Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 08:23
Static task
static1
Behavioral task
behavioral1
Sample
dfd05fadeb60b8ef73d83bd2a5312fd4_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
dfd05fadeb60b8ef73d83bd2a5312fd4_JaffaCakes118.exe
-
Size
519KB
-
MD5
dfd05fadeb60b8ef73d83bd2a5312fd4
-
SHA1
fcac8c58be8ed302131ebfaaeac977c67d086f42
-
SHA256
fc0919c185fc516b207940d54eb987c800882e3387427da740dd01596e8895c1
-
SHA512
282ac8b84eee4e907496546e3364ba102bb10eef2d9621781459286cac50b7e1c371f00294b195a1150755c5c2286aa020c93d0d0a0375c6fa04e667b8531f45
-
SSDEEP
12288:Pgmv3zIpJ7ZARk8U0w7rWxY/hFSBQ56ZHaG6yplxMWgIOKhPTgFHjSH:PtjInVARmbrWGpmo6NaGppl2W/dhPEx
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 64 IoCs
pid Process 2740 slzrebs.exe 1720 rwbtajm.exe 1104 qwhwurl.exe 2012 pdgmnuy.exe 1140 rjjhchp.exe 2852 dancfbe.exe 1292 ykgjkds.exe 1560 yntczhx.exe 2688 usoufxp.exe 2540 uhmzwfs.exe 1456 ornhchg.exe 1936 qeqkxhv.exe 2404 ckynsfc.exe 1092 zifntep.exe 2304 ugwhocw.exe 276 redipjj.exe 2524 wiwpiso.exe 2476 iddpnjc.exe 1032 vfjfzwh.exe 2064 hvmihem.exe 408 pdzactw.exe 1088 ccudkcb.exe 1232 jjqderl.exe 2868 zoqyawi.exe 1616 jncvtvh.exe 1704 txrggyv.exe 2656 etsqotw.exe 1940 oswngre.exe 1712 vdvtvlm.exe 560 icyvmtr.exe 2396 sxzotos.exe 1736 frfvfax.exe 2584 pyjbpze.exe 2324 cspibei.exe 2756 gjudxsu.exe 884 wvuybxr.exe 1756 banguhd.exe 1084 nffbiph.exe 352 vkpozir.exe 2264 iakrijp.exe 2372 ptiwxcf.exe 3040 cklygll.exe 1460 jrzraam.exe 2160 zehmenr.exe 2040 euegatv.exe 2784 mqomjmf.exe 2964 ysubvrk.exe 908 irgznqr.exe 1304 vqbbwyp.exe 2392 igweegu.exe 2356 psujtal.exe 1924 zvruvkv.exe 876 jcvroiu.exe 2204 rgfextf.exe 2668 bjupswl.exe 2268 levzarm.exe 2376 yvqcjzs.exe 320 fophgta.exe 2632 vwipmce.exe 2444 fhyzagk.exe 2532 sxsciop.exe 2168 fwnfrwv.exe 1144 rmqhzwt.exe 2920 barxxdg.exe -
Identifies Wine through registry keys 2 TTPs 64 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine ixdqqnx.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine yvqcjzs.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine bbfhcmh.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine uzghevi.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine rvgheev.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine kkmdadx.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine owmlwsi.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine sxsciop.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine pooxipg.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine yerojai.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine ihqrqqg.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine eueenlw.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine ybkfrrb.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine bnceaxq.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine rilvzfs.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine ziebpww.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine fqaurwm.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine fptstcy.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine rjueqkd.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine bkvgeuf.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine mxunbgy.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine hpohjlt.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine gwgtsnd.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine irgznqr.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine qhulmra.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine eqouwhj.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine hbnocsq.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine seyazkf.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine bmtyxat.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine nqgmvar.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine snqjcvx.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine fuvgemi.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine zoqyawi.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine dshkbcj.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine mvxnqsz.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine rmqkrgd.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine zpaekuo.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine jfmygpi.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine vwrpmyi.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine pwvwyjo.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine gottzau.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine lxxqrvu.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine yrnzxfw.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine faiyizw.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine qnmbevn.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine frwnols.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine dvaiasi.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine gkwzofx.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine smnlupr.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine rrnhayq.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine keakjvz.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine njnipdy.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine vqythrg.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine gojmjrr.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine cstuclc.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine pmkcfec.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine ltphzun.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine jpsoyeq.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine xohooud.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine sagnprl.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine fvryqix.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine jrzraam.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine hftxezl.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine ekvrrzp.exe -
Loads dropped DLL 64 IoCs
pid Process 3028 dfd05fadeb60b8ef73d83bd2a5312fd4_JaffaCakes118.exe 3028 dfd05fadeb60b8ef73d83bd2a5312fd4_JaffaCakes118.exe 2740 slzrebs.exe 2740 slzrebs.exe 1720 rwbtajm.exe 1720 rwbtajm.exe 1104 qwhwurl.exe 1104 qwhwurl.exe 2012 pdgmnuy.exe 2012 pdgmnuy.exe 1140 rjjhchp.exe 1140 rjjhchp.exe 2852 dancfbe.exe 2852 dancfbe.exe 1292 ykgjkds.exe 1292 ykgjkds.exe 1560 yntczhx.exe 1560 yntczhx.exe 2688 usoufxp.exe 2688 usoufxp.exe 2540 uhmzwfs.exe 2540 uhmzwfs.exe 1456 ornhchg.exe 1456 ornhchg.exe 1936 qeqkxhv.exe 1936 qeqkxhv.exe 2404 ckynsfc.exe 2404 ckynsfc.exe 1092 zifntep.exe 1092 zifntep.exe 2304 ugwhocw.exe 2304 ugwhocw.exe 276 redipjj.exe 276 redipjj.exe 2524 wiwpiso.exe 2524 wiwpiso.exe 2476 iddpnjc.exe 2476 iddpnjc.exe 1032 vfjfzwh.exe 1032 vfjfzwh.exe 2064 hvmihem.exe 2064 hvmihem.exe 408 pdzactw.exe 408 pdzactw.exe 1088 ccudkcb.exe 1088 ccudkcb.exe 1232 jjqderl.exe 1232 jjqderl.exe 2868 zoqyawi.exe 2868 zoqyawi.exe 1616 jncvtvh.exe 1616 jncvtvh.exe 1704 txrggyv.exe 1704 txrggyv.exe 2656 etsqotw.exe 2656 etsqotw.exe 1940 oswngre.exe 1940 oswngre.exe 1712 vdvtvlm.exe 1712 vdvtvlm.exe 560 icyvmtr.exe 560 icyvmtr.exe 2396 sxzotos.exe 2396 sxzotos.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\cvvmydx.exe pwbrhdz.exe File opened for modification C:\Windows\SysWOW64\okluxns.exe bxbfrsl.exe File opened for modification C:\Windows\SysWOW64\xetllhk.exe kkmdadx.exe File opened for modification C:\Windows\SysWOW64\llbaeda.exe yvgxwvd.exe File created C:\Windows\SysWOW64\fzzpokv.exe siwmgkp.exe File opened for modification C:\Windows\SysWOW64\ntramhw.exe cufdcjx.exe File created C:\Windows\SysWOW64\yrnzxfw.exe ohxpccp.exe File opened for modification C:\Windows\SysWOW64\tcyguck.exe jsivgzw.exe File created C:\Windows\SysWOW64\emofdns.exe ukyvpkm.exe File opened for modification C:\Windows\SysWOW64\wozdnsp.exe meksspb.exe File opened for modification C:\Windows\SysWOW64\uiauekz.exe hjfrwku.exe File created C:\Windows\SysWOW64\mhmguxq.exe dfxwzuk.exe File opened for modification C:\Windows\SysWOW64\yortadz.exe lxxqrvu.exe File opened for modification C:\Windows\SysWOW64\pdzactw.exe hvmihem.exe File created C:\Windows\SysWOW64\sxzotos.exe icyvmtr.exe File created C:\Windows\SysWOW64\oyobglg.exe blxebph.exe File opened for modification C:\Windows\SysWOW64\jpsoyeq.exe erxlpws.exe File created C:\Windows\SysWOW64\edqmcyf.exe qqzwwug.exe File created C:\Windows\SysWOW64\xyuwwzm.exe khzunzh.exe File created C:\Windows\SysWOW64\blumcyw.exe qmipkao.exe File opened for modification C:\Windows\SysWOW64\znpqkpd.exe mxunbgy.exe File opened for modification C:\Windows\SysWOW64\jrzraam.exe cklygll.exe File opened for modification C:\Windows\SysWOW64\jubniti.exe zrmdvqc.exe File opened for modification C:\Windows\SysWOW64\nqgmvar.exe asdjmsm.exe File created C:\Windows\SysWOW64\bnafxea.exe rklvcim.exe File created C:\Windows\SysWOW64\joiwyeh.exe wyftqec.exe File created C:\Windows\SysWOW64\mcukhbc.exe zlaizaw.exe File opened for modification C:\Windows\SysWOW64\pwbrhdz.exe fqaurwm.exe File opened for modification C:\Windows\SysWOW64\qtxegyj.exe gutzozb.exe File created C:\Windows\SysWOW64\qffkquz.exe dolpimu.exe File created C:\Windows\SysWOW64\vmgdzws.exe jsznnro.exe File opened for modification C:\Windows\SysWOW64\wzagads.exe jbfdsvm.exe File created C:\Windows\SysWOW64\lfjjfzn.exe yssuzvp.exe File created C:\Windows\SysWOW64\bbfhcmh.exe phzzrzc.exe File created C:\Windows\SysWOW64\jsivgzw.exe ebfsyqy.exe File opened for modification C:\Windows\SysWOW64\manqoja.exe zghjcfw.exe File created C:\Windows\SysWOW64\rknunuj.exe fihmbhf.exe File opened for modification C:\Windows\SysWOW64\pyjbpze.exe frfvfax.exe File created C:\Windows\SysWOW64\udtewxu.exe hbnocsq.exe File created C:\Windows\SysWOW64\hefaqbt.exe urolkxu.exe File opened for modification C:\Windows\SysWOW64\yxlywye.exe lyrvnqz.exe File created C:\Windows\SysWOW64\fuzjiti.exe tsstwgd.exe File opened for modification C:\Windows\SysWOW64\usoufxp.exe yntczhx.exe File created C:\Windows\SysWOW64\tiqbxgd.exe gkwzofx.exe File created C:\Windows\SysWOW64\fiqxjhu.exe rvgheev.exe File created C:\Windows\SysWOW64\dshkbcj.exe qfpuvzc.exe File opened for modification C:\Windows\SysWOW64\dlblhqr.exe qnyirpl.exe File opened for modification C:\Windows\SysWOW64\iuckkik.exe yrnzxfw.exe File created C:\Windows\SysWOW64\rilvzfs.exe bddadsv.exe File created C:\Windows\SysWOW64\xvvnrwe.exe keakjvz.exe File opened for modification C:\Windows\SysWOW64\ugwhocw.exe zifntep.exe File created C:\Windows\SysWOW64\vkpozir.exe nffbiph.exe File opened for modification C:\Windows\SysWOW64\jcvroiu.exe zvruvkv.exe File opened for modification C:\Windows\SysWOW64\yahcgkc.exe lcezxkw.exe File opened for modification C:\Windows\SysWOW64\bvorqxi.exe roktgya.exe File created C:\Windows\SysWOW64\tymqbfg.exe hefaqbt.exe File created C:\Windows\SysWOW64\namumug.exe bbrrdub.exe File created C:\Windows\SysWOW64\qujsdss.exe gjmiqom.exe File created C:\Windows\SysWOW64\ckgtdmx.exe pmezuez.exe File opened for modification C:\Windows\SysWOW64\cufdcjx.exe qsznjek.exe File opened for modification C:\Windows\SysWOW64\tbktqrh.exe jyujdob.exe File opened for modification C:\Windows\SysWOW64\keakjvz.exe xogisnb.exe File opened for modification C:\Windows\SysWOW64\bhegbep.exe stdqlxc.exe File created C:\Windows\SysWOW64\mnqjuav.exe zxvgmsq.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ugwhocw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mvxnqsz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frqsswc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uqlebkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gwgtsnd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dlzdluw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nuefkrp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gkcvril.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rhmohhx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language npxftwt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language khtheed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vevroig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdubool.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fciocpx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddcbwuu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lkhcijw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrlzecv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bkvgeuf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yozwflg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csejdmw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qtxegyj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dqlfjmb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vkpozir.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bjupswl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zlaizaw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahcgkc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sqlvbei.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language levzarm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvvmydx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rvutxpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjkinfz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language srcwjjl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwypzje.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ihqrqqg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mcsvsyr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kkmdadx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntramhw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bmtyxat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language krdakxv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebyweyg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttipewq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language puzknph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kufzksc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cklygll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rcfyycs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rysbhsg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ismssdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bljqiuy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jtbusoq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbrrdub.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sngutbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language whrouow.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fmygucn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rztasia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stdqlxc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pwvwyjo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vesdoib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ykgjkds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language irgznqr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dxlwaga.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcxznus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language opuhcbm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zixbvkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qgutqme.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2740 3028 dfd05fadeb60b8ef73d83bd2a5312fd4_JaffaCakes118.exe 30 PID 3028 wrote to memory of 2740 3028 dfd05fadeb60b8ef73d83bd2a5312fd4_JaffaCakes118.exe 30 PID 3028 wrote to memory of 2740 3028 dfd05fadeb60b8ef73d83bd2a5312fd4_JaffaCakes118.exe 30 PID 3028 wrote to memory of 2740 3028 dfd05fadeb60b8ef73d83bd2a5312fd4_JaffaCakes118.exe 30 PID 2740 wrote to memory of 1720 2740 slzrebs.exe 31 PID 2740 wrote to memory of 1720 2740 slzrebs.exe 31 PID 2740 wrote to memory of 1720 2740 slzrebs.exe 31 PID 2740 wrote to memory of 1720 2740 slzrebs.exe 31 PID 1720 wrote to memory of 1104 1720 rwbtajm.exe 32 PID 1720 wrote to memory of 1104 1720 rwbtajm.exe 32 PID 1720 wrote to memory of 1104 1720 rwbtajm.exe 32 PID 1720 wrote to memory of 1104 1720 rwbtajm.exe 32 PID 1104 wrote to memory of 2012 1104 qwhwurl.exe 33 PID 1104 wrote to memory of 2012 1104 qwhwurl.exe 33 PID 1104 wrote to memory of 2012 1104 qwhwurl.exe 33 PID 1104 wrote to memory of 2012 1104 qwhwurl.exe 33 PID 2012 wrote to memory of 1140 2012 pdgmnuy.exe 34 PID 2012 wrote to memory of 1140 2012 pdgmnuy.exe 34 PID 2012 wrote to memory of 1140 2012 pdgmnuy.exe 34 PID 2012 wrote to memory of 1140 2012 pdgmnuy.exe 34 PID 1140 wrote to memory of 2852 1140 rjjhchp.exe 35 PID 1140 wrote to memory of 2852 1140 rjjhchp.exe 35 PID 1140 wrote to memory of 2852 1140 rjjhchp.exe 35 PID 1140 wrote to memory of 2852 1140 rjjhchp.exe 35 PID 2852 wrote to memory of 1292 2852 dancfbe.exe 36 PID 2852 wrote to memory of 1292 2852 dancfbe.exe 36 PID 2852 wrote to memory of 1292 2852 dancfbe.exe 36 PID 2852 wrote to memory of 1292 2852 dancfbe.exe 36 PID 1292 wrote to memory of 1560 1292 ykgjkds.exe 37 PID 1292 wrote to memory of 1560 1292 ykgjkds.exe 37 PID 1292 wrote to memory of 1560 1292 ykgjkds.exe 37 PID 1292 wrote to memory of 1560 1292 ykgjkds.exe 37 PID 1560 wrote to memory of 2688 1560 yntczhx.exe 38 PID 1560 wrote to memory of 2688 1560 yntczhx.exe 38 PID 1560 wrote to memory of 2688 1560 yntczhx.exe 38 PID 1560 wrote to memory of 2688 1560 yntczhx.exe 38 PID 2688 wrote to memory of 2540 2688 usoufxp.exe 39 PID 2688 wrote to memory of 2540 2688 usoufxp.exe 39 PID 2688 wrote to memory of 2540 2688 usoufxp.exe 39 PID 2688 wrote to memory of 2540 2688 usoufxp.exe 39 PID 2540 wrote to memory of 1456 2540 uhmzwfs.exe 40 PID 2540 wrote to memory of 1456 2540 uhmzwfs.exe 40 PID 2540 wrote to memory of 1456 2540 uhmzwfs.exe 40 PID 2540 wrote to memory of 1456 2540 uhmzwfs.exe 40 PID 1456 wrote to memory of 1936 1456 ornhchg.exe 41 PID 1456 wrote to memory of 1936 1456 ornhchg.exe 41 PID 1456 wrote to memory of 1936 1456 ornhchg.exe 41 PID 1456 wrote to memory of 1936 1456 ornhchg.exe 41 PID 1936 wrote to memory of 2404 1936 qeqkxhv.exe 42 PID 1936 wrote to memory of 2404 1936 qeqkxhv.exe 42 PID 1936 wrote to memory of 2404 1936 qeqkxhv.exe 42 PID 1936 wrote to memory of 2404 1936 qeqkxhv.exe 42 PID 2404 wrote to memory of 1092 2404 ckynsfc.exe 43 PID 2404 wrote to memory of 1092 2404 ckynsfc.exe 43 PID 2404 wrote to memory of 1092 2404 ckynsfc.exe 43 PID 2404 wrote to memory of 1092 2404 ckynsfc.exe 43 PID 1092 wrote to memory of 2304 1092 zifntep.exe 44 PID 1092 wrote to memory of 2304 1092 zifntep.exe 44 PID 1092 wrote to memory of 2304 1092 zifntep.exe 44 PID 1092 wrote to memory of 2304 1092 zifntep.exe 44 PID 2304 wrote to memory of 276 2304 ugwhocw.exe 45 PID 2304 wrote to memory of 276 2304 ugwhocw.exe 45 PID 2304 wrote to memory of 276 2304 ugwhocw.exe 45 PID 2304 wrote to memory of 276 2304 ugwhocw.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfd05fadeb60b8ef73d83bd2a5312fd4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dfd05fadeb60b8ef73d83bd2a5312fd4_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\slzrebs.exeC:\Windows\system32\slzrebs.exe 636 "C:\Users\Admin\AppData\Local\Temp\dfd05fadeb60b8ef73d83bd2a5312fd4_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\rwbtajm.exeC:\Windows\system32\rwbtajm.exe 612 "C:\Windows\SysWOW64\slzrebs.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\qwhwurl.exeC:\Windows\system32\qwhwurl.exe 620 "C:\Windows\SysWOW64\rwbtajm.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\pdgmnuy.exeC:\Windows\system32\pdgmnuy.exe 624 "C:\Windows\SysWOW64\qwhwurl.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\rjjhchp.exeC:\Windows\system32\rjjhchp.exe 616 "C:\Windows\SysWOW64\pdgmnuy.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\dancfbe.exeC:\Windows\system32\dancfbe.exe 628 "C:\Windows\SysWOW64\rjjhchp.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\ykgjkds.exeC:\Windows\system32\ykgjkds.exe 664 "C:\Windows\SysWOW64\dancfbe.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\yntczhx.exeC:\Windows\system32\yntczhx.exe 640 "C:\Windows\SysWOW64\ykgjkds.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\usoufxp.exeC:\Windows\system32\usoufxp.exe 656 "C:\Windows\SysWOW64\yntczhx.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\uhmzwfs.exeC:\Windows\system32\uhmzwfs.exe 632 "C:\Windows\SysWOW64\usoufxp.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\ornhchg.exeC:\Windows\system32\ornhchg.exe 732 "C:\Windows\SysWOW64\uhmzwfs.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\qeqkxhv.exeC:\Windows\system32\qeqkxhv.exe 680 "C:\Windows\SysWOW64\ornhchg.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\ckynsfc.exeC:\Windows\system32\ckynsfc.exe 684 "C:\Windows\SysWOW64\qeqkxhv.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\zifntep.exeC:\Windows\system32\zifntep.exe 660 "C:\Windows\SysWOW64\ckynsfc.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\ugwhocw.exeC:\Windows\system32\ugwhocw.exe 668 "C:\Windows\SysWOW64\zifntep.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\redipjj.exeC:\Windows\system32\redipjj.exe 696 "C:\Windows\SysWOW64\ugwhocw.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:276 -
C:\Windows\SysWOW64\wiwpiso.exeC:\Windows\system32\wiwpiso.exe 644 "C:\Windows\SysWOW64\redipjj.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2524 -
C:\Windows\SysWOW64\iddpnjc.exeC:\Windows\system32\iddpnjc.exe 676 "C:\Windows\SysWOW64\wiwpiso.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2476 -
C:\Windows\SysWOW64\vfjfzwh.exeC:\Windows\system32\vfjfzwh.exe 652 "C:\Windows\SysWOW64\iddpnjc.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1032 -
C:\Windows\SysWOW64\hvmihem.exeC:\Windows\system32\hvmihem.exe 764 "C:\Windows\SysWOW64\vfjfzwh.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2064 -
C:\Windows\SysWOW64\pdzactw.exeC:\Windows\system32\pdzactw.exe 772 "C:\Windows\SysWOW64\hvmihem.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:408 -
C:\Windows\SysWOW64\ccudkcb.exeC:\Windows\system32\ccudkcb.exe 776 "C:\Windows\SysWOW64\pdzactw.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1088 -
C:\Windows\SysWOW64\jjqderl.exeC:\Windows\system32\jjqderl.exe 780 "C:\Windows\SysWOW64\ccudkcb.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1232 -
C:\Windows\SysWOW64\zoqyawi.exeC:\Windows\system32\zoqyawi.exe 784 "C:\Windows\SysWOW64\jjqderl.exe"25⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
PID:2868 -
C:\Windows\SysWOW64\jncvtvh.exeC:\Windows\system32\jncvtvh.exe 792 "C:\Windows\SysWOW64\zoqyawi.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1616 -
C:\Windows\SysWOW64\txrggyv.exeC:\Windows\system32\txrggyv.exe 788 "C:\Windows\SysWOW64\jncvtvh.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1704 -
C:\Windows\SysWOW64\etsqotw.exeC:\Windows\system32\etsqotw.exe 800 "C:\Windows\SysWOW64\txrggyv.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2656 -
C:\Windows\SysWOW64\oswngre.exeC:\Windows\system32\oswngre.exe 796 "C:\Windows\SysWOW64\etsqotw.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1940 -
C:\Windows\SysWOW64\vdvtvlm.exeC:\Windows\system32\vdvtvlm.exe 804 "C:\Windows\SysWOW64\oswngre.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1712 -
C:\Windows\SysWOW64\icyvmtr.exeC:\Windows\system32\icyvmtr.exe 808 "C:\Windows\SysWOW64\vdvtvlm.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:560 -
C:\Windows\SysWOW64\sxzotos.exeC:\Windows\system32\sxzotos.exe 812 "C:\Windows\SysWOW64\icyvmtr.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2396 -
C:\Windows\SysWOW64\frfvfax.exeC:\Windows\system32\frfvfax.exe 768 "C:\Windows\SysWOW64\sxzotos.exe"33⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1736 -
C:\Windows\SysWOW64\pyjbpze.exeC:\Windows\system32\pyjbpze.exe 824 "C:\Windows\SysWOW64\frfvfax.exe"34⤵
- Executes dropped EXE
PID:2584 -
C:\Windows\SysWOW64\cspibei.exeC:\Windows\system32\cspibei.exe 820 "C:\Windows\SysWOW64\pyjbpze.exe"35⤵
- Executes dropped EXE
PID:2324 -
C:\Windows\SysWOW64\gjudxsu.exeC:\Windows\system32\gjudxsu.exe 828 "C:\Windows\SysWOW64\cspibei.exe"36⤵
- Executes dropped EXE
PID:2756 -
C:\Windows\SysWOW64\wvuybxr.exeC:\Windows\system32\wvuybxr.exe 832 "C:\Windows\SysWOW64\gjudxsu.exe"37⤵
- Executes dropped EXE
PID:884 -
C:\Windows\SysWOW64\banguhd.exeC:\Windows\system32\banguhd.exe 836 "C:\Windows\SysWOW64\wvuybxr.exe"38⤵
- Executes dropped EXE
PID:1756 -
C:\Windows\SysWOW64\nffbiph.exeC:\Windows\system32\nffbiph.exe 840 "C:\Windows\SysWOW64\banguhd.exe"39⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1084 -
C:\Windows\SysWOW64\vkpozir.exeC:\Windows\system32\vkpozir.exe 844 "C:\Windows\SysWOW64\nffbiph.exe"40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:352 -
C:\Windows\SysWOW64\iakrijp.exeC:\Windows\system32\iakrijp.exe 848 "C:\Windows\SysWOW64\vkpozir.exe"41⤵
- Executes dropped EXE
PID:2264 -
C:\Windows\SysWOW64\ptiwxcf.exeC:\Windows\system32\ptiwxcf.exe 856 "C:\Windows\SysWOW64\iakrijp.exe"42⤵
- Executes dropped EXE
PID:2372 -
C:\Windows\SysWOW64\cklygll.exeC:\Windows\system32\cklygll.exe 852 "C:\Windows\SysWOW64\ptiwxcf.exe"43⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3040 -
C:\Windows\SysWOW64\jrzraam.exeC:\Windows\system32\jrzraam.exe 860 "C:\Windows\SysWOW64\cklygll.exe"44⤵
- Executes dropped EXE
- Identifies Wine through registry keys
PID:1460 -
C:\Windows\SysWOW64\zehmenr.exeC:\Windows\system32\zehmenr.exe 864 "C:\Windows\SysWOW64\jrzraam.exe"45⤵
- Executes dropped EXE
PID:2160 -
C:\Windows\SysWOW64\euegatv.exeC:\Windows\system32\euegatv.exe 868 "C:\Windows\SysWOW64\zehmenr.exe"46⤵
- Executes dropped EXE
PID:2040 -
C:\Windows\SysWOW64\mqomjmf.exeC:\Windows\system32\mqomjmf.exe 872 "C:\Windows\SysWOW64\euegatv.exe"47⤵
- Executes dropped EXE
PID:2784 -
C:\Windows\SysWOW64\ysubvrk.exeC:\Windows\system32\ysubvrk.exe 876 "C:\Windows\SysWOW64\mqomjmf.exe"48⤵
- Executes dropped EXE
PID:2964 -
C:\Windows\SysWOW64\irgznqr.exeC:\Windows\system32\irgznqr.exe 880 "C:\Windows\SysWOW64\ysubvrk.exe"49⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- System Location Discovery: System Language Discovery
PID:908 -
C:\Windows\SysWOW64\vqbbwyp.exeC:\Windows\system32\vqbbwyp.exe 888 "C:\Windows\SysWOW64\irgznqr.exe"50⤵
- Executes dropped EXE
PID:1304 -
C:\Windows\SysWOW64\igweegu.exeC:\Windows\system32\igweegu.exe 884 "C:\Windows\SysWOW64\vqbbwyp.exe"51⤵
- Executes dropped EXE
PID:2392 -
C:\Windows\SysWOW64\psujtal.exeC:\Windows\system32\psujtal.exe 892 "C:\Windows\SysWOW64\igweegu.exe"52⤵
- Executes dropped EXE
PID:2356 -
C:\Windows\SysWOW64\unmzhdj.exeC:\Windows\system32\unmzhdj.exe 896 "C:\Windows\SysWOW64\psujtal.exe"53⤵PID:2552
-
C:\Windows\SysWOW64\zvruvkv.exeC:\Windows\system32\zvruvkv.exe 908 "C:\Windows\SysWOW64\unmzhdj.exe"54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1924 -
C:\Windows\SysWOW64\jcvroiu.exeC:\Windows\system32\jcvroiu.exe 900 "C:\Windows\SysWOW64\zvruvkv.exe"55⤵
- Executes dropped EXE
PID:876 -
C:\Windows\SysWOW64\rgfextf.exeC:\Windows\system32\rgfextf.exe 912 "C:\Windows\SysWOW64\jcvroiu.exe"56⤵
- Executes dropped EXE
PID:2204 -
C:\Windows\SysWOW64\bjupswl.exeC:\Windows\system32\bjupswl.exe 920 "C:\Windows\SysWOW64\rgfextf.exe"57⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2668 -
C:\Windows\SysWOW64\levzarm.exeC:\Windows\system32\levzarm.exe 904 "C:\Windows\SysWOW64\bjupswl.exe"58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2268 -
C:\Windows\SysWOW64\yvqcjzs.exeC:\Windows\system32\yvqcjzs.exe 816 "C:\Windows\SysWOW64\levzarm.exe"59⤵
- Executes dropped EXE
- Identifies Wine through registry keys
PID:2376 -
C:\Windows\SysWOW64\fophgta.exeC:\Windows\system32\fophgta.exe 924 "C:\Windows\SysWOW64\yvqcjzs.exe"60⤵
- Executes dropped EXE
PID:320 -
C:\Windows\SysWOW64\vwipmce.exeC:\Windows\system32\vwipmce.exe 928 "C:\Windows\SysWOW64\fophgta.exe"61⤵
- Executes dropped EXE
PID:2632 -
C:\Windows\SysWOW64\fhyzagk.exeC:\Windows\system32\fhyzagk.exe 760 "C:\Windows\SysWOW64\vwipmce.exe"62⤵
- Executes dropped EXE
PID:2444 -
C:\Windows\SysWOW64\sxsciop.exeC:\Windows\system32\sxsciop.exe 932 "C:\Windows\SysWOW64\fhyzagk.exe"63⤵
- Executes dropped EXE
- Identifies Wine through registry keys
PID:2532 -
C:\Windows\SysWOW64\fwnfrwv.exeC:\Windows\system32\fwnfrwv.exe 940 "C:\Windows\SysWOW64\sxsciop.exe"64⤵
- Executes dropped EXE
PID:2168 -
C:\Windows\SysWOW64\rmqhzwt.exeC:\Windows\system32\rmqhzwt.exe 944 "C:\Windows\SysWOW64\fwnfrwv.exe"65⤵
- Executes dropped EXE
PID:1144 -
C:\Windows\SysWOW64\barxxdg.exeC:\Windows\system32\barxxdg.exe 948 "C:\Windows\SysWOW64\rmqhzwt.exe"66⤵
- Executes dropped EXE
PID:2920 -
C:\Windows\SysWOW64\orlzgml.exeC:\Windows\system32\orlzgml.exe 952 "C:\Windows\SysWOW64\barxxdg.exe"67⤵PID:2576
-
C:\Windows\SysWOW64\gyondfn.exeC:\Windows\system32\gyondfn.exe 956 "C:\Windows\SysWOW64\orlzgml.exe"68⤵PID:2320
-
C:\Windows\SysWOW64\tauuorr.exeC:\Windows\system32\tauuorr.exe 960 "C:\Windows\SysWOW64\gyondfn.exe"69⤵PID:2440
-
C:\Windows\SysWOW64\ddjfkmx.exeC:\Windows\system32\ddjfkmx.exe 964 "C:\Windows\SysWOW64\tauuorr.exe"70⤵PID:2128
-
C:\Windows\SysWOW64\qfpuvzc.exeC:\Windows\system32\qfpuvzc.exe 976 "C:\Windows\SysWOW64\ddjfkmx.exe"71⤵
- Drops file in System32 directory
PID:1496 -
C:\Windows\SysWOW64\dshkbcj.exeC:\Windows\system32\dshkbcj.exe 968 "C:\Windows\SysWOW64\qfpuvzc.exe"72⤵
- Identifies Wine through registry keys
PID:1852 -
C:\Windows\SysWOW64\qtnamhn.exeC:\Windows\system32\qtnamhn.exe 972 "C:\Windows\SysWOW64\dshkbcj.exe"73⤵PID:1764
-
C:\Windows\SysWOW64\zwckikt.exeC:\Windows\system32\zwckikt.exe 980 "C:\Windows\SysWOW64\qtnamhn.exe"74⤵PID:832
-
C:\Windows\SysWOW64\mvxnqsz.exeC:\Windows\system32\mvxnqsz.exe 936 "C:\Windows\SysWOW64\zwckikt.exe"75⤵
- Identifies Wine through registry keys
- System Location Discovery: System Language Discovery
PID:676 -
C:\Windows\SysWOW64\zlaizaw.exeC:\Windows\system32\zlaizaw.exe 988 "C:\Windows\SysWOW64\mvxnqsz.exe"76⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2152 -
C:\Windows\SysWOW64\mcukhbc.exeC:\Windows\system32\mcukhbc.exe 992 "C:\Windows\SysWOW64\zlaizaw.exe"77⤵PID:1264
-
C:\Windows\SysWOW64\wmkvveq.exeC:\Windows\system32\wmkvveq.exe 996 "C:\Windows\SysWOW64\mcukhbc.exe"78⤵PID:2260
-
C:\Windows\SysWOW64\jdnxdmo.exeC:\Windows\system32\jdnxdmo.exe 1000 "C:\Windows\SysWOW64\wmkvveq.exe"79⤵PID:1648
-
C:\Windows\SysWOW64\tcrvwlv.exeC:\Windows\system32\tcrvwlv.exe 1008 "C:\Windows\SysWOW64\jdnxdmo.exe"80⤵PID:1516
-
C:\Windows\SysWOW64\dmgfjoc.exeC:\Windows\system32\dmgfjoc.exe 1004 "C:\Windows\SysWOW64\tcrvwlv.exe"81⤵PID:1612
-
C:\Windows\SysWOW64\qdjiroh.exeC:\Windows\system32\qdjiroh.exe 1012 "C:\Windows\SysWOW64\dmgfjoc.exe"82⤵PID:536
-
C:\Windows\SysWOW64\dfpydal.exeC:\Windows\system32\dfpydal.exe 1016 "C:\Windows\SysWOW64\qdjiroh.exe"83⤵PID:1968
-
C:\Windows\SysWOW64\qsznjek.exeC:\Windows\system32\qsznjek.exe 1032 "C:\Windows\SysWOW64\dfpydal.exe"84⤵
- Drops file in System32 directory
PID:1988 -
C:\Windows\SysWOW64\cufdcjx.exeC:\Windows\system32\cufdcjx.exe 1020 "C:\Windows\SysWOW64\qsznjek.exe"85⤵
- Drops file in System32 directory
PID:1708 -
C:\Windows\SysWOW64\ntramhw.exeC:\Windows\system32\ntramhw.exe 1040 "C:\Windows\SysWOW64\cufdcjx.exe"86⤵
- System Location Discovery: System Language Discovery
PID:2488 -
C:\Windows\SysWOW64\zrmdvqc.exeC:\Windows\system32\zrmdvqc.exe 1028 "C:\Windows\SysWOW64\ntramhw.exe"87⤵
- Drops file in System32 directory
PID:2712 -
C:\Windows\SysWOW64\jubniti.exeC:\Windows\system32\jubniti.exe 1044 "C:\Windows\SysWOW64\zrmdvqc.exe"88⤵PID:1808
-
C:\Windows\SysWOW64\wwhvuxu.exeC:\Windows\system32\wwhvuxu.exe 1036 "C:\Windows\SysWOW64\jubniti.exe"89⤵PID:584
-
C:\Windows\SysWOW64\jnkykfs.exeC:\Windows\system32\jnkykfs.exe 1048 "C:\Windows\SysWOW64\wwhvuxu.exe"90⤵PID:1192
-
C:\Windows\SysWOW64\tmodvez.exeC:\Windows\system32\tmodvez.exe 1052 "C:\Windows\SysWOW64\jnkykfs.exe"91⤵PID:2272
-
C:\Windows\SysWOW64\ghftbiy.exeC:\Windows\system32\ghftbiy.exe 1056 "C:\Windows\SysWOW64\tmodvez.exe"92⤵PID:2456
-
C:\Windows\SysWOW64\qnyirpl.exeC:\Windows\system32\qnyirpl.exe 1068 "C:\Windows\SysWOW64\ghftbiy.exe"93⤵
- Drops file in System32 directory
PID:1868 -
C:\Windows\SysWOW64\dlblhqr.exeC:\Windows\system32\dlblhqr.exe 1060 "C:\Windows\SysWOW64\qnyirpl.exe"94⤵PID:2772
-
C:\Windows\SysWOW64\qcwoqyw.exeC:\Windows\system32\qcwoqyw.exe 1064 "C:\Windows\SysWOW64\dlblhqr.exe"95⤵PID:112
-
C:\Windows\SysWOW64\dsrqygu.exeC:\Windows\system32\dsrqygu.exe 1072 "C:\Windows\SysWOW64\qcwoqyw.exe"96⤵PID:1052
-
C:\Windows\SysWOW64\qrtthga.exeC:\Windows\system32\qrtthga.exe 1076 "C:\Windows\SysWOW64\dsrqygu.exe"97⤵PID:848
-
C:\Windows\SysWOW64\ztjdujg.exeC:\Windows\system32\ztjdujg.exe 1088 "C:\Windows\SysWOW64\qrtthga.exe"98⤵PID:1376
-
C:\Windows\SysWOW64\mvptgws.exeC:\Windows\system32\mvptgws.exe 1080 "C:\Windows\SysWOW64\ztjdujg.exe"99⤵PID:608
-
C:\Windows\SysWOW64\rmkwowq.exeC:\Windows\system32\rmkwowq.exe 1096 "C:\Windows\SysWOW64\mvptgws.exe"100⤵PID:1328
-
C:\Windows\SysWOW64\ekmyfev.exeC:\Windows\system32\ekmyfev.exe 1084 "C:\Windows\SysWOW64\rmkwowq.exe"101⤵PID:2824
-
C:\Windows\SysWOW64\oncbshc.exeC:\Windows\system32\oncbshc.exe 1092 "C:\Windows\SysWOW64\ekmyfev.exe"102⤵PID:1644
-
C:\Windows\SysWOW64\blxebph.exeC:\Windows\system32\blxebph.exe 1100 "C:\Windows\SysWOW64\oncbshc.exe"103⤵
- Drops file in System32 directory
PID:2724 -
C:\Windows\SysWOW64\oyobglg.exeC:\Windows\system32\oyobglg.exe 1104 "C:\Windows\SysWOW64\blxebph.exe"104⤵PID:1260
-
C:\Windows\SysWOW64\baujsyk.exeC:\Windows\system32\baujsyk.exe 1108 "C:\Windows\SysWOW64\oyobglg.exe"105⤵PID:2340
-
C:\Windows\SysWOW64\lzygkws.exeC:\Windows\system32\lzygkws.exe 1124 "C:\Windows\SysWOW64\baujsyk.exe"106⤵PID:3000
-
C:\Windows\SysWOW64\vcoryag.exeC:\Windows\system32\vcoryag.exe 1112 "C:\Windows\SysWOW64\lzygkws.exe"107⤵PID:1800
-
C:\Windows\SysWOW64\ixfgddf.exeC:\Windows\system32\ixfgddf.exe 1116 "C:\Windows\SysWOW64\vcoryag.exe"108⤵PID:1836
-
C:\Windows\SysWOW64\rdgetds.exeC:\Windows\system32\rdgetds.exe 1128 "C:\Windows\SysWOW64\ixfgddf.exe"109⤵PID:2228
-
C:\Windows\SysWOW64\fqpuzhr.exeC:\Windows\system32\fqpuzhr.exe 1120 "C:\Windows\SysWOW64\rdgetds.exe"110⤵PID:2096
-
C:\Windows\SysWOW64\rpswqpo.exeC:\Windows\system32\rpswqpo.exe 1132 "C:\Windows\SysWOW64\fqpuzhr.exe"111⤵PID:2672
-
C:\Windows\SysWOW64\cowuaow.exeC:\Windows\system32\cowuaow.exe 1136 "C:\Windows\SysWOW64\rpswqpo.exe"112⤵PID:1876
-
C:\Windows\SysWOW64\oqcjmsi.exeC:\Windows\system32\oqcjmsi.exe 1140 "C:\Windows\SysWOW64\cowuaow.exe"113⤵PID:572
-
C:\Windows\SysWOW64\yssuzvp.exeC:\Windows\system32\yssuzvp.exe 1148 "C:\Windows\SysWOW64\oqcjmsi.exe"114⤵
- Drops file in System32 directory
PID:1028 -
C:\Windows\SysWOW64\lfjjfzn.exeC:\Windows\system32\lfjjfzn.exe 1144 "C:\Windows\SysWOW64\yssuzvp.exe"115⤵PID:2400
-
C:\Windows\SysWOW64\vqzuacu.exeC:\Windows\system32\vqzuacu.exe 1152 "C:\Windows\SysWOW64\lfjjfzn.exe"116⤵PID:780
-
C:\Windows\SysWOW64\fsoenfi.exeC:\Windows\system32\fsoenfi.exe 1168 "C:\Windows\SysWOW64\vqzuacu.exe"117⤵PID:496
-
C:\Windows\SysWOW64\sngutbh.exeC:\Windows\system32\sngutbh.exe 1160 "C:\Windows\SysWOW64\fsoenfi.exe"118⤵
- System Location Discovery: System Language Discovery
PID:2516 -
C:\Windows\SysWOW64\fhmkeol.exeC:\Windows\system32\fhmkeol.exe 1156 "C:\Windows\SysWOW64\sngutbh.exe"119⤵PID:2972
-
C:\Windows\SysWOW64\psbuzrr.exeC:\Windows\system32\psbuzrr.exe 1172 "C:\Windows\SysWOW64\fhmkeol.exe"120⤵PID:1348
-
C:\Windows\SysWOW64\cjwxizx.exeC:\Windows\system32\cjwxizx.exe 984 "C:\Windows\SysWOW64\psbuzrr.exe"121⤵PID:1540
-
C:\Windows\SysWOW64\phzzrzc.exeC:\Windows\system32\phzzrzc.exe 1176 "C:\Windows\SysWOW64\cjwxizx.exe"122⤵
- Drops file in System32 directory
PID:2276
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-