Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 02:12
Static task
static1
Behavioral task
behavioral1
Sample
e8216928140bffcfa84651878c8cd2bf_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e8216928140bffcfa84651878c8cd2bf_JaffaCakes118.exe
-
Size
525KB
-
MD5
e8216928140bffcfa84651878c8cd2bf
-
SHA1
c32bc59647218ef6e6999aaf1a14c29222e8662e
-
SHA256
2800a97346bd8285936c37e37ff5e6e66401505b74b2254701a49c3939a2276c
-
SHA512
ac3bc1a0fc8bd09b8207a473987f196fc5ef349cf41c5ef8780218db08fe9703e3371ba8a8b78158dd3f78bed3f7e4060b03915895f21e79b5e8993d95391dbd
-
SSDEEP
12288:3iYv5bpOsXGZc36keHMHFPRD2MzedARika7OJilGDM/kY7kvj:3iYrOBi6MHFg+eCS8G6M/Ry
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 64 IoCs
pid Process 2796 kqsbdf.exe 2656 wdgjxl.exe 2132 teqobw.exe 1208 itzhhb.exe 1120 ffvcxe.exe 1784 ixmrqa.exe 2324 rajcld.exe 1764 czozvc.exe 2892 bdaxst.exe 2628 qwwsch.exe 3032 vyfmsm.exe 2000 fauxfp.exe 1496 neecxa.exe 1772 vfdcdh.exe 2244 akxkxr.exe 1724 mmdaid.exe 1432 rchvej.exe 2740 zdgnty.exe 3004 oodium.exe 2092 ycefst.exe 2152 nwbsch.exe 1864 amvvlp.exe 588 icrnxf.exe 2592 vsmqnn.exe 1692 husfzr.exe 2272 uhjvfv.exe 1604 ekzfsy.exe 2240 rxivyc.exe 2908 bigftx.exe 2336 oyaibf.exe 3012 vrznqz.exe 2552 lwhium.exe 892 vyxtqq.exe 2764 ixrvyq.exe 2548 vnmyhy.exe 2748 fykiub.exe 804 mgxboq.exe 2676 zwsdxz.exe 2052 zendjo.exe 1672 lciysw.exe 1060 wyjrhr.exe 2316 gaybvu.exe 2692 qwzlco.exe 396 akajao.exe 1272 kjeglm.exe 2460 xwwwqq.exe 2088 fagjib.exe 2028 rgpews.exe 1612 bfbbgr.exe 2140 oewepz.exe 2284 ydibhy.exe 340 inxmvt.exe 2264 vahjax.exe 2928 fdwmwa.exe 2684 qyxedu.exe 1660 ajnory.exe 2948 kizmjw.exe 2564 xzupsf.exe 2468 hjjzfa.exe 1108 tamcni.exe 484 ezqzgh.exe 1932 qbwprt.exe 2216 dzrjat.exe 2984 qqumib.exe -
Identifies Wine through registry keys 2 TTPs 64 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine zwmrxt.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine dqmvlv.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine vqsrng.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine yqmbmi.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine vjjcoi.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine otjszs.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine ctzjst.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine lbsxpx.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine grehpf.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine iythmh.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine saibmr.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine daunda.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine msuute.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine zwsdxz.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine wyjrhr.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine laryvi.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine iqqhfm.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine tmodve.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine bxbdos.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine pjulbt.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine epqcty.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine ltdttf.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine ezqzgh.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine evrjom.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine ybxvna.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine bnxjlj.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine hqpumu.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine uwbviv.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine fghxps.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine bigftx.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine syqyqe.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine xsvyxg.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine bsyyyn.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine lxjuie.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine jlvwfm.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine jmvvqj.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine ugdrfq.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine lcnsoc.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine jfimmi.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine srfsxz.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine ygkfoo.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine dxlwag.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine qvomni.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine dzrjat.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine hrlkou.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine ikvcmq.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine gcgjyx.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine szbkob.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine ajfsjt.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine wtbara.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine opuhcb.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine vyfmsm.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine vhyoxt.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine vwvmob.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine staetn.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine qzjscn.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine curnvr.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine kckbrv.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine shmvys.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine vsmqnn.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine oukjkp.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine vmywgs.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine kgsspf.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine uhdqrn.exe -
Loads dropped DLL 64 IoCs
pid Process 1076 e8216928140bffcfa84651878c8cd2bf_JaffaCakes118.exe 1076 e8216928140bffcfa84651878c8cd2bf_JaffaCakes118.exe 2796 kqsbdf.exe 2796 kqsbdf.exe 2656 wdgjxl.exe 2656 wdgjxl.exe 2132 teqobw.exe 2132 teqobw.exe 1208 itzhhb.exe 1208 itzhhb.exe 1120 ffvcxe.exe 1120 ffvcxe.exe 1784 ixmrqa.exe 1784 ixmrqa.exe 2324 rajcld.exe 2324 rajcld.exe 1764 czozvc.exe 1764 czozvc.exe 2892 bdaxst.exe 2892 bdaxst.exe 2628 qwwsch.exe 2628 qwwsch.exe 3032 vyfmsm.exe 3032 vyfmsm.exe 2000 fauxfp.exe 2000 fauxfp.exe 1496 neecxa.exe 1496 neecxa.exe 1772 vfdcdh.exe 1772 vfdcdh.exe 2244 akxkxr.exe 2244 akxkxr.exe 1724 mmdaid.exe 1724 mmdaid.exe 1432 rchvej.exe 1432 rchvej.exe 2740 zdgnty.exe 2740 zdgnty.exe 3004 oodium.exe 3004 oodium.exe 2092 ycefst.exe 2092 ycefst.exe 2152 nwbsch.exe 2152 nwbsch.exe 1864 amvvlp.exe 1864 amvvlp.exe 588 icrnxf.exe 588 icrnxf.exe 2592 vsmqnn.exe 2592 vsmqnn.exe 1692 husfzr.exe 1692 husfzr.exe 2272 uhjvfv.exe 2272 uhjvfv.exe 1604 ekzfsy.exe 1604 ekzfsy.exe 2240 rxivyc.exe 2240 rxivyc.exe 2908 bigftx.exe 2908 bigftx.exe 2336 oyaibf.exe 2336 oyaibf.exe 3012 vrznqz.exe 3012 vrznqz.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\sujxbf.exe fvoutf.exe File opened for modification C:\Windows\SysWOW64\gvciee.exe xhkkgx.exe File created C:\Windows\SysWOW64\grehpf.exe tajegf.exe File created C:\Windows\SysWOW64\ugqlqm.exe iqvjhe.exe File created C:\Windows\SysWOW64\bfbbgr.exe rgpews.exe File opened for modification C:\Windows\SysWOW64\kgmqvm.exe yhrnnl.exe File opened for modification C:\Windows\SysWOW64\pywesu.exe chbbju.exe File created C:\Windows\SysWOW64\uwbviv.exe hgytzn.exe File created C:\Windows\SysWOW64\agxeqr.exe npcbhr.exe File opened for modification C:\Windows\SysWOW64\gqdqwq.exe tzinni.exe File created C:\Windows\SysWOW64\dkrktk.exe rtoicj.exe File created C:\Windows\SysWOW64\jjeutu.exe wwuwnq.exe File created C:\Windows\SysWOW64\sjlodw.exe flilvw.exe File opened for modification C:\Windows\SysWOW64\ekzfsy.exe uhjvfv.exe File opened for modification C:\Windows\SysWOW64\qswjrm.exe dutgim.exe File created C:\Windows\SysWOW64\fkbdwy.exe slgaox.exe File created C:\Windows\SysWOW64\jkajgp.exe zwzlqi.exe File opened for modification C:\Windows\SysWOW64\gpavfm.exe tqfswd.exe File created C:\Windows\SysWOW64\lxqqkh.exe bjpsuz.exe File opened for modification C:\Windows\SysWOW64\cdjfin.exe pehczn.exe File opened for modification C:\Windows\SysWOW64\xbpaot.exe kkmyfl.exe File created C:\Windows\SysWOW64\qimnbs.exe dkrktk.exe File opened for modification C:\Windows\SysWOW64\nnhfah.exe aoncrz.exe File opened for modification C:\Windows\SysWOW64\skgjca.exe fulhua.exe File opened for modification C:\Windows\SysWOW64\gzytmd.exe tavqev.exe File created C:\Windows\SysWOW64\cprgus.exe pzwdls.exe File created C:\Windows\SysWOW64\oubycp.exe foabmi.exe File opened for modification C:\Windows\SysWOW64\wwdovq.exe jfimmi.exe File created C:\Windows\SysWOW64\roosbk.exe eytpsc.exe File opened for modification C:\Windows\SysWOW64\npcbhr.exe dnmruo.exe File opened for modification C:\Windows\SysWOW64\iqqhfm.exe vokrth.exe File created C:\Windows\SysWOW64\qtimhz.exe ddnjzr.exe File opened for modification C:\Windows\SysWOW64\dioqiq.exe qjtwsi.exe File created C:\Windows\SysWOW64\aoesjz.exe riduta.exe File created C:\Windows\SysWOW64\svoixc.exe jhnkhd.exe File created C:\Windows\SysWOW64\ybxvna.exe onwgxs.exe File opened for modification C:\Windows\SysWOW64\khpduq.exe yqmbmi.exe File opened for modification C:\Windows\SysWOW64\vokrth.exe mmmpge.exe File created C:\Windows\SysWOW64\fkqnjy.exe stnsby.exe File created C:\Windows\SysWOW64\epqcty.exe ubpfvq.exe File opened for modification C:\Windows\SysWOW64\myejha.exe zhbgyr.exe File created C:\Windows\SysWOW64\mscwih.exe zbzbzh.exe File opened for modification C:\Windows\SysWOW64\pehczn.exe fygmjg.exe File opened for modification C:\Windows\SysWOW64\mnyvtu.exe zpdsku.exe File created C:\Windows\SysWOW64\ylspxt.exe lnxnot.exe File opened for modification C:\Windows\SysWOW64\vflnvr.exe igqkmj.exe File opened for modification C:\Windows\SysWOW64\hqyfvu.exe uadcml.exe File opened for modification C:\Windows\SysWOW64\rxivjp.exe ezfsbp.exe File opened for modification C:\Windows\SysWOW64\odwmbu.exe bebrtt.exe File opened for modification C:\Windows\SysWOW64\jvpxho.exe xxmvyn.exe File opened for modification C:\Windows\SysWOW64\ycefst.exe oodium.exe File opened for modification C:\Windows\SysWOW64\kjeglm.exe akajao.exe File opened for modification C:\Windows\SysWOW64\eretwk.exe rajroc.exe File created C:\Windows\SysWOW64\qjzkus.exe hvyvel.exe File created C:\Windows\SysWOW64\ldoimi.exe bsyyyn.exe File opened for modification C:\Windows\SysWOW64\xlpeqm.exe njstdq.exe File opened for modification C:\Windows\SysWOW64\upxuoc.exe hrcrgu.exe File opened for modification C:\Windows\SysWOW64\mxxjpw.exe zguhyo.exe File created C:\Windows\SysWOW64\uxeswl.exe hgjpfc.exe File created C:\Windows\SysWOW64\jbvxvh.exe wlaumz.exe File created C:\Windows\SysWOW64\bphzrv.exe oyfxau.exe File created C:\Windows\SysWOW64\ddtltk.exe qfyikc.exe File created C:\Windows\SysWOW64\itzhhb.exe teqobw.exe File created C:\Windows\SysWOW64\ogybfk.exe bidyxc.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qbspvl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fznviw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zckjxs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qyqtry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chbbju.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qerzmm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xbmead.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zggtoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language indtyk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdomzl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiyfii.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yhorzw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rtfpuj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvpxho.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ahlrtc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dkrktk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adkijh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dxlwag.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jrpofy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yjkdjq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntcpal.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dgoxde.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qdyeae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oncuzd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flmspi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gefdvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ogybfk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xkjdld.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sarmvr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yujbof.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ydiqkx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aefwvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jasbwc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language krkdwt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language znfjzv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pntjjl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cakurm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jrvczi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlmlwu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ympyjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdiuzc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlxsgy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctzjst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uglamb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language earqxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language votxiu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language teqobw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jhrsrs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hykbjk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iqqhfm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language staetn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hgytzn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language haqjys.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pywesu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language swjvwh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pupdde.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ynsuia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uevzfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wvatwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hvyvel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language citauj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language otoujp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ezqzgh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kkkzuz.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1076 wrote to memory of 2796 1076 e8216928140bffcfa84651878c8cd2bf_JaffaCakes118.exe 30 PID 1076 wrote to memory of 2796 1076 e8216928140bffcfa84651878c8cd2bf_JaffaCakes118.exe 30 PID 1076 wrote to memory of 2796 1076 e8216928140bffcfa84651878c8cd2bf_JaffaCakes118.exe 30 PID 1076 wrote to memory of 2796 1076 e8216928140bffcfa84651878c8cd2bf_JaffaCakes118.exe 30 PID 2796 wrote to memory of 2656 2796 kqsbdf.exe 31 PID 2796 wrote to memory of 2656 2796 kqsbdf.exe 31 PID 2796 wrote to memory of 2656 2796 kqsbdf.exe 31 PID 2796 wrote to memory of 2656 2796 kqsbdf.exe 31 PID 2656 wrote to memory of 2132 2656 wdgjxl.exe 32 PID 2656 wrote to memory of 2132 2656 wdgjxl.exe 32 PID 2656 wrote to memory of 2132 2656 wdgjxl.exe 32 PID 2656 wrote to memory of 2132 2656 wdgjxl.exe 32 PID 2132 wrote to memory of 1208 2132 teqobw.exe 33 PID 2132 wrote to memory of 1208 2132 teqobw.exe 33 PID 2132 wrote to memory of 1208 2132 teqobw.exe 33 PID 2132 wrote to memory of 1208 2132 teqobw.exe 33 PID 1208 wrote to memory of 1120 1208 itzhhb.exe 34 PID 1208 wrote to memory of 1120 1208 itzhhb.exe 34 PID 1208 wrote to memory of 1120 1208 itzhhb.exe 34 PID 1208 wrote to memory of 1120 1208 itzhhb.exe 34 PID 1120 wrote to memory of 1784 1120 ffvcxe.exe 35 PID 1120 wrote to memory of 1784 1120 ffvcxe.exe 35 PID 1120 wrote to memory of 1784 1120 ffvcxe.exe 35 PID 1120 wrote to memory of 1784 1120 ffvcxe.exe 35 PID 1784 wrote to memory of 2324 1784 ixmrqa.exe 36 PID 1784 wrote to memory of 2324 1784 ixmrqa.exe 36 PID 1784 wrote to memory of 2324 1784 ixmrqa.exe 36 PID 1784 wrote to memory of 2324 1784 ixmrqa.exe 36 PID 2324 wrote to memory of 1764 2324 rajcld.exe 37 PID 2324 wrote to memory of 1764 2324 rajcld.exe 37 PID 2324 wrote to memory of 1764 2324 rajcld.exe 37 PID 2324 wrote to memory of 1764 2324 rajcld.exe 37 PID 1764 wrote to memory of 2892 1764 czozvc.exe 38 PID 1764 wrote to memory of 2892 1764 czozvc.exe 38 PID 1764 wrote to memory of 2892 1764 czozvc.exe 38 PID 1764 wrote to memory of 2892 1764 czozvc.exe 38 PID 2892 wrote to memory of 2628 2892 bdaxst.exe 39 PID 2892 wrote to memory of 2628 2892 bdaxst.exe 39 PID 2892 wrote to memory of 2628 2892 bdaxst.exe 39 PID 2892 wrote to memory of 2628 2892 bdaxst.exe 39 PID 2628 wrote to memory of 3032 2628 qwwsch.exe 40 PID 2628 wrote to memory of 3032 2628 qwwsch.exe 40 PID 2628 wrote to memory of 3032 2628 qwwsch.exe 40 PID 2628 wrote to memory of 3032 2628 qwwsch.exe 40 PID 3032 wrote to memory of 2000 3032 vyfmsm.exe 41 PID 3032 wrote to memory of 2000 3032 vyfmsm.exe 41 PID 3032 wrote to memory of 2000 3032 vyfmsm.exe 41 PID 3032 wrote to memory of 2000 3032 vyfmsm.exe 41 PID 2000 wrote to memory of 1496 2000 fauxfp.exe 42 PID 2000 wrote to memory of 1496 2000 fauxfp.exe 42 PID 2000 wrote to memory of 1496 2000 fauxfp.exe 42 PID 2000 wrote to memory of 1496 2000 fauxfp.exe 42 PID 1496 wrote to memory of 1772 1496 neecxa.exe 43 PID 1496 wrote to memory of 1772 1496 neecxa.exe 43 PID 1496 wrote to memory of 1772 1496 neecxa.exe 43 PID 1496 wrote to memory of 1772 1496 neecxa.exe 43 PID 1772 wrote to memory of 2244 1772 vfdcdh.exe 44 PID 1772 wrote to memory of 2244 1772 vfdcdh.exe 44 PID 1772 wrote to memory of 2244 1772 vfdcdh.exe 44 PID 1772 wrote to memory of 2244 1772 vfdcdh.exe 44 PID 2244 wrote to memory of 1724 2244 akxkxr.exe 45 PID 2244 wrote to memory of 1724 2244 akxkxr.exe 45 PID 2244 wrote to memory of 1724 2244 akxkxr.exe 45 PID 2244 wrote to memory of 1724 2244 akxkxr.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8216928140bffcfa84651878c8cd2bf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e8216928140bffcfa84651878c8cd2bf_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\SysWOW64\kqsbdf.exeC:\Windows\system32\kqsbdf.exe 644 "C:\Users\Admin\AppData\Local\Temp\e8216928140bffcfa84651878c8cd2bf_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\wdgjxl.exeC:\Windows\system32\wdgjxl.exe 612 "C:\Windows\SysWOW64\kqsbdf.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\teqobw.exeC:\Windows\system32\teqobw.exe 616 "C:\Windows\SysWOW64\wdgjxl.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\itzhhb.exeC:\Windows\system32\itzhhb.exe 624 "C:\Windows\SysWOW64\teqobw.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\SysWOW64\ffvcxe.exeC:\Windows\system32\ffvcxe.exe 620 "C:\Windows\SysWOW64\itzhhb.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\ixmrqa.exeC:\Windows\system32\ixmrqa.exe 628 "C:\Windows\SysWOW64\ffvcxe.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\rajcld.exeC:\Windows\system32\rajcld.exe 648 "C:\Windows\SysWOW64\ixmrqa.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\czozvc.exeC:\Windows\system32\czozvc.exe 720 "C:\Windows\SysWOW64\rajcld.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\bdaxst.exeC:\Windows\system32\bdaxst.exe 632 "C:\Windows\SysWOW64\czozvc.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\qwwsch.exeC:\Windows\system32\qwwsch.exe 724 "C:\Windows\SysWOW64\bdaxst.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\vyfmsm.exeC:\Windows\system32\vyfmsm.exe 640 "C:\Windows\SysWOW64\qwwsch.exe"12⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\fauxfp.exeC:\Windows\system32\fauxfp.exe 732 "C:\Windows\SysWOW64\vyfmsm.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\neecxa.exeC:\Windows\system32\neecxa.exe 652 "C:\Windows\SysWOW64\fauxfp.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\vfdcdh.exeC:\Windows\system32\vfdcdh.exe 660 "C:\Windows\SysWOW64\neecxa.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\akxkxr.exeC:\Windows\system32\akxkxr.exe 684 "C:\Windows\SysWOW64\vfdcdh.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\mmdaid.exeC:\Windows\system32\mmdaid.exe 748 "C:\Windows\SysWOW64\akxkxr.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1724 -
C:\Windows\SysWOW64\rchvej.exeC:\Windows\system32\rchvej.exe 756 "C:\Windows\SysWOW64\mmdaid.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1432 -
C:\Windows\SysWOW64\zdgnty.exeC:\Windows\system32\zdgnty.exe 692 "C:\Windows\SysWOW64\rchvej.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2740 -
C:\Windows\SysWOW64\oodium.exeC:\Windows\system32\oodium.exe 768 "C:\Windows\SysWOW64\zdgnty.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:3004 -
C:\Windows\SysWOW64\ycefst.exeC:\Windows\system32\ycefst.exe 760 "C:\Windows\SysWOW64\oodium.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2092 -
C:\Windows\SysWOW64\nwbsch.exeC:\Windows\system32\nwbsch.exe 772 "C:\Windows\SysWOW64\ycefst.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2152 -
C:\Windows\SysWOW64\amvvlp.exeC:\Windows\system32\amvvlp.exe 776 "C:\Windows\SysWOW64\nwbsch.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1864 -
C:\Windows\SysWOW64\icrnxf.exeC:\Windows\system32\icrnxf.exe 780 "C:\Windows\SysWOW64\amvvlp.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:588 -
C:\Windows\SysWOW64\vsmqnn.exeC:\Windows\system32\vsmqnn.exe 784 "C:\Windows\SysWOW64\icrnxf.exe"25⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
PID:2592 -
C:\Windows\SysWOW64\husfzr.exeC:\Windows\system32\husfzr.exe 796 "C:\Windows\SysWOW64\vsmqnn.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1692 -
C:\Windows\SysWOW64\uhjvfv.exeC:\Windows\system32\uhjvfv.exe 788 "C:\Windows\SysWOW64\husfzr.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2272 -
C:\Windows\SysWOW64\ekzfsy.exeC:\Windows\system32\ekzfsy.exe 800 "C:\Windows\SysWOW64\uhjvfv.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1604 -
C:\Windows\SysWOW64\rxivyc.exeC:\Windows\system32\rxivyc.exe 792 "C:\Windows\SysWOW64\ekzfsy.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2240 -
C:\Windows\SysWOW64\bigftx.exeC:\Windows\system32\bigftx.exe 764 "C:\Windows\SysWOW64\rxivyc.exe"30⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
PID:2908 -
C:\Windows\SysWOW64\oyaibf.exeC:\Windows\system32\oyaibf.exe 804 "C:\Windows\SysWOW64\bigftx.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2336 -
C:\Windows\SysWOW64\vrznqz.exeC:\Windows\system32\vrznqz.exe 816 "C:\Windows\SysWOW64\oyaibf.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3012 -
C:\Windows\SysWOW64\lwhium.exeC:\Windows\system32\lwhium.exe 808 "C:\Windows\SysWOW64\vrznqz.exe"33⤵
- Executes dropped EXE
PID:2552 -
C:\Windows\SysWOW64\vyxtqq.exeC:\Windows\system32\vyxtqq.exe 824 "C:\Windows\SysWOW64\lwhium.exe"34⤵
- Executes dropped EXE
PID:892 -
C:\Windows\SysWOW64\ixrvyq.exeC:\Windows\system32\ixrvyq.exe 820 "C:\Windows\SysWOW64\vyxtqq.exe"35⤵
- Executes dropped EXE
PID:2764 -
C:\Windows\SysWOW64\vnmyhy.exeC:\Windows\system32\vnmyhy.exe 828 "C:\Windows\SysWOW64\ixrvyq.exe"36⤵
- Executes dropped EXE
PID:2548 -
C:\Windows\SysWOW64\fykiub.exeC:\Windows\system32\fykiub.exe 832 "C:\Windows\SysWOW64\vnmyhy.exe"37⤵
- Executes dropped EXE
PID:2748 -
C:\Windows\SysWOW64\mgxboq.exeC:\Windows\system32\mgxboq.exe 836 "C:\Windows\SysWOW64\fykiub.exe"38⤵
- Executes dropped EXE
PID:804 -
C:\Windows\SysWOW64\zwsdxz.exeC:\Windows\system32\zwsdxz.exe 840 "C:\Windows\SysWOW64\mgxboq.exe"39⤵
- Executes dropped EXE
- Identifies Wine through registry keys
PID:2676 -
C:\Windows\SysWOW64\zendjo.exeC:\Windows\system32\zendjo.exe 844 "C:\Windows\SysWOW64\zwsdxz.exe"40⤵
- Executes dropped EXE
PID:2052 -
C:\Windows\SysWOW64\lciysw.exeC:\Windows\system32\lciysw.exe 848 "C:\Windows\SysWOW64\zendjo.exe"41⤵
- Executes dropped EXE
PID:1672 -
C:\Windows\SysWOW64\wyjrhr.exeC:\Windows\system32\wyjrhr.exe 852 "C:\Windows\SysWOW64\lciysw.exe"42⤵
- Executes dropped EXE
- Identifies Wine through registry keys
PID:1060 -
C:\Windows\SysWOW64\gaybvu.exeC:\Windows\system32\gaybvu.exe 856 "C:\Windows\SysWOW64\wyjrhr.exe"43⤵
- Executes dropped EXE
PID:2316 -
C:\Windows\SysWOW64\qwzlco.exeC:\Windows\system32\qwzlco.exe 868 "C:\Windows\SysWOW64\gaybvu.exe"44⤵
- Executes dropped EXE
PID:2692 -
C:\Windows\SysWOW64\akajao.exeC:\Windows\system32\akajao.exe 860 "C:\Windows\SysWOW64\qwzlco.exe"45⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:396 -
C:\Windows\SysWOW64\kjeglm.exeC:\Windows\system32\kjeglm.exe 864 "C:\Windows\SysWOW64\akajao.exe"46⤵
- Executes dropped EXE
PID:1272 -
C:\Windows\SysWOW64\xwwwqq.exeC:\Windows\system32\xwwwqq.exe 872 "C:\Windows\SysWOW64\kjeglm.exe"47⤵
- Executes dropped EXE
PID:2460 -
C:\Windows\SysWOW64\fagjib.exeC:\Windows\system32\fagjib.exe 876 "C:\Windows\SysWOW64\xwwwqq.exe"48⤵
- Executes dropped EXE
PID:2088 -
C:\Windows\SysWOW64\rgpews.exeC:\Windows\system32\rgpews.exe 880 "C:\Windows\SysWOW64\fagjib.exe"49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2028 -
C:\Windows\SysWOW64\bfbbgr.exeC:\Windows\system32\bfbbgr.exe 884 "C:\Windows\SysWOW64\rgpews.exe"50⤵
- Executes dropped EXE
PID:1612 -
C:\Windows\SysWOW64\oewepz.exeC:\Windows\system32\oewepz.exe 888 "C:\Windows\SysWOW64\bfbbgr.exe"51⤵
- Executes dropped EXE
PID:2140 -
C:\Windows\SysWOW64\ydibhy.exeC:\Windows\system32\ydibhy.exe 892 "C:\Windows\SysWOW64\oewepz.exe"52⤵
- Executes dropped EXE
PID:2284 -
C:\Windows\SysWOW64\inxmvt.exeC:\Windows\system32\inxmvt.exe 896 "C:\Windows\SysWOW64\ydibhy.exe"53⤵
- Executes dropped EXE
PID:340 -
C:\Windows\SysWOW64\vahjax.exeC:\Windows\system32\vahjax.exe 900 "C:\Windows\SysWOW64\inxmvt.exe"54⤵
- Executes dropped EXE
PID:2264 -
C:\Windows\SysWOW64\fdwmwa.exeC:\Windows\system32\fdwmwa.exe 904 "C:\Windows\SysWOW64\vahjax.exe"55⤵
- Executes dropped EXE
PID:2928 -
C:\Windows\SysWOW64\qyxedu.exeC:\Windows\system32\qyxedu.exe 908 "C:\Windows\SysWOW64\fdwmwa.exe"56⤵
- Executes dropped EXE
PID:2684 -
C:\Windows\SysWOW64\ajnory.exeC:\Windows\system32\ajnory.exe 812 "C:\Windows\SysWOW64\qyxedu.exe"57⤵
- Executes dropped EXE
PID:1660 -
C:\Windows\SysWOW64\kizmjw.exeC:\Windows\system32\kizmjw.exe 752 "C:\Windows\SysWOW64\ajnory.exe"58⤵
- Executes dropped EXE
PID:2948 -
C:\Windows\SysWOW64\xzupsf.exeC:\Windows\system32\xzupsf.exe 916 "C:\Windows\SysWOW64\kizmjw.exe"59⤵
- Executes dropped EXE
PID:2564 -
C:\Windows\SysWOW64\hjjzfa.exeC:\Windows\system32\hjjzfa.exe 924 "C:\Windows\SysWOW64\xzupsf.exe"60⤵
- Executes dropped EXE
PID:2468 -
C:\Windows\SysWOW64\tamcni.exeC:\Windows\system32\tamcni.exe 928 "C:\Windows\SysWOW64\hjjzfa.exe"61⤵
- Executes dropped EXE
PID:1108 -
C:\Windows\SysWOW64\ezqzgh.exeC:\Windows\system32\ezqzgh.exe 920 "C:\Windows\SysWOW64\tamcni.exe"62⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- System Location Discovery: System Language Discovery
PID:484 -
C:\Windows\SysWOW64\qbwprt.exeC:\Windows\system32\qbwprt.exe 936 "C:\Windows\SysWOW64\ezqzgh.exe"63⤵
- Executes dropped EXE
PID:1932 -
C:\Windows\SysWOW64\dzrjat.exeC:\Windows\system32\dzrjat.exe 940 "C:\Windows\SysWOW64\qbwprt.exe"64⤵
- Executes dropped EXE
- Identifies Wine through registry keys
PID:2216 -
C:\Windows\SysWOW64\qqumib.exeC:\Windows\system32\qqumib.exe 932 "C:\Windows\SysWOW64\dzrjat.exe"65⤵
- Executes dropped EXE
PID:2984 -
C:\Windows\SysWOW64\dgoprk.exeC:\Windows\system32\dgoprk.exe 960 "C:\Windows\SysWOW64\qqumib.exe"66⤵PID:1796
-
C:\Windows\SysWOW64\qfjsak.exeC:\Windows\system32\qfjsak.exe 948 "C:\Windows\SysWOW64\dgoprk.exe"67⤵PID:2384
-
C:\Windows\SysWOW64\fygmjg.exeC:\Windows\system32\fygmjg.exe 956 "C:\Windows\SysWOW64\qfjsak.exe"68⤵
- Drops file in System32 directory
PID:2960 -
C:\Windows\SysWOW64\pehczn.exeC:\Windows\system32\pehczn.exe 952 "C:\Windows\SysWOW64\fygmjg.exe"69⤵
- Drops file in System32 directory
PID:2072 -
C:\Windows\SysWOW64\cdjfin.exeC:\Windows\system32\cdjfin.exe 964 "C:\Windows\SysWOW64\pehczn.exe"70⤵PID:1384
-
C:\Windows\SysWOW64\ptehzv.exeC:\Windows\system32\ptehzv.exe 968 "C:\Windows\SysWOW64\cdjfin.exe"71⤵PID:3036
-
C:\Windows\SysWOW64\zeusmy.exeC:\Windows\system32\zeusmy.exe 972 "C:\Windows\SysWOW64\ptehzv.exe"72⤵PID:1996
-
C:\Windows\SysWOW64\picnqe.exeC:\Windows\system32\picnqe.exe 976 "C:\Windows\SysWOW64\zeusmy.exe"73⤵PID:2344
-
C:\Windows\SysWOW64\ztrxdh.exeC:\Windows\system32\ztrxdh.exe 988 "C:\Windows\SysWOW64\picnqe.exe"74⤵PID:2516
-
C:\Windows\SysWOW64\lnxnot.exeC:\Windows\system32\lnxnot.exe 980 "C:\Windows\SysWOW64\ztrxdh.exe"75⤵
- Drops file in System32 directory
PID:1096 -
C:\Windows\SysWOW64\ylspxt.exeC:\Windows\system32\ylspxt.exe 984 "C:\Windows\SysWOW64\lnxnot.exe"76⤵PID:1952
-
C:\Windows\SysWOW64\lcnsoc.exeC:\Windows\system32\lcnsoc.exe 996 "C:\Windows\SysWOW64\ylspxt.exe"77⤵
- Identifies Wine through registry keys
PID:2312 -
C:\Windows\SysWOW64\ysqnwk.exeC:\Windows\system32\ysqnwk.exe 992 "C:\Windows\SysWOW64\lcnsoc.exe"78⤵PID:2032
-
C:\Windows\SysWOW64\igqkmj.exeC:\Windows\system32\igqkmj.exe 1000 "C:\Windows\SysWOW64\ysqnwk.exe"79⤵
- Drops file in System32 directory
PID:2920 -
C:\Windows\SysWOW64\vflnvr.exeC:\Windows\system32\vflnvr.exe 1004 "C:\Windows\SysWOW64\igqkmj.exe"80⤵PID:2500
-
C:\Windows\SysWOW64\hvgpda.exeC:\Windows\system32\hvgpda.exe 1008 "C:\Windows\SysWOW64\vflnvr.exe"81⤵PID:1056
-
C:\Windows\SysWOW64\umjsmi.exeC:\Windows\system32\umjsmi.exe 1012 "C:\Windows\SysWOW64\hvgpda.exe"82⤵PID:2836
-
C:\Windows\SysWOW64\hkevvi.exeC:\Windows\system32\hkevvi.exe 1016 "C:\Windows\SysWOW64\umjsmi.exe"83⤵PID:1152
-
C:\Windows\SysWOW64\ryektp.exeC:\Windows\system32\ryektp.exe 1020 "C:\Windows\SysWOW64\hkevvi.exe"84⤵PID:1760
-
C:\Windows\SysWOW64\epznbx.exeC:\Windows\system32\epznbx.exe 1040 "C:\Windows\SysWOW64\ryektp.exe"85⤵PID:2380
-
C:\Windows\SysWOW64\rcrlht.exeC:\Windows\system32\rcrlht.exe 1028 "C:\Windows\SysWOW64\epznbx.exe"86⤵PID:3068
-
C:\Windows\SysWOW64\wexssg.exeC:\Windows\system32\wexssg.exe 1032 "C:\Windows\SysWOW64\rcrlht.exe"87⤵PID:2328
-
C:\Windows\SysWOW64\jurvbo.exeC:\Windows\system32\jurvbo.exe 1036 "C:\Windows\SysWOW64\wexssg.exe"88⤵PID:2944
-
C:\Windows\SysWOW64\vtmyko.exeC:\Windows\system32\vtmyko.exe 1048 "C:\Windows\SysWOW64\jurvbo.exe"89⤵PID:2180
-
C:\Windows\SysWOW64\fznviw.exeC:\Windows\system32\fznviw.exe 1044 "C:\Windows\SysWOW64\vtmyko.exe"90⤵
- System Location Discovery: System Language Discovery
PID:1780 -
C:\Windows\SysWOW64\syqyqe.exeC:\Windows\system32\syqyqe.exe 1056 "C:\Windows\SysWOW64\fznviw.exe"91⤵
- Identifies Wine through registry keys
PID:2668 -
C:\Windows\SysWOW64\fokaze.exeC:\Windows\system32\fokaze.exe 1052 "C:\Windows\SysWOW64\syqyqe.exe"92⤵PID:1648
-
C:\Windows\SysWOW64\snfdim.exeC:\Windows\system32\snfdim.exe 1060 "C:\Windows\SysWOW64\fokaze.exe"93⤵PID:1360
-
C:\Windows\SysWOW64\fdiyqu.exeC:\Windows\system32\fdiyqu.exe 1064 "C:\Windows\SysWOW64\snfdim.exe"94⤵PID:2572
-
C:\Windows\SysWOW64\orjvoc.exeC:\Windows\system32\orjvoc.exe 1068 "C:\Windows\SysWOW64\fdiyqu.exe"95⤵PID:2752
-
C:\Windows\SysWOW64\bidyxc.exeC:\Windows\system32\bidyxc.exe 1072 "C:\Windows\SysWOW64\orjvoc.exe"96⤵
- Drops file in System32 directory
PID:2808 -
C:\Windows\SysWOW64\ogybfk.exeC:\Windows\system32\ogybfk.exe 1076 "C:\Windows\SysWOW64\bidyxc.exe"97⤵
- System Location Discovery: System Language Discovery
PID:1680 -
C:\Windows\SysWOW64\bxbdos.exeC:\Windows\system32\bxbdos.exe 1080 "C:\Windows\SysWOW64\ogybfk.exe"98⤵
- Identifies Wine through registry keys
PID:1820 -
C:\Windows\SysWOW64\onwgxs.exeC:\Windows\system32\onwgxs.exe 1084 "C:\Windows\SysWOW64\bxbdos.exe"99⤵
- Drops file in System32 directory
PID:928 -
C:\Windows\SysWOW64\ybxvna.exeC:\Windows\system32\ybxvna.exe 1088 "C:\Windows\SysWOW64\onwgxs.exe"100⤵
- Identifies Wine through registry keys
PID:2012 -
C:\Windows\SysWOW64\laryvi.exeC:\Windows\system32\laryvi.exe 1092 "C:\Windows\SysWOW64\ybxvna.exe"101⤵
- Identifies Wine through registry keys
PID:1380 -
C:\Windows\SysWOW64\yqmbmi.exeC:\Windows\system32\yqmbmi.exe 1096 "C:\Windows\SysWOW64\laryvi.exe"102⤵
- Identifies Wine through registry keys
- Drops file in System32 directory
PID:2852 -
C:\Windows\SysWOW64\khpduq.exeC:\Windows\system32\khpduq.exe 1100 "C:\Windows\SysWOW64\yqmbmi.exe"103⤵PID:2912
-
C:\Windows\SysWOW64\xfkgdy.exeC:\Windows\system32\xfkgdy.exe 1104 "C:\Windows\SysWOW64\khpduq.exe"104⤵PID:2400
-
C:\Windows\SysWOW64\htkdtg.exeC:\Windows\system32\htkdtg.exe 1108 "C:\Windows\SysWOW64\xfkgdy.exe"105⤵PID:316
-
C:\Windows\SysWOW64\ukfgcg.exeC:\Windows\system32\ukfgcg.exe 1112 "C:\Windows\SysWOW64\htkdtg.exe"106⤵PID:1812
-
C:\Windows\SysWOW64\haijko.exeC:\Windows\system32\haijko.exe 1116 "C:\Windows\SysWOW64\ukfgcg.exe"107⤵PID:1400
-
C:\Windows\SysWOW64\uzdlbw.exeC:\Windows\system32\uzdlbw.exe 944 "C:\Windows\SysWOW64\haijko.exe"108⤵PID:1552
-
C:\Windows\SysWOW64\hpyokw.exeC:\Windows\system32\hpyokw.exe 1124 "C:\Windows\SysWOW64\uzdlbw.exe"109⤵PID:1584
-
C:\Windows\SysWOW64\qdyeae.exeC:\Windows\system32\qdyeae.exe 1120 "C:\Windows\SysWOW64\hpyokw.exe"110⤵
- System Location Discovery: System Language Discovery
PID:3044 -
C:\Windows\SysWOW64\dutgim.exeC:\Windows\system32\dutgim.exe 1132 "C:\Windows\SysWOW64\qdyeae.exe"111⤵
- Drops file in System32 directory
PID:2420 -
C:\Windows\SysWOW64\qswjrm.exeC:\Windows\system32\qswjrm.exe 1136 "C:\Windows\SysWOW64\dutgim.exe"112⤵PID:2256
-
C:\Windows\SysWOW64\avltmp.exeC:\Windows\system32\avltmp.exe 1140 "C:\Windows\SysWOW64\qswjrm.exe"113⤵PID:2856
-
C:\Windows\SysWOW64\qhloid.exeC:\Windows\system32\qhloid.exe 1144 "C:\Windows\SysWOW64\avltmp.exe"114⤵PID:2364
-
C:\Windows\SysWOW64\anmmgk.exeC:\Windows\system32\anmmgk.exe 1148 "C:\Windows\SysWOW64\qhloid.exe"115⤵PID:632
-
C:\Windows\SysWOW64\nmpopk.exeC:\Windows\system32\nmpopk.exe 1152 "C:\Windows\SysWOW64\anmmgk.exe"116⤵PID:568
-
C:\Windows\SysWOW64\zckjxs.exeC:\Windows\system32\zckjxs.exe 1160 "C:\Windows\SysWOW64\nmpopk.exe"117⤵
- System Location Discovery: System Language Discovery
PID:2860 -
C:\Windows\SysWOW64\mbfmgb.exeC:\Windows\system32\mbfmgb.exe 1156 "C:\Windows\SysWOW64\zckjxs.exe"118⤵PID:600
-
C:\Windows\SysWOW64\zrhoob.exeC:\Windows\system32\zrhoob.exe 1172 "C:\Windows\SysWOW64\mbfmgb.exe"119⤵PID:976
-
C:\Windows\SysWOW64\jfimmi.exeC:\Windows\system32\jfimmi.exe 1164 "C:\Windows\SysWOW64\zrhoob.exe"120⤵
- Identifies Wine through registry keys
- Drops file in System32 directory
PID:2496 -
C:\Windows\SysWOW64\wwdovq.exeC:\Windows\system32\wwdovq.exe 1168 "C:\Windows\SysWOW64\jfimmi.exe"121⤵PID:580
-
C:\Windows\SysWOW64\juyreq.exeC:\Windows\system32\juyreq.exe 1176 "C:\Windows\SysWOW64\wwdovq.exe"122⤵PID:2992
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-