Analysis
-
max time kernel
119s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 12:52
Static task
static1
Behavioral task
behavioral1
Sample
56c85d262f202a73935e00423a524600N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
56c85d262f202a73935e00423a524600N.exe
Resource
win10v2004-20240802-en
General
-
Target
56c85d262f202a73935e00423a524600N.exe
-
Size
208KB
-
MD5
56c85d262f202a73935e00423a524600
-
SHA1
2d29902cade3aedb92f60118217bde5d828f0234
-
SHA256
503f1b432f933c9c7a78687d3bb7a2e535b55b496785e3b0a92aff9326f9f176
-
SHA512
fd8d52d33030afaab17a5158df5939142535f152b1af77d7b224f83f41199ee3703fe02f0efb716e5651aa71ca9b8d5265772d5d6bcea1fe9614355bb1812454
-
SSDEEP
6144:TMAsW/uBFMhofrmKv6J3iMsd/xZ9qFD6ZyOY90dQEj:YbZg3ALkObQ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation TGESJEC.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation SQWZPJA.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation YTLNX.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation MLYGCYK.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation CQOUFLC.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation ENPWLI.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation NVTWL.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation UJVNUNO.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation WWCVB.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation WBEDWU.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation AXORVPO.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation GKJA.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation API.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation MLIFWK.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation ZKBFWGA.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation GTNL.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation JGYPY.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation TJZAH.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation VTVA.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation UYZ.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation WCUJDP.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation UXGO.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation TYBELTH.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation JSQQMFK.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation RWMMJ.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation BNE.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation COAMS.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation XDWNNO.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation CJX.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation 56c85d262f202a73935e00423a524600N.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation RSTMG.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation KBXM.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation YAYTDH.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation OYNTU.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation HHOSK.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation KOX.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation XBFVCFN.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation DDGA.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation HHUNPJU.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation XYJOW.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation ELVO.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation LXKZDAG.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation KNCFQB.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation RQV.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation VFYNZ.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation GKDZQXQ.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation OYXSZCL.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation NPUGH.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation KNPNK.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation XRUWVMJ.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation FQYL.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation PLEOV.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation XYT.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation QZKOK.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation NCJB.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation DGBWB.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation DTGEK.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation RKQJGW.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation OYSRCJ.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation JSBLDPX.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation VRHSYGV.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation UKFAMU.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation XTISY.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation QVGZFRI.exe -
Executes dropped EXE 64 IoCs
pid Process 5112 ICQJ.exe 2928 AFIU.exe 2020 RSTMG.exe 2428 NQRJNK.exe 624 XYT.exe 1048 KBXM.exe 4404 TJZAH.exe 1832 JEI.exe 2656 DRNND.exe 4296 HHUNPJU.exe 5020 NVTWL.exe 2540 OYXSZCL.exe 464 DTGEK.exe 1512 YOLOUO.exe 2164 SBQ.exe 4452 NPUGH.exe 2076 JUADOYO.exe 1620 YAYTDH.exe 1376 JSBLDPX.exe 4936 ATDQ.exe 3556 XYJOW.exe 1720 BGQ.exe 1588 KPSB.exe 3112 ZKBFWGA.exe 5024 UXGO.exe 3260 CCYDI.exe 4048 GTNL.exe 1788 IQGFBAO.exe 4212 ORNTK.exe 3196 BTW.exe 4444 DRX.exe 3020 FPD.exe 4656 UFEF.exe 5060 IQUE.exe 4332 TYBELTH.exe 4936 DGD.exe 2476 XTISY.exe 1720 FMIUM.exe 4448 FSIIOQ.exe 464 FCR.exe 4732 QVMV.exe 3592 KNPNK.exe 668 JGYPY.exe 628 VYBIGCX.exe 3120 EZV.exe 4672 MRD.exe 1984 QZKOK.exe 4016 ZIMT.exe 728 OYNTU.exe 3592 NNGOHC.exe 5088 AYCUM.exe 232 VMHDWT.exe 3540 VRHSYGV.exe 2708 HHOSK.exe 2368 LPUAWJF.exe 4208 LVVOY.exe 4440 FQZYIW.exe 960 JYGY.exe 896 YTPKFBT.exe 2336 KMSVNI.exe 3832 WCZDS.exe 464 QPEMCAL.exe 2292 BIZ.exe 456 LIBKO.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\windows\SysWOW64\DRNND.exe JEI.exe File opened for modification C:\windows\SysWOW64\CVJLHMM.exe IIFBX.exe File created C:\windows\SysWOW64\API.exe.bat PMJ.exe File created C:\windows\SysWOW64\KNI.exe.bat PAESKD.exe File created C:\windows\SysWOW64\QVMV.exe FCR.exe File created C:\windows\SysWOW64\VMHDWT.exe.bat AYCUM.exe File created C:\windows\SysWOW64\HYTGHU.exe.bat VFYNZ.exe File opened for modification C:\windows\SysWOW64\KNCFQB.exe RKYJ.exe File created C:\windows\SysWOW64\API.exe PMJ.exe File opened for modification C:\windows\SysWOW64\AXCNWF.exe UKD.exe File created C:\windows\SysWOW64\UXGO.exe ZKBFWGA.exe File created C:\windows\SysWOW64\ZIMT.exe.bat QZKOK.exe File opened for modification C:\windows\SysWOW64\LPUAWJF.exe HHOSK.exe File created C:\windows\SysWOW64\OYSRCJ.exe.bat FQYL.exe File opened for modification C:\windows\SysWOW64\HOLFC.exe BNE.exe File created C:\windows\SysWOW64\IIFBX.exe GKDZQXQ.exe File created C:\windows\SysWOW64\FQOU.exe CVJLHMM.exe File created C:\windows\SysWOW64\XPGHW.exe.bat LXLO.exe File created C:\windows\SysWOW64\AFIU.exe.bat ICQJ.exe File created C:\windows\SysWOW64\DRNND.exe.bat JEI.exe File created C:\windows\SysWOW64\VMHDWT.exe AYCUM.exe File created C:\windows\SysWOW64\LRKL.exe PLEOV.exe File created C:\windows\SysWOW64\AFIU.exe ICQJ.exe File created C:\windows\SysWOW64\LPUAWJF.exe HHOSK.exe File created C:\windows\SysWOW64\WBEDWU.exe.bat LIBKO.exe File opened for modification C:\windows\SysWOW64\LRKL.exe PLEOV.exe File created C:\windows\SysWOW64\CVJLHMM.exe IIFBX.exe File created C:\windows\SysWOW64\XYT.exe.bat NQRJNK.exe File created C:\windows\SysWOW64\KPSB.exe.bat BGQ.exe File created C:\windows\SysWOW64\GTNL.exe.bat CCYDI.exe File created C:\windows\SysWOW64\XTISY.exe DGD.exe File created C:\windows\SysWOW64\AXORVPO.exe RWMMJ.exe File created C:\windows\SysWOW64\KNCFQB.exe RKYJ.exe File created C:\windows\SysWOW64\XPGHW.exe LXLO.exe File opened for modification C:\windows\SysWOW64\TJZAH.exe KBXM.exe File created C:\windows\SysWOW64\GTNL.exe CCYDI.exe File opened for modification C:\windows\SysWOW64\MRD.exe EZV.exe File created C:\windows\SysWOW64\BNE.exe KNCFQB.exe File opened for modification C:\windows\SysWOW64\UKD.exe DWTUJFY.exe File opened for modification C:\windows\SysWOW64\YAYTDH.exe JUADOYO.exe File opened for modification C:\windows\SysWOW64\IQUE.exe UFEF.exe File created C:\windows\SysWOW64\RKYJ.exe.bat AXORVPO.exe File created C:\windows\SysWOW64\RWNKOG.exe.bat HOLFC.exe File created C:\windows\SysWOW64\AXCNWF.exe UKD.exe File opened for modification C:\windows\SysWOW64\VMHDWT.exe AYCUM.exe File opened for modification C:\windows\SysWOW64\QPEMCAL.exe WCZDS.exe File opened for modification C:\windows\SysWOW64\BIZ.exe QPEMCAL.exe File created C:\windows\SysWOW64\ENPWLI.exe.bat CQOUFLC.exe File created C:\windows\SysWOW64\FBBUF.exe KOX.exe File created C:\windows\SysWOW64\HYTGHU.exe VFYNZ.exe File created C:\windows\SysWOW64\PMJ.exe.bat JLB.exe File opened for modification C:\windows\SysWOW64\RVZSGNO.exe NFSS.exe File opened for modification C:\windows\SysWOW64\EANTE.exe KNI.exe File created C:\windows\SysWOW64\UKD.exe DWTUJFY.exe File created C:\windows\SysWOW64\AXCNWF.exe.bat UKD.exe File created C:\windows\SysWOW64\OYXSZCL.exe NVTWL.exe File created C:\windows\SysWOW64\AXORVPO.exe.bat RWMMJ.exe File created C:\windows\SysWOW64\KNCFQB.exe.bat RKYJ.exe File created C:\windows\SysWOW64\LPUAWJF.exe.bat HHOSK.exe File created C:\windows\SysWOW64\TGESJEC.exe.bat ELVO.exe File created C:\windows\SysWOW64\CBS.exe.bat YTLNX.exe File created C:\windows\SysWOW64\IIFBX.exe.bat GKDZQXQ.exe File opened for modification C:\windows\SysWOW64\OYSRCJ.exe FQYL.exe File created C:\windows\SysWOW64\MXFRJAW.exe XCVN.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\windows\system\RWMMJ.exe.bat GERT.exe File opened for modification C:\windows\MLYGCYK.exe FQOU.exe File created C:\windows\TYBELTH.exe IQUE.exe File created C:\windows\system\UFIDA.exe.bat UKFAMU.exe File created C:\windows\system\JSQQMFK.exe DSICD.exe File opened for modification C:\windows\PLEOV.exe UYZ.exe File created C:\windows\PLEOV.exe.bat UYZ.exe File created C:\windows\KNPNK.exe.bat QVMV.exe File created C:\windows\SQWZPJA.exe.bat HYTGHU.exe File opened for modification C:\windows\system\XCVN.exe GRXP.exe File created C:\windows\system\LIBKO.exe BIZ.exe File created C:\windows\ZCCURSN.exe ARLERYR.exe File created C:\windows\system\LXKZDAG.exe.bat LRKL.exe File created C:\windows\system\CCNZJ.exe.bat API.exe File opened for modification C:\windows\KOX.exe ENPWLI.exe File opened for modification C:\windows\system\NFSS.exe EEQNQX.exe File opened for modification C:\windows\PAESKD.exe LKXS.exe File created C:\windows\system\DTGEK.exe.bat OYXSZCL.exe File created C:\windows\EZV.exe.bat VYBIGCX.exe File created C:\windows\HHOSK.exe.bat VRHSYGV.exe File created C:\windows\PLEOV.exe UYZ.exe File opened for modification C:\windows\system\TPJQRR.exe EMA.exe File created C:\windows\AYCUM.exe NNGOHC.exe File opened for modification C:\windows\WCZDS.exe KMSVNI.exe File created C:\windows\system\LENH.exe.bat WBEDWU.exe File created C:\windows\system\CCNZJ.exe API.exe File opened for modification C:\windows\system\ORNTK.exe IQGFBAO.exe File created C:\windows\WCZDS.exe.bat KMSVNI.exe File created C:\windows\system\KCDVJ.exe XRUWVMJ.exe File created C:\windows\system\FBFPV.exe.bat SQWZPJA.exe File opened for modification C:\windows\JLB.exe YTGFLGD.exe File created C:\windows\system\YOLOUO.exe DTGEK.exe File opened for modification C:\windows\system\UFEF.exe FPD.exe File created C:\windows\system\VFYNZ.exe EAOV.exe File opened for modification C:\windows\WCUJDP.exe WWCVB.exe File created C:\windows\system\DWTUJFY.exe FBBUF.exe File opened for modification C:\windows\KBXM.exe XYT.exe File opened for modification C:\windows\system\FQZYIW.exe LVVOY.exe File created C:\windows\system\KCDVJ.exe.bat XRUWVMJ.exe File created C:\windows\system\LXKZDAG.exe LRKL.exe File created C:\windows\SQWZPJA.exe HYTGHU.exe File opened for modification C:\windows\UJVNUNO.exe NGLI.exe File opened for modification C:\windows\system\ICQJ.exe 56c85d262f202a73935e00423a524600N.exe File opened for modification C:\windows\HHUNPJU.exe DRNND.exe File created C:\windows\FMIUM.exe.bat XTISY.exe File opened for modification C:\windows\system\LVVOY.exe LPUAWJF.exe File created C:\windows\system\EEQNQX.exe OJH.exe File opened for modification C:\windows\GRXP.exe RWNKOG.exe File opened for modification C:\windows\XDWNNO.exe LVQF.exe File opened for modification C:\windows\system\COAMS.exe XDWNNO.exe File created C:\windows\KOX.exe.bat ENPWLI.exe File created C:\windows\JEI.exe TJZAH.exe File opened for modification C:\windows\TYBELTH.exe IQUE.exe File created C:\windows\UYZ.exe.bat OYSRCJ.exe File created C:\windows\EAOV.exe.bat LXKZDAG.exe File opened for modification C:\windows\GERT.exe FBFPV.exe File created C:\windows\FPD.exe.bat DRX.exe File opened for modification C:\windows\KNPNK.exe QVMV.exe File created C:\windows\VYBIGCX.exe.bat JGYPY.exe File created C:\windows\HHOSK.exe VRHSYGV.exe File opened for modification C:\windows\system\ARLERYR.exe REBM.exe File created C:\windows\system\CQOUFLC.exe.bat XPGHW.exe File created C:\windows\system\NPUGH.exe SBQ.exe File created C:\windows\system\ORNTK.exe.bat IQGFBAO.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Program crash 64 IoCs
pid pid_target Process procid_target 3680 728 WerFault.exe 82 2384 5112 WerFault.exe 90 5072 2928 WerFault.exe 96 456 2020 WerFault.exe 101 2540 2428 WerFault.exe 108 3248 624 WerFault.exe 114 232 1048 WerFault.exe 120 1152 4404 WerFault.exe 125 3328 1832 WerFault.exe 130 3996 2656 WerFault.exe 136 5016 4296 WerFault.exe 141 4044 5020 WerFault.exe 146 4016 2540 WerFault.exe 150 1248 464 WerFault.exe 158 4556 1512 WerFault.exe 163 5072 2164 WerFault.exe 168 1580 4452 WerFault.exe 173 2936 2076 WerFault.exe 177 4800 1620 WerFault.exe 183 2112 1376 WerFault.exe 188 4172 4936 WerFault.exe 193 3104 3556 WerFault.exe 198 5016 1720 WerFault.exe 203 4296 1588 WerFault.exe 208 1800 3112 WerFault.exe 213 4076 5024 WerFault.exe 218 4776 3260 WerFault.exe 223 1868 4048 WerFault.exe 228 1496 1788 WerFault.exe 233 2656 4212 WerFault.exe 238 3424 3196 WerFault.exe 243 3248 4444 WerFault.exe 248 3392 3020 WerFault.exe 253 1608 4656 WerFault.exe 258 4604 5060 WerFault.exe 263 2772 4332 WerFault.exe 268 2656 4936 WerFault.exe 273 4256 2476 WerFault.exe 278 4700 1720 WerFault.exe 283 2520 4448 WerFault.exe 288 972 464 WerFault.exe 294 4208 4732 WerFault.exe 299 2948 3592 WerFault.exe 304 1644 668 WerFault.exe 309 5020 628 WerFault.exe 314 2572 3120 WerFault.exe 319 4520 4672 WerFault.exe 325 4756 1984 WerFault.exe 330 4172 4016 WerFault.exe 335 2968 728 WerFault.exe 340 3000 3592 WerFault.exe 345 448 5088 WerFault.exe 350 4456 232 WerFault.exe 355 3300 3540 WerFault.exe 360 4776 2708 WerFault.exe 365 4476 2368 WerFault.exe 370 2844 4208 WerFault.exe 375 3196 4440 WerFault.exe 380 1612 960 WerFault.exe 385 4800 896 WerFault.exe 389 4884 2336 WerFault.exe 395 4104 3832 WerFault.exe 400 4512 464 WerFault.exe 405 3168 2292 WerFault.exe 410 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VTVA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VMHDWT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FMIUM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REBM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LXKZDAG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 56c85d262f202a73935e00423a524600N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KPSB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CQOUFLC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OYNTU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RKQJGW.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LJUTNV.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GERT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MLYGCYK.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DSICD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TJZAH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JUADOYO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DGBWB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WCUJDP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XRUWVMJ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UKD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PAESKD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AEEX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IKWL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CCYDI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JGYPY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UYZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OJH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ENPWLI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PLEOV.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EAOV.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UJVNUNO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YAYTDH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 728 56c85d262f202a73935e00423a524600N.exe 728 56c85d262f202a73935e00423a524600N.exe 5112 ICQJ.exe 5112 ICQJ.exe 2928 AFIU.exe 2928 AFIU.exe 2020 RSTMG.exe 2020 RSTMG.exe 2428 NQRJNK.exe 2428 NQRJNK.exe 624 XYT.exe 624 XYT.exe 1048 KBXM.exe 1048 KBXM.exe 4404 TJZAH.exe 4404 TJZAH.exe 1832 JEI.exe 1832 JEI.exe 2656 DRNND.exe 2656 DRNND.exe 4296 HHUNPJU.exe 4296 HHUNPJU.exe 5020 NVTWL.exe 5020 NVTWL.exe 2540 OYXSZCL.exe 2540 OYXSZCL.exe 464 DTGEK.exe 464 DTGEK.exe 1512 YOLOUO.exe 1512 YOLOUO.exe 2164 SBQ.exe 2164 SBQ.exe 4452 NPUGH.exe 4452 NPUGH.exe 2076 JUADOYO.exe 2076 JUADOYO.exe 1620 YAYTDH.exe 1620 YAYTDH.exe 1376 JSBLDPX.exe 1376 JSBLDPX.exe 4936 ATDQ.exe 4936 ATDQ.exe 3556 XYJOW.exe 3556 XYJOW.exe 1720 BGQ.exe 1720 BGQ.exe 1588 KPSB.exe 1588 KPSB.exe 3112 ZKBFWGA.exe 3112 ZKBFWGA.exe 5024 UXGO.exe 5024 UXGO.exe 3260 CCYDI.exe 3260 CCYDI.exe 4048 GTNL.exe 4048 GTNL.exe 1788 IQGFBAO.exe 1788 IQGFBAO.exe 4212 ORNTK.exe 4212 ORNTK.exe 3196 BTW.exe 3196 BTW.exe 4444 DRX.exe 4444 DRX.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 728 56c85d262f202a73935e00423a524600N.exe 728 56c85d262f202a73935e00423a524600N.exe 5112 ICQJ.exe 5112 ICQJ.exe 2928 AFIU.exe 2928 AFIU.exe 2020 RSTMG.exe 2020 RSTMG.exe 2428 NQRJNK.exe 2428 NQRJNK.exe 624 XYT.exe 624 XYT.exe 1048 KBXM.exe 1048 KBXM.exe 4404 TJZAH.exe 4404 TJZAH.exe 1832 JEI.exe 1832 JEI.exe 2656 DRNND.exe 2656 DRNND.exe 4296 HHUNPJU.exe 4296 HHUNPJU.exe 5020 NVTWL.exe 5020 NVTWL.exe 2540 OYXSZCL.exe 2540 OYXSZCL.exe 464 DTGEK.exe 464 DTGEK.exe 1512 YOLOUO.exe 1512 YOLOUO.exe 2164 SBQ.exe 2164 SBQ.exe 4452 NPUGH.exe 4452 NPUGH.exe 2076 JUADOYO.exe 2076 JUADOYO.exe 1620 YAYTDH.exe 1620 YAYTDH.exe 1376 JSBLDPX.exe 1376 JSBLDPX.exe 4936 ATDQ.exe 4936 ATDQ.exe 3556 XYJOW.exe 3556 XYJOW.exe 1720 BGQ.exe 1720 BGQ.exe 1588 KPSB.exe 1588 KPSB.exe 3112 ZKBFWGA.exe 3112 ZKBFWGA.exe 5024 UXGO.exe 5024 UXGO.exe 3260 CCYDI.exe 3260 CCYDI.exe 4048 GTNL.exe 4048 GTNL.exe 1788 IQGFBAO.exe 1788 IQGFBAO.exe 4212 ORNTK.exe 4212 ORNTK.exe 3196 BTW.exe 3196 BTW.exe 4444 DRX.exe 4444 DRX.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 728 wrote to memory of 1088 728 56c85d262f202a73935e00423a524600N.exe 86 PID 728 wrote to memory of 1088 728 56c85d262f202a73935e00423a524600N.exe 86 PID 728 wrote to memory of 1088 728 56c85d262f202a73935e00423a524600N.exe 86 PID 1088 wrote to memory of 5112 1088 cmd.exe 90 PID 1088 wrote to memory of 5112 1088 cmd.exe 90 PID 1088 wrote to memory of 5112 1088 cmd.exe 90 PID 5112 wrote to memory of 3652 5112 ICQJ.exe 92 PID 5112 wrote to memory of 3652 5112 ICQJ.exe 92 PID 5112 wrote to memory of 3652 5112 ICQJ.exe 92 PID 3652 wrote to memory of 2928 3652 cmd.exe 96 PID 3652 wrote to memory of 2928 3652 cmd.exe 96 PID 3652 wrote to memory of 2928 3652 cmd.exe 96 PID 2928 wrote to memory of 1900 2928 AFIU.exe 97 PID 2928 wrote to memory of 1900 2928 AFIU.exe 97 PID 2928 wrote to memory of 1900 2928 AFIU.exe 97 PID 1900 wrote to memory of 2020 1900 cmd.exe 101 PID 1900 wrote to memory of 2020 1900 cmd.exe 101 PID 1900 wrote to memory of 2020 1900 cmd.exe 101 PID 2020 wrote to memory of 4000 2020 RSTMG.exe 104 PID 2020 wrote to memory of 4000 2020 RSTMG.exe 104 PID 2020 wrote to memory of 4000 2020 RSTMG.exe 104 PID 4000 wrote to memory of 2428 4000 cmd.exe 108 PID 4000 wrote to memory of 2428 4000 cmd.exe 108 PID 4000 wrote to memory of 2428 4000 cmd.exe 108 PID 2428 wrote to memory of 1012 2428 NQRJNK.exe 109 PID 2428 wrote to memory of 1012 2428 NQRJNK.exe 109 PID 2428 wrote to memory of 1012 2428 NQRJNK.exe 109 PID 1012 wrote to memory of 624 1012 cmd.exe 114 PID 1012 wrote to memory of 624 1012 cmd.exe 114 PID 1012 wrote to memory of 624 1012 cmd.exe 114 PID 624 wrote to memory of 4112 624 XYT.exe 116 PID 624 wrote to memory of 4112 624 XYT.exe 116 PID 624 wrote to memory of 4112 624 XYT.exe 116 PID 4112 wrote to memory of 1048 4112 cmd.exe 120 PID 4112 wrote to memory of 1048 4112 cmd.exe 120 PID 4112 wrote to memory of 1048 4112 cmd.exe 120 PID 1048 wrote to memory of 368 1048 KBXM.exe 121 PID 1048 wrote to memory of 368 1048 KBXM.exe 121 PID 1048 wrote to memory of 368 1048 KBXM.exe 121 PID 368 wrote to memory of 4404 368 cmd.exe 125 PID 368 wrote to memory of 4404 368 cmd.exe 125 PID 368 wrote to memory of 4404 368 cmd.exe 125 PID 4404 wrote to memory of 1388 4404 TJZAH.exe 126 PID 4404 wrote to memory of 1388 4404 TJZAH.exe 126 PID 4404 wrote to memory of 1388 4404 TJZAH.exe 126 PID 1388 wrote to memory of 1832 1388 cmd.exe 130 PID 1388 wrote to memory of 1832 1388 cmd.exe 130 PID 1388 wrote to memory of 1832 1388 cmd.exe 130 PID 1832 wrote to memory of 2568 1832 JEI.exe 132 PID 1832 wrote to memory of 2568 1832 JEI.exe 132 PID 1832 wrote to memory of 2568 1832 JEI.exe 132 PID 2568 wrote to memory of 2656 2568 cmd.exe 136 PID 2568 wrote to memory of 2656 2568 cmd.exe 136 PID 2568 wrote to memory of 2656 2568 cmd.exe 136 PID 2656 wrote to memory of 2700 2656 DRNND.exe 137 PID 2656 wrote to memory of 2700 2656 DRNND.exe 137 PID 2656 wrote to memory of 2700 2656 DRNND.exe 137 PID 2700 wrote to memory of 4296 2700 cmd.exe 141 PID 2700 wrote to memory of 4296 2700 cmd.exe 141 PID 2700 wrote to memory of 4296 2700 cmd.exe 141 PID 4296 wrote to memory of 4720 4296 HHUNPJU.exe 142 PID 4296 wrote to memory of 4720 4296 HHUNPJU.exe 142 PID 4296 wrote to memory of 4720 4296 HHUNPJU.exe 142 PID 4720 wrote to memory of 5020 4720 cmd.exe 146
Processes
-
C:\Users\Admin\AppData\Local\Temp\56c85d262f202a73935e00423a524600N.exe"C:\Users\Admin\AppData\Local\Temp\56c85d262f202a73935e00423a524600N.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ICQJ.exe.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\windows\system\ICQJ.exeC:\windows\system\ICQJ.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\AFIU.exe.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\windows\SysWOW64\AFIU.exeC:\windows\system32\AFIU.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\RSTMG.exe.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\windows\SysWOW64\RSTMG.exeC:\windows\system32\RSTMG.exe7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\NQRJNK.exe.bat" "8⤵
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\windows\system\NQRJNK.exeC:\windows\system\NQRJNK.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\XYT.exe.bat" "10⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\windows\SysWOW64\XYT.exeC:\windows\system32\XYT.exe11⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\KBXM.exe.bat" "12⤵
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\windows\KBXM.exeC:\windows\KBXM.exe13⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\TJZAH.exe.bat" "14⤵
- Suspicious use of WriteProcessMemory
PID:368 -
C:\windows\SysWOW64\TJZAH.exeC:\windows\system32\TJZAH.exe15⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\JEI.exe.bat" "16⤵
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\windows\JEI.exeC:\windows\JEI.exe17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\DRNND.exe.bat" "18⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\windows\SysWOW64\DRNND.exeC:\windows\system32\DRNND.exe19⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\HHUNPJU.exe.bat" "20⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\windows\HHUNPJU.exeC:\windows\HHUNPJU.exe21⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\NVTWL.exe.bat" "22⤵
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\windows\system\NVTWL.exeC:\windows\system\NVTWL.exe23⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\OYXSZCL.exe.bat" "24⤵PID:2564
-
C:\windows\SysWOW64\OYXSZCL.exeC:\windows\system32\OYXSZCL.exe25⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\DTGEK.exe.bat" "26⤵PID:2912
-
C:\windows\system\DTGEK.exeC:\windows\system\DTGEK.exe27⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:464 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\YOLOUO.exe.bat" "28⤵PID:3392
-
C:\windows\system\YOLOUO.exeC:\windows\system\YOLOUO.exe29⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1512 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\SBQ.exe.bat" "30⤵PID:4932
-
C:\windows\system\SBQ.exeC:\windows\system\SBQ.exe31⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2164 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\NPUGH.exe.bat" "32⤵PID:3224
-
C:\windows\system\NPUGH.exeC:\windows\system\NPUGH.exe33⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4452 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\JUADOYO.exe.bat" "34⤵PID:764
-
C:\windows\SysWOW64\JUADOYO.exeC:\windows\system32\JUADOYO.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\YAYTDH.exe.bat" "36⤵PID:212
-
C:\windows\SysWOW64\YAYTDH.exeC:\windows\system32\YAYTDH.exe37⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1620 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\JSBLDPX.exe.bat" "38⤵PID:4276
-
C:\windows\JSBLDPX.exeC:\windows\JSBLDPX.exe39⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1376 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ATDQ.exe.bat" "40⤵
- System Location Discovery: System Language Discovery
PID:4032 -
C:\windows\ATDQ.exeC:\windows\ATDQ.exe41⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\XYJOW.exe.bat" "42⤵PID:5112
-
C:\windows\XYJOW.exeC:\windows\XYJOW.exe43⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3556 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\BGQ.exe.bat" "44⤵PID:5056
-
C:\windows\BGQ.exeC:\windows\BGQ.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1720 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\KPSB.exe.bat" "46⤵PID:456
-
C:\windows\SysWOW64\KPSB.exeC:\windows\system32\KPSB.exe47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1588 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ZKBFWGA.exe.bat" "48⤵PID:1344
-
C:\windows\ZKBFWGA.exeC:\windows\ZKBFWGA.exe49⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3112 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\UXGO.exe.bat" "50⤵PID:2564
-
C:\windows\SysWOW64\UXGO.exeC:\windows\system32\UXGO.exe51⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\CCYDI.exe.bat" "52⤵PID:1756
-
C:\windows\system\CCYDI.exeC:\windows\system\CCYDI.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3260 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\GTNL.exe.bat" "54⤵
- System Location Discovery: System Language Discovery
PID:4104 -
C:\windows\SysWOW64\GTNL.exeC:\windows\system32\GTNL.exe55⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4048 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\IQGFBAO.exe.bat" "56⤵PID:4852
-
C:\windows\IQGFBAO.exeC:\windows\IQGFBAO.exe57⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ORNTK.exe.bat" "58⤵PID:3268
-
C:\windows\system\ORNTK.exeC:\windows\system\ORNTK.exe59⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4212 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\BTW.exe.bat" "60⤵
- System Location Discovery: System Language Discovery
PID:764 -
C:\windows\system\BTW.exeC:\windows\system\BTW.exe61⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3196 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\DRX.exe.bat" "62⤵PID:5068
-
C:\windows\system\DRX.exeC:\windows\system\DRX.exe63⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4444 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\FPD.exe.bat" "64⤵
- System Location Discovery: System Language Discovery
PID:4724 -
C:\windows\FPD.exeC:\windows\FPD.exe65⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\UFEF.exe.bat" "66⤵PID:2908
-
C:\windows\system\UFEF.exeC:\windows\system\UFEF.exe67⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4656 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\IQUE.exe.bat" "68⤵PID:2368
-
C:\windows\SysWOW64\IQUE.exeC:\windows\system32\IQUE.exe69⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\TYBELTH.exe.bat" "70⤵PID:3328
-
C:\windows\TYBELTH.exeC:\windows\TYBELTH.exe71⤵
- Checks computer location settings
- Executes dropped EXE
PID:4332 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\DGD.exe.bat" "72⤵PID:3312
-
C:\windows\DGD.exeC:\windows\DGD.exe73⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\XTISY.exe.bat" "74⤵
- System Location Discovery: System Language Discovery
PID:3000 -
C:\windows\SysWOW64\XTISY.exeC:\windows\system32\XTISY.exe75⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:2476 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\FMIUM.exe.bat" "76⤵PID:3140
-
C:\windows\FMIUM.exeC:\windows\FMIUM.exe77⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1720 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\FSIIOQ.exe.bat" "78⤵
- System Location Discovery: System Language Discovery
PID:4168 -
C:\windows\FSIIOQ.exeC:\windows\FSIIOQ.exe79⤵
- Executes dropped EXE
PID:4448 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\FCR.exe.bat" "80⤵PID:4076
-
C:\windows\system\FCR.exeC:\windows\system\FCR.exe81⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:464 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\QVMV.exe.bat" "82⤵PID:2732
-
C:\windows\SysWOW64\QVMV.exeC:\windows\system32\QVMV.exe83⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4732 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\KNPNK.exe.bat" "84⤵PID:3924
-
C:\windows\KNPNK.exeC:\windows\KNPNK.exe85⤵
- Checks computer location settings
- Executes dropped EXE
PID:3592 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\JGYPY.exe.bat" "86⤵PID:4744
-
C:\windows\system\JGYPY.exeC:\windows\system\JGYPY.exe87⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:668 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\VYBIGCX.exe.bat" "88⤵
- System Location Discovery: System Language Discovery
PID:2656 -
C:\windows\VYBIGCX.exeC:\windows\VYBIGCX.exe89⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\EZV.exe.bat" "90⤵PID:4120
-
C:\windows\EZV.exeC:\windows\EZV.exe91⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3120 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\MRD.exe.bat" "92⤵PID:4456
-
C:\windows\SysWOW64\MRD.exeC:\windows\system32\MRD.exe93⤵
- Executes dropped EXE
PID:4672 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\QZKOK.exe.bat" "94⤵PID:1756
-
C:\windows\SysWOW64\QZKOK.exeC:\windows\system32\QZKOK.exe95⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:1984 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\ZIMT.exe.bat" "96⤵PID:2384
-
C:\windows\SysWOW64\ZIMT.exeC:\windows\system32\ZIMT.exe97⤵
- Executes dropped EXE
PID:4016 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\OYNTU.exe.bat" "98⤵PID:4940
-
C:\windows\OYNTU.exeC:\windows\OYNTU.exe99⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:728 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\NNGOHC.exe.bat" "100⤵PID:3556
-
C:\windows\SysWOW64\NNGOHC.exeC:\windows\system32\NNGOHC.exe101⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3592 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\AYCUM.exe.bat" "102⤵PID:4720
-
C:\windows\AYCUM.exeC:\windows\AYCUM.exe103⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5088 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\VMHDWT.exe.bat" "104⤵PID:2784
-
C:\windows\SysWOW64\VMHDWT.exeC:\windows\system32\VMHDWT.exe105⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:232 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\VRHSYGV.exe.bat" "106⤵
- System Location Discovery: System Language Discovery
PID:3756 -
C:\windows\system\VRHSYGV.exeC:\windows\system\VRHSYGV.exe107⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:3540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\HHOSK.exe.bat" "108⤵
- System Location Discovery: System Language Discovery
PID:404 -
C:\windows\HHOSK.exeC:\windows\HHOSK.exe109⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:2708 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\LPUAWJF.exe.bat" "110⤵PID:4040
-
C:\windows\SysWOW64\LPUAWJF.exeC:\windows\system32\LPUAWJF.exe111⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2368 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\LVVOY.exe.bat" "112⤵PID:2928
-
C:\windows\system\LVVOY.exeC:\windows\system\LVVOY.exe113⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4208 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\FQZYIW.exe.bat" "114⤵PID:4016
-
C:\windows\system\FQZYIW.exeC:\windows\system\FQZYIW.exe115⤵
- Executes dropped EXE
PID:4440 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\JYGY.exe.bat" "116⤵
- System Location Discovery: System Language Discovery
PID:728 -
C:\windows\system\JYGY.exeC:\windows\system\JYGY.exe117⤵
- Executes dropped EXE
PID:960 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\YTPKFBT.exe.bat" "118⤵PID:1864
-
C:\windows\system\YTPKFBT.exeC:\windows\system\YTPKFBT.exe119⤵
- Executes dropped EXE
PID:896 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\KMSVNI.exe.bat" "120⤵PID:184
-
C:\windows\KMSVNI.exeC:\windows\KMSVNI.exe121⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2336 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\WCZDS.exe.bat" "122⤵PID:1568
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-