcien32.exe File created C:\Windows\SysWOW64\kcien32.exe kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.ini kcien32.exe File created C:\Windows\SysWOW64\kcien32.exe kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.exe kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.exe kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.ini kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.exe kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.ini kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.ini kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.ini kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.ini kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.exe kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.ini kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.ini kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.exe kcien32.exe File created C:\Windows\SysWOW64\kcien32.exe kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.ini kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.ini kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.ini kcien32.exe File created C:\Windows\SysWOW64\kcien32.exe kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.ini kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.exe kcien32.exe File created C:\Windows\SysWOW64\kcien32.exe kcien32.exe File created C:\Windows\SysWOW64\kcien32.exe kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.exe kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.ini kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.exe kcien32.exe File created C:\Windows\SysWOW64\kcien32.exe kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.exe kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.exe kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.ini kcien32.exe File created C:\Windows\SysWOW64\kcien32.exe kcien32.exe File created C:\Windows\SysWOW64\kcien32.exe kcien32.exe File created C:\Windows\SysWOW64\kcien32.exe kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.exe kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.exe kcien32.exe File created C:\Windows\SysWOW64\kcien32.exe kcien32.exe File created C:\Windows\SysWOW64\kcien32.exe kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.ini kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.ini kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.ini kcien32.exe File created C:\Windows\SysWOW64\kcien32.exe kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.exe kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.ini kcien32.exe File opened for modification C:\Windows\SysWOW64\kcien32.exe kcien32.exe File created C:\Windows\SysWOW64\kcien32.exe kcien32.exe File created C:\Windows\SysWOW64\kcien32.exe kcien32.exe File created C:\Windows\SysWOW64\kcien32.exe kcien32.exe File created C:\Windows\SysWOW64\kcien32.exe kcien32.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcien32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1404 wrote to memory of 3136 1404 c95957329509e85be203b997a0ee87e9_JaffaCakes118.exe 85 PID 1404 wrote to memory of 3136 1404 c95957329509e85be203b997a0ee87e9_JaffaCakes118.exe 85 PID 1404 wrote to memory of 3136 1404 c95957329509e85be203b997a0ee87e9_JaffaCakes118.exe 85 PID 3136 wrote to memory of 5036 3136 kcien32.exe 88 PID 3136 wrote to memory of 5036 3136 kcien32.exe 88 PID 3136 wrote to memory of 5036 3136 kcien32.exe 88 PID 5036 wrote to memory of 2216 5036 kcien32.exe 89 PID 5036 wrote to memory of 2216 5036 kcien32.exe 89 PID 5036 wrote to memory of 2216 5036 kcien32.exe 89 PID 2216 wrote to memory of 840 2216 kcien32.exe 90 PID 2216 wrote to memory of 840 2216 kcien32.exe 90 PID 2216 wrote to memory of 840 2216 kcien32.exe 90 PID 840 wrote to memory of 3900 840 kcien32.exe 91 PID 840 wrote to memory of 3900 840 kcien32.exe 91 PID 840 wrote to memory of 3900 840 kcien32.exe 91 PID 3900 wrote to memory of 3932 3900 kcien32.exe 92 PID 3900 wrote to memory of 3932 3900 kcien32.exe 92 PID 3900 wrote to memory of 3932 3900 kcien32.exe 92 PID 3932 wrote to memory of 3580 3932 kcien32.exe 93 PID 3932 wrote to memory of 3580 3932 kcien32.exe 93 PID 3932 wrote to memory of 3580 3932 kcien32.exe 93 PID 3580 wrote to memory of 4808 3580 kcien32.exe 95 PID 3580 wrote to memory of 4808 3580 kcien32.exe 95 PID 3580 wrote to memory of 4808 3580 kcien32.exe 95 PID 4808 wrote to memory of 4136 4808 kcien32.exe 96 PID 4808 wrote to memory of 4136 4808 kcien32.exe 96 PID 4808 wrote to memory of 4136 4808 kcien32.exe 96 PID 4136 wrote to memory of 3304 4136 kcien32.exe 97 PID 4136 wrote to memory of 3304 4136 kcien32.exe 97 PID 4136 wrote to memory of 3304 4136 kcien32.exe 97 PID 3304 wrote to memory of 4904 3304 kcien32.exe 98 PID 3304 wrote to memory of 4904 3304 kcien32.exe 98 PID 3304 wrote to memory of 4904 3304 kcien32.exe 98 PID 4904 wrote to memory of 1824 4904 kcien32.exe 99 PID 4904 wrote to memory of 1824 4904 kcien32.exe 99 PID 4904 wrote to memory of 1824 4904 kcien32.exe 99 PID 1824 wrote to memory of 1188 1824 kcien32.exe 100 PID 1824 wrote to memory of 1188 1824 kcien32.exe 100 PID 1824 wrote to memory of 1188 1824 kcien32.exe 100 PID 1188 wrote to memory of 3684 1188 kcien32.exe 103 PID 1188 wrote to memory of 3684 1188 kcien32.exe 103 PID 1188 wrote to memory of 3684 1188 kcien32.exe 103 PID 3684 wrote to memory of 1728 3684 kcien32.exe 104 PID 3684 wrote to memory of 1728 3684 kcien32.exe 104 PID 3684 wrote to memory of 1728 3684 kcien32.exe 104 PID 1728 wrote to memory of 4836 1728 kcien32.exe 105 PID 1728 wrote to memory of 4836 1728 kcien32.exe 105 PID 1728 wrote to memory of 4836 1728 kcien32.exe 105 PID 4836 wrote to memory of 2024 4836 kcien32.exe 106 PID 4836 wrote to memory of 2024 4836 kcien32.exe 106 PID 4836 wrote to memory of 2024 4836 kcien32.exe 106 PID 2024 wrote to memory of 4624 2024 kcien32.exe 107 PID 2024 wrote to memory of 4624 2024 kcien32.exe 107 PID 2024 wrote to memory of 4624 2024 kcien32.exe 107 PID 4624 wrote to memory of 1008 4624 kcien32.exe 109 PID 4624 wrote to memory of 1008 4624 kcien32.exe 109 PID 4624 wrote to memory of 1008 4624 kcien32.exe 109 PID 1008 wrote to memory of 4592 1008 kcien32.exe 111 PID 1008 wrote to memory of 4592 1008 kcien32.exe 111 PID 1008 wrote to memory of 4592 1008 kcien32.exe 111 PID 4592 wrote to memory of 4548 4592 kcien32.exe 112 PID 4592 wrote to memory of 4548 4592 kcien32.exe 112 PID 4592 wrote to memory of 4548 4592 kcien32.exe 112 PID 4548 wrote to memory of 2756 4548 kcien32.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\c95957329509e85be203b997a0ee87e9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c95957329509e85be203b997a0ee87e9_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe23⤵
- Executes dropped EXE
PID:2756 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe24⤵
- Executes dropped EXE
PID:4408 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe25⤵
- Executes dropped EXE
PID:3912 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe26⤵
- Executes dropped EXE
PID:3984 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe27⤵
- Executes dropped EXE
PID:3784 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe28⤵
- Executes dropped EXE
PID:1976 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe29⤵
- Executes dropped EXE
PID:3396 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe30⤵
- Executes dropped EXE
PID:3048 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe31⤵
- Executes dropped EXE
PID:3204 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe32⤵
- Executes dropped EXE
PID:3692 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe33⤵
- Executes dropped EXE
PID:816 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe34⤵
- Executes dropped EXE
PID:3160 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe35⤵
- Executes dropped EXE
PID:212 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe36⤵
- Executes dropped EXE
PID:64 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:808 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe38⤵
- Executes dropped EXE
PID:3628 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe39⤵
- Executes dropped EXE
PID:3840 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe40⤵
- Executes dropped EXE
PID:1832 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe41⤵
- Executes dropped EXE
PID:4788 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe42⤵
- Executes dropped EXE
PID:2568 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe43⤵
- Executes dropped EXE
PID:1092 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe44⤵
- Executes dropped EXE
PID:1912 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4272 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe46⤵
- Executes dropped EXE
PID:4460 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe47⤵
- Executes dropped EXE
PID:1380 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe48⤵
- Executes dropped EXE
PID:1300 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe49⤵
- Executes dropped EXE
PID:1472 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe50⤵
- Executes dropped EXE
PID:2360 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2024 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe52⤵
- Executes dropped EXE
PID:2144 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe53⤵
- Executes dropped EXE
PID:1816 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe54⤵
- Executes dropped EXE
PID:4000 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe55⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4504 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe56⤵
- Executes dropped EXE
PID:4520 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe57⤵
- Executes dropped EXE
PID:4376 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe58⤵
- Executes dropped EXE
PID:4408 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe59⤵
- Executes dropped EXE
PID:1404 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe60⤵
- Executes dropped EXE
PID:5092 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe61⤵
- Executes dropped EXE
PID:4356 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe62⤵
- Executes dropped EXE
PID:4856 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe63⤵
- Executes dropped EXE
PID:3624 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe64⤵
- Executes dropped EXE
PID:2320 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe65⤵
- Executes dropped EXE
PID:1576 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe66⤵
- System Location Discovery: System Language Discovery
PID:1960 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe67⤵
- Drops file in System32 directory
PID:4256 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe68⤵PID:3020
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe69⤵
- System Location Discovery: System Language Discovery
PID:4764 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe70⤵PID:3176
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe71⤵PID:64
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe72⤵PID:808
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe73⤵PID:944
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe74⤵PID:2652
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe75⤵PID:4136
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe76⤵PID:3156
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe77⤵PID:5080
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe78⤵PID:4756
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe79⤵PID:1592
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe80⤵PID:3040
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe81⤵PID:3228
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe82⤵PID:3684
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe83⤵PID:3124
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe84⤵PID:3904
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe85⤵
- Drops file in System32 directory
PID:628 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe86⤵PID:3500
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe87⤵PID:2116
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe88⤵PID:1620
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe89⤵
- Drops file in System32 directory
PID:4632 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe90⤵PID:4548
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe91⤵PID:4040
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe92⤵PID:4392
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe93⤵PID:2140
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe94⤵PID:2660
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe95⤵PID:1172
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe96⤵PID:552
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe97⤵PID:1976
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe98⤵PID:2760
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe99⤵PID:1676
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe100⤵
- Drops file in System32 directory
PID:2196 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe101⤵PID:3204
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe102⤵PID:3200
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe103⤵
- Drops file in System32 directory
PID:1288 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe104⤵PID:3324
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe105⤵PID:3376
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe106⤵PID:3436
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe107⤵
- Drops file in System32 directory
PID:3996 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe108⤵PID:716
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe109⤵PID:64
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe110⤵PID:808
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe111⤵
- Drops file in System32 directory
PID:1136 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe112⤵PID:1832
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe113⤵PID:4444
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe114⤵PID:2616
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe115⤵PID:4224
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe116⤵PID:2084
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe117⤵PID:2848
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe118⤵
- System Location Discovery: System Language Discovery
PID:2292 -
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe119⤵PID:4780
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe120⤵PID:1728
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe121⤵PID:4836
-
C:\Windows\SysWOW64\kcien32.exeC:\Windows\system32\kcien32.exe122⤵PID:4692
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-