Analysis
-
max time kernel
150s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 12:43
Static task
static1
Behavioral task
behavioral1
Sample
e92431263981551cc065005fb0fc1e5b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e92431263981551cc065005fb0fc1e5b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e92431263981551cc065005fb0fc1e5b_JaffaCakes118.exe
-
Size
136KB
-
MD5
e92431263981551cc065005fb0fc1e5b
-
SHA1
ffbaba29d2b6a2fb03da30796bfd7784d1d91191
-
SHA256
9d26baae4318f5bff0ae55fe3e98ea4e918639a766b9453d189b1e6c21352279
-
SHA512
5e8725a5aa72479f6b239c9122715847e8853cfcaa2fe092e4129450e895948637de1740f42afaa62eda47afb430db038b52a512063e460f7b8322958cb40807
-
SSDEEP
3072:lghyf/VUpgyY9xhGhy3otLz/a+sjBriJFyokBfpzbh+C2oQCZvE:WCSgJ9xhG2Ya+G2yoW9bhrr3BE
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 64 IoCs
pid Process 4852 yekttw.exe 3916 dfsobb.exe 4856 qscehx.exe 2564 ytbewm.exe 1420 nqjeie.exe 2104 bzphld.exe 4020 kkeryh.exe 3036 vffkob.exe 4384 iwamxb.exe 4244 isyfff.exe 1992 sdnpti.exe 3692 dndvxy.exe 736 qamklc.exe 1128 alkvyf.exe 3468 qtvdfo.exe 2172 dofsls.exe 1888 qbwiro.exe 3788 yfgvah.exe 4888 iahgqc.exe 3764 yitoxl.exe 3284 ihxlhk.exe 4376 qiwloz.exe 2236 ipyqts.exe 2596 vcqgyn.exe 5024 fcumjm.exe 3228 ngeraf.exe 4532 dkmmek.exe 3580 nvbwro.exe 3372 vwyetw.exe 1684 fyooga.exe 1444 siuzjr.exe 3404 apirdp.exe 1880 nkzhjk.exe 4764 dpzcny.exe 1856 nkauus.exe 5068 dexheg.exe 1476 qrpxkk.exe 1180 aqtvuj.exe 2556 liiahz.exe 2296 abfnrn.exe 540 kajsbl.exe 1852 xrmvkt.exe 2052 kmvlqx.exe 3028 uliiiw.exe 2616 iyryos.exe 4316 vljouw.exe 1748 fdytym.exe 2724 vxvgii.exe 412 fwzdsh.exe 2896 prawab.exe 764 ajqbnr.exe 1460 nwhrtn.exe 3180 ancubv.exe 3684 kugrmu.exe 4480 xkjuuc.exe 1876 kxsjag.exe 4132 uxfhsf.exe 4808 iglsvw.exe 996 snppgv.exe 4508 cjqznq.exe 2624 qwzptt.exe 1892 fetxad.exe 4112 pdxvsc.exe 3304 cypkyg.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\sryihf.exe feoktb.exe File opened for modification C:\Windows\SysWOW64\dtwwdu.exe rcbtnu.exe File created C:\Windows\SysWOW64\pgiiox.exe clqsit.exe File opened for modification C:\Windows\SysWOW64\fcumjm.exe vcqgyn.exe File opened for modification C:\Windows\SysWOW64\ztfdpd.exe piqsci.exe File opened for modification C:\Windows\SysWOW64\merdpz.exe zulama.exe File created C:\Windows\SysWOW64\fkdhuc.exe sxlroy.exe File opened for modification C:\Windows\SysWOW64\nktjiw.exe axcucs.exe File created C:\Windows\SysWOW64\rmnxaj.exe ewkusi.exe File created C:\Windows\SysWOW64\eqrwic.exe vnbmvh.exe File opened for modification C:\Windows\SysWOW64\sxlroy.exe iyhudz.exe File opened for modification C:\Windows\SysWOW64\fyooga.exe vwyetw.exe File opened for modification C:\Windows\SysWOW64\ubhdrw.exe kzrawt.exe File created C:\Windows\SysWOW64\iggepu.exe vidcgm.exe File opened for modification C:\Windows\SysWOW64\nuvjvj.exe ahemqf.exe File created C:\Windows\SysWOW64\ndqwbe.exe afntsw.exe File created C:\Windows\SysWOW64\dfsobb.exe yekttw.exe File created C:\Windows\SysWOW64\cvtmcz.exe oijowv.exe File opened for modification C:\Windows\SysWOW64\jimywv.exe zbiamx.exe File created C:\Windows\SysWOW64\invcpv.exe vadmjr.exe File created C:\Windows\SysWOW64\hoqylz.exe xdboxv.exe File opened for modification C:\Windows\SysWOW64\eugmuw.exe rhoxpt.exe File created C:\Windows\SysWOW64\rzpqvc.exe hadtlm.exe File opened for modification C:\Windows\SysWOW64\mkfydp.exe ybhvax.exe File opened for modification C:\Windows\SysWOW64\alkvyf.exe qamklc.exe File opened for modification C:\Windows\SysWOW64\cmtkyy.exe pwyhqq.exe File opened for modification C:\Windows\SysWOW64\dcagqw.exe qpircs.exe File created C:\Windows\SysWOW64\fjxatj.exe dktcik.exe File created C:\Windows\SysWOW64\ewkusi.exe uxgxhk.exe File created C:\Windows\SysWOW64\oguteg.exe evfjrd.exe File opened for modification C:\Windows\SysWOW64\vhgufb.exe libxvc.exe File created C:\Windows\SysWOW64\qojlwa.exe dxojos.exe File opened for modification C:\Windows\SysWOW64\dkfmpg.exe qxnwjc.exe File created C:\Windows\SysWOW64\zivxll.exe pxfnyi.exe File created C:\Windows\SysWOW64\tnkfuk.exe fmecjk.exe File created C:\Windows\SysWOW64\iahgqc.exe yfgvah.exe File created C:\Windows\SysWOW64\ubhdrw.exe kzrawt.exe File created C:\Windows\SysWOW64\jfldek.exe wstgyh.exe File created C:\Windows\SysWOW64\eabovy.exe rnjzpu.exe File opened for modification C:\Windows\SysWOW64\jvrsrn.exe zwnugp.exe File opened for modification C:\Windows\SysWOW64\dbwxgh.exe qdtvxz.exe File created C:\Windows\SysWOW64\kvbdrp.exe asltem.exe File created C:\Windows\SysWOW64\rvjhml.exe efofel.exe File opened for modification C:\Windows\SysWOW64\jzrizx.exe wqlywf.exe File opened for modification C:\Windows\SysWOW64\dzlvud.exe qmcfoh.exe File created C:\Windows\SysWOW64\qmdlah.exe dzlvud.exe File created C:\Windows\SysWOW64\nkklbo.exe dzmbgl.exe File created C:\Windows\SysWOW64\jefodr.exe wnklvr.exe File created C:\Windows\SysWOW64\plsroi.exe cuxpfa.exe File created C:\Windows\SysWOW64\kcebce.exe xdjztd.exe File created C:\Windows\SysWOW64\uxgxhk.exe ewjpgb.exe File opened for modification C:\Windows\SysWOW64\bcwsqr.exe rdsvyt.exe File opened for modification C:\Windows\SysWOW64\kuacob.exe yegzyb.exe File opened for modification C:\Windows\SysWOW64\fmnids.exe tnkfuk.exe File opened for modification C:\Windows\SysWOW64\fplwmr.exe vmvmyo.exe File opened for modification C:\Windows\SysWOW64\bpdqra.exe ocmble.exe File opened for modification C:\Windows\SysWOW64\dxojos.exe qcxtiw.exe File created C:\Windows\SysWOW64\agzzfu.exe ntpjzq.exe File opened for modification C:\Windows\SysWOW64\pwzmbx.exe cmtkyy.exe File opened for modification C:\Windows\SysWOW64\qojlwa.exe dxojos.exe File opened for modification C:\Windows\SysWOW64\nllapb.exe ayukjy.exe File created C:\Windows\SysWOW64\petxoc.exe ixfeum.exe File created C:\Windows\SysWOW64\piqsci.exe cvgdwe.exe File created C:\Windows\SysWOW64\vcvssa.exe fcgcrz.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zsbrpg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lojbnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbwxgh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aromdb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rmnxaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vffkob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nvbwro.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ancubv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jbydqy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bcwsqr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rhoxpt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dxojos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbxdrp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kikaqi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language meqxds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hctjrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrnqcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zbiamx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gyrnyn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qrlasx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuvalv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gmtgpx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bwxzsy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yvboly.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vryolh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rkcodo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eokybp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tqxyxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language krolcl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ezpiii.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fmnids.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hgwilo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ioywxv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ngyghp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mxtyei.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zulama.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gvoirn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ojoxxc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language njaylx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zprmnf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sryihf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yfnfou.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ltbwbj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ewjpgb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lkycbo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dzlvud.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wslhkf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ubhdrw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bozocp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vidcgm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xtfdpt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jlzqla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qdtvxz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ktarpb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kvbdrp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bzphld.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kmvlqx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ajqbnr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uilons.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpndcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dlbnes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tteazq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ixfeum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apddyg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5020 wrote to memory of 4852 5020 e92431263981551cc065005fb0fc1e5b_JaffaCakes118.exe 82 PID 5020 wrote to memory of 4852 5020 e92431263981551cc065005fb0fc1e5b_JaffaCakes118.exe 82 PID 5020 wrote to memory of 4852 5020 e92431263981551cc065005fb0fc1e5b_JaffaCakes118.exe 82 PID 4852 wrote to memory of 3916 4852 yekttw.exe 83 PID 4852 wrote to memory of 3916 4852 yekttw.exe 83 PID 4852 wrote to memory of 3916 4852 yekttw.exe 83 PID 3916 wrote to memory of 4856 3916 dfsobb.exe 84 PID 3916 wrote to memory of 4856 3916 dfsobb.exe 84 PID 3916 wrote to memory of 4856 3916 dfsobb.exe 84 PID 4856 wrote to memory of 2564 4856 qscehx.exe 85 PID 4856 wrote to memory of 2564 4856 qscehx.exe 85 PID 4856 wrote to memory of 2564 4856 qscehx.exe 85 PID 2564 wrote to memory of 1420 2564 ytbewm.exe 86 PID 2564 wrote to memory of 1420 2564 ytbewm.exe 86 PID 2564 wrote to memory of 1420 2564 ytbewm.exe 86 PID 1420 wrote to memory of 2104 1420 nqjeie.exe 87 PID 1420 wrote to memory of 2104 1420 nqjeie.exe 87 PID 1420 wrote to memory of 2104 1420 nqjeie.exe 87 PID 2104 wrote to memory of 4020 2104 bzphld.exe 88 PID 2104 wrote to memory of 4020 2104 bzphld.exe 88 PID 2104 wrote to memory of 4020 2104 bzphld.exe 88 PID 4020 wrote to memory of 3036 4020 kkeryh.exe 89 PID 4020 wrote to memory of 3036 4020 kkeryh.exe 89 PID 4020 wrote to memory of 3036 4020 kkeryh.exe 89 PID 3036 wrote to memory of 4384 3036 vffkob.exe 90 PID 3036 wrote to memory of 4384 3036 vffkob.exe 90 PID 3036 wrote to memory of 4384 3036 vffkob.exe 90 PID 4384 wrote to memory of 4244 4384 iwamxb.exe 91 PID 4384 wrote to memory of 4244 4384 iwamxb.exe 91 PID 4384 wrote to memory of 4244 4384 iwamxb.exe 91 PID 4244 wrote to memory of 1992 4244 isyfff.exe 94 PID 4244 wrote to memory of 1992 4244 isyfff.exe 94 PID 4244 wrote to memory of 1992 4244 isyfff.exe 94 PID 1992 wrote to memory of 3692 1992 sdnpti.exe 95 PID 1992 wrote to memory of 3692 1992 sdnpti.exe 95 PID 1992 wrote to memory of 3692 1992 sdnpti.exe 95 PID 3692 wrote to memory of 736 3692 dndvxy.exe 96 PID 3692 wrote to memory of 736 3692 dndvxy.exe 96 PID 3692 wrote to memory of 736 3692 dndvxy.exe 96 PID 736 wrote to memory of 1128 736 qamklc.exe 97 PID 736 wrote to memory of 1128 736 qamklc.exe 97 PID 736 wrote to memory of 1128 736 qamklc.exe 97 PID 1128 wrote to memory of 3468 1128 alkvyf.exe 98 PID 1128 wrote to memory of 3468 1128 alkvyf.exe 98 PID 1128 wrote to memory of 3468 1128 alkvyf.exe 98 PID 3468 wrote to memory of 2172 3468 qtvdfo.exe 100 PID 3468 wrote to memory of 2172 3468 qtvdfo.exe 100 PID 3468 wrote to memory of 2172 3468 qtvdfo.exe 100 PID 2172 wrote to memory of 1888 2172 dofsls.exe 102 PID 2172 wrote to memory of 1888 2172 dofsls.exe 102 PID 2172 wrote to memory of 1888 2172 dofsls.exe 102 PID 1888 wrote to memory of 3788 1888 qbwiro.exe 103 PID 1888 wrote to memory of 3788 1888 qbwiro.exe 103 PID 1888 wrote to memory of 3788 1888 qbwiro.exe 103 PID 3788 wrote to memory of 4888 3788 yfgvah.exe 104 PID 3788 wrote to memory of 4888 3788 yfgvah.exe 104 PID 3788 wrote to memory of 4888 3788 yfgvah.exe 104 PID 4888 wrote to memory of 3764 4888 iahgqc.exe 105 PID 4888 wrote to memory of 3764 4888 iahgqc.exe 105 PID 4888 wrote to memory of 3764 4888 iahgqc.exe 105 PID 3764 wrote to memory of 3284 3764 yitoxl.exe 106 PID 3764 wrote to memory of 3284 3764 yitoxl.exe 106 PID 3764 wrote to memory of 3284 3764 yitoxl.exe 106 PID 3284 wrote to memory of 4376 3284 ihxlhk.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\e92431263981551cc065005fb0fc1e5b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e92431263981551cc065005fb0fc1e5b_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\yekttw.exeC:\Windows\system32\yekttw.exe 1032 "C:\Users\Admin\AppData\Local\Temp\e92431263981551cc065005fb0fc1e5b_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\SysWOW64\dfsobb.exeC:\Windows\system32\dfsobb.exe 1156 "C:\Windows\SysWOW64\yekttw.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\SysWOW64\qscehx.exeC:\Windows\system32\qscehx.exe 1160 "C:\Windows\SysWOW64\dfsobb.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\ytbewm.exeC:\Windows\system32\ytbewm.exe 1164 "C:\Windows\SysWOW64\qscehx.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\nqjeie.exeC:\Windows\system32\nqjeie.exe 1168 "C:\Windows\SysWOW64\ytbewm.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\bzphld.exeC:\Windows\system32\bzphld.exe 1172 "C:\Windows\SysWOW64\nqjeie.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\kkeryh.exeC:\Windows\system32\kkeryh.exe 1152 "C:\Windows\SysWOW64\bzphld.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\SysWOW64\vffkob.exeC:\Windows\system32\vffkob.exe 1176 "C:\Windows\SysWOW64\kkeryh.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\iwamxb.exeC:\Windows\system32\iwamxb.exe 1184 "C:\Windows\SysWOW64\vffkob.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Windows\SysWOW64\isyfff.exeC:\Windows\system32\isyfff.exe 1128 "C:\Windows\SysWOW64\iwamxb.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\SysWOW64\sdnpti.exeC:\Windows\system32\sdnpti.exe 1192 "C:\Windows\SysWOW64\isyfff.exe"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\dndvxy.exeC:\Windows\system32\dndvxy.exe 1196 "C:\Windows\SysWOW64\sdnpti.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\SysWOW64\qamklc.exeC:\Windows\system32\qamklc.exe 1200 "C:\Windows\SysWOW64\dndvxy.exe"14⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\SysWOW64\alkvyf.exeC:\Windows\system32\alkvyf.exe 1204 "C:\Windows\SysWOW64\qamklc.exe"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\SysWOW64\qtvdfo.exeC:\Windows\system32\qtvdfo.exe 1212 "C:\Windows\SysWOW64\alkvyf.exe"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\SysWOW64\dofsls.exeC:\Windows\system32\dofsls.exe 1188 "C:\Windows\SysWOW64\qtvdfo.exe"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\qbwiro.exeC:\Windows\system32\qbwiro.exe 1216 "C:\Windows\SysWOW64\dofsls.exe"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\yfgvah.exeC:\Windows\system32\yfgvah.exe 1208 "C:\Windows\SysWOW64\qbwiro.exe"19⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Windows\SysWOW64\iahgqc.exeC:\Windows\system32\iahgqc.exe 1224 "C:\Windows\SysWOW64\yfgvah.exe"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\yitoxl.exeC:\Windows\system32\yitoxl.exe 1232 "C:\Windows\SysWOW64\iahgqc.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\SysWOW64\ihxlhk.exeC:\Windows\system32\ihxlhk.exe 1220 "C:\Windows\SysWOW64\yitoxl.exe"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Windows\SysWOW64\qiwloz.exeC:\Windows\system32\qiwloz.exe 1228 "C:\Windows\SysWOW64\ihxlhk.exe"23⤵
- Executes dropped EXE
PID:4376 -
C:\Windows\SysWOW64\ipyqts.exeC:\Windows\system32\ipyqts.exe 1148 "C:\Windows\SysWOW64\qiwloz.exe"24⤵
- Executes dropped EXE
PID:2236 -
C:\Windows\SysWOW64\vcqgyn.exeC:\Windows\system32\vcqgyn.exe 1244 "C:\Windows\SysWOW64\ipyqts.exe"25⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2596 -
C:\Windows\SysWOW64\fcumjm.exeC:\Windows\system32\fcumjm.exe 1252 "C:\Windows\SysWOW64\vcqgyn.exe"26⤵
- Executes dropped EXE
PID:5024 -
C:\Windows\SysWOW64\ngeraf.exeC:\Windows\system32\ngeraf.exe 1240 "C:\Windows\SysWOW64\fcumjm.exe"27⤵
- Executes dropped EXE
PID:3228 -
C:\Windows\SysWOW64\dkmmek.exeC:\Windows\system32\dkmmek.exe 1256 "C:\Windows\SysWOW64\ngeraf.exe"28⤵
- Executes dropped EXE
PID:4532 -
C:\Windows\SysWOW64\nvbwro.exeC:\Windows\system32\nvbwro.exe 1280 "C:\Windows\SysWOW64\dkmmek.exe"29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3580 -
C:\Windows\SysWOW64\vwyetw.exeC:\Windows\system32\vwyetw.exe 1260 "C:\Windows\SysWOW64\nvbwro.exe"30⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3372 -
C:\Windows\SysWOW64\fyooga.exeC:\Windows\system32\fyooga.exe 1264 "C:\Windows\SysWOW64\vwyetw.exe"31⤵
- Executes dropped EXE
PID:1684 -
C:\Windows\SysWOW64\siuzjr.exeC:\Windows\system32\siuzjr.exe 1248 "C:\Windows\SysWOW64\fyooga.exe"32⤵
- Executes dropped EXE
PID:1444 -
C:\Windows\SysWOW64\apirdp.exeC:\Windows\system32\apirdp.exe 1272 "C:\Windows\SysWOW64\siuzjr.exe"33⤵
- Executes dropped EXE
PID:3404 -
C:\Windows\SysWOW64\nkzhjk.exeC:\Windows\system32\nkzhjk.exe 1180 "C:\Windows\SysWOW64\apirdp.exe"34⤵
- Executes dropped EXE
PID:1880 -
C:\Windows\SysWOW64\dpzcny.exeC:\Windows\system32\dpzcny.exe 1284 "C:\Windows\SysWOW64\nkzhjk.exe"35⤵
- Executes dropped EXE
PID:4764 -
C:\Windows\SysWOW64\nkauus.exeC:\Windows\system32\nkauus.exe 1276 "C:\Windows\SysWOW64\dpzcny.exe"36⤵
- Executes dropped EXE
PID:1856 -
C:\Windows\SysWOW64\dexheg.exeC:\Windows\system32\dexheg.exe 1292 "C:\Windows\SysWOW64\nkauus.exe"37⤵
- Executes dropped EXE
PID:5068 -
C:\Windows\SysWOW64\qrpxkk.exeC:\Windows\system32\qrpxkk.exe 1296 "C:\Windows\SysWOW64\dexheg.exe"38⤵
- Executes dropped EXE
PID:1476 -
C:\Windows\SysWOW64\aqtvuj.exeC:\Windows\system32\aqtvuj.exe 1268 "C:\Windows\SysWOW64\qrpxkk.exe"39⤵
- Executes dropped EXE
PID:1180 -
C:\Windows\SysWOW64\liiahz.exeC:\Windows\system32\liiahz.exe 1308 "C:\Windows\SysWOW64\aqtvuj.exe"40⤵
- Executes dropped EXE
PID:2556 -
C:\Windows\SysWOW64\abfnrn.exeC:\Windows\system32\abfnrn.exe 1304 "C:\Windows\SysWOW64\liiahz.exe"41⤵
- Executes dropped EXE
PID:2296 -
C:\Windows\SysWOW64\kajsbl.exeC:\Windows\system32\kajsbl.exe 1300 "C:\Windows\SysWOW64\abfnrn.exe"42⤵
- Executes dropped EXE
PID:540 -
C:\Windows\SysWOW64\xrmvkt.exeC:\Windows\system32\xrmvkt.exe 1288 "C:\Windows\SysWOW64\kajsbl.exe"43⤵
- Executes dropped EXE
PID:1852 -
C:\Windows\SysWOW64\kmvlqx.exeC:\Windows\system32\kmvlqx.exe 1320 "C:\Windows\SysWOW64\xrmvkt.exe"44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2052 -
C:\Windows\SysWOW64\uliiiw.exeC:\Windows\system32\uliiiw.exe 1324 "C:\Windows\SysWOW64\kmvlqx.exe"45⤵
- Executes dropped EXE
PID:3028 -
C:\Windows\SysWOW64\iyryos.exeC:\Windows\system32\iyryos.exe 1328 "C:\Windows\SysWOW64\uliiiw.exe"46⤵
- Executes dropped EXE
PID:2616 -
C:\Windows\SysWOW64\vljouw.exeC:\Windows\system32\vljouw.exe 1336 "C:\Windows\SysWOW64\iyryos.exe"47⤵
- Executes dropped EXE
PID:4316 -
C:\Windows\SysWOW64\fdytym.exeC:\Windows\system32\fdytym.exe 1312 "C:\Windows\SysWOW64\vljouw.exe"48⤵
- Executes dropped EXE
PID:1748 -
C:\Windows\SysWOW64\vxvgii.exeC:\Windows\system32\vxvgii.exe 1332 "C:\Windows\SysWOW64\fdytym.exe"49⤵
- Executes dropped EXE
PID:2724 -
C:\Windows\SysWOW64\fwzdsh.exeC:\Windows\system32\fwzdsh.exe 1340 "C:\Windows\SysWOW64\vxvgii.exe"50⤵
- Executes dropped EXE
PID:412 -
C:\Windows\SysWOW64\prawab.exeC:\Windows\system32\prawab.exe 1344 "C:\Windows\SysWOW64\fwzdsh.exe"51⤵
- Executes dropped EXE
PID:2896 -
C:\Windows\SysWOW64\ajqbnr.exeC:\Windows\system32\ajqbnr.exe 1348 "C:\Windows\SysWOW64\prawab.exe"52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:764 -
C:\Windows\SysWOW64\nwhrtn.exeC:\Windows\system32\nwhrtn.exe 1356 "C:\Windows\SysWOW64\ajqbnr.exe"53⤵
- Executes dropped EXE
PID:1460 -
C:\Windows\SysWOW64\ancubv.exeC:\Windows\system32\ancubv.exe 1352 "C:\Windows\SysWOW64\nwhrtn.exe"54⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3180 -
C:\Windows\SysWOW64\kugrmu.exeC:\Windows\system32\kugrmu.exe 1360 "C:\Windows\SysWOW64\ancubv.exe"55⤵
- Executes dropped EXE
PID:3684 -
C:\Windows\SysWOW64\xkjuuc.exeC:\Windows\system32\xkjuuc.exe 1368 "C:\Windows\SysWOW64\kugrmu.exe"56⤵
- Executes dropped EXE
PID:4480 -
C:\Windows\SysWOW64\kxsjag.exeC:\Windows\system32\kxsjag.exe 1372 "C:\Windows\SysWOW64\xkjuuc.exe"57⤵
- Executes dropped EXE
PID:1876 -
C:\Windows\SysWOW64\uxfhsf.exeC:\Windows\system32\uxfhsf.exe 1364 "C:\Windows\SysWOW64\kxsjag.exe"58⤵
- Executes dropped EXE
PID:4132 -
C:\Windows\SysWOW64\iglsvw.exeC:\Windows\system32\iglsvw.exe 1380 "C:\Windows\SysWOW64\uxfhsf.exe"59⤵
- Executes dropped EXE
PID:4808 -
C:\Windows\SysWOW64\snppgv.exeC:\Windows\system32\snppgv.exe 1384 "C:\Windows\SysWOW64\iglsvw.exe"60⤵
- Executes dropped EXE
PID:996 -
C:\Windows\SysWOW64\cjqznq.exeC:\Windows\system32\cjqznq.exe 1388 "C:\Windows\SysWOW64\snppgv.exe"61⤵
- Executes dropped EXE
PID:4508 -
C:\Windows\SysWOW64\qwzptt.exeC:\Windows\system32\qwzptt.exe 1376 "C:\Windows\SysWOW64\cjqznq.exe"62⤵
- Executes dropped EXE
PID:2624 -
C:\Windows\SysWOW64\fetxad.exeC:\Windows\system32\fetxad.exe 1392 "C:\Windows\SysWOW64\qwzptt.exe"63⤵
- Executes dropped EXE
PID:1892 -
C:\Windows\SysWOW64\pdxvsc.exeC:\Windows\system32\pdxvsc.exe 1396 "C:\Windows\SysWOW64\fetxad.exe"64⤵
- Executes dropped EXE
PID:4112 -
C:\Windows\SysWOW64\cypkyg.exeC:\Windows\system32\cypkyg.exe 1404 "C:\Windows\SysWOW64\pdxvsc.exe"65⤵
- Executes dropped EXE
PID:3304 -
C:\Windows\SysWOW64\pojnho.exeC:\Windows\system32\pojnho.exe 1400 "C:\Windows\SysWOW64\cypkyg.exe"66⤵PID:1288
-
C:\Windows\SysWOW64\dbbdns.exeC:\Windows\system32\dbbdns.exe 1408 "C:\Windows\SysWOW64\pojnho.exe"67⤵PID:4560
-
C:\Windows\SysWOW64\mmqnav.exeC:\Windows\system32\mmqnav.exe 1412 "C:\Windows\SysWOW64\dbbdns.exe"68⤵PID:4404
-
C:\Windows\SysWOW64\azadgr.exeC:\Windows\system32\azadgr.exe 1236 "C:\Windows\SysWOW64\mmqnav.exe"69⤵PID:4540
-
C:\Windows\SysWOW64\nignjq.exeC:\Windows\system32\nignjq.exe 1436 "C:\Windows\SysWOW64\azadgr.exe"70⤵PID:2376
-
C:\Windows\SysWOW64\azjqry.exeC:\Windows\system32\azjqry.exe 1424 "C:\Windows\SysWOW64\nignjq.exe"71⤵PID:3296
-
C:\Windows\SysWOW64\hgwilo.exeC:\Windows\system32\hgwilo.exe 1444 "C:\Windows\SysWOW64\azjqry.exe"72⤵
- System Location Discovery: System Language Discovery
PID:2608 -
C:\Windows\SysWOW64\xtfdpt.exeC:\Windows\system32\xtfdpt.exe 1432 "C:\Windows\SysWOW64\hgwilo.exe"73⤵
- System Location Discovery: System Language Discovery
PID:4496 -
C:\Windows\SysWOW64\ioywxv.exeC:\Windows\system32\ioywxv.exe 1420 "C:\Windows\SysWOW64\xtfdpt.exe"74⤵
- System Location Discovery: System Language Discovery
PID:464 -
C:\Windows\SysWOW64\xwrwef.exeC:\Windows\system32\xwrwef.exe 1440 "C:\Windows\SysWOW64\ioywxv.exe"75⤵PID:4880
-
C:\Windows\SysWOW64\askolz.exeC:\Windows\system32\askolz.exe 1448 "C:\Windows\SysWOW64\xwrwef.exe"76⤵PID:760
-
C:\Windows\SysWOW64\nqnrui.exeC:\Windows\system32\nqnrui.exe 1452 "C:\Windows\SysWOW64\askolz.exe"77⤵PID:2932
-
C:\Windows\SysWOW64\adwhid.exeC:\Windows\system32\adwhid.exe 1416 "C:\Windows\SysWOW64\nqnrui.exe"78⤵PID:64
-
C:\Windows\SysWOW64\kgmrvg.exeC:\Windows\system32\kgmrvg.exe 1428 "C:\Windows\SysWOW64\adwhid.exe"79⤵PID:1272
-
C:\Windows\SysWOW64\ucmbdb.exeC:\Windows\system32\ucmbdb.exe 1460 "C:\Windows\SysWOW64\kgmrvg.exe"80⤵PID:868
-
C:\Windows\SysWOW64\hahelj.exeC:\Windows\system32\hahelj.exe 1456 "C:\Windows\SysWOW64\ucmbdb.exe"81⤵PID:3912
-
C:\Windows\SysWOW64\xbemms.exeC:\Windows\system32\xbemms.exe 1468 "C:\Windows\SysWOW64\hahelj.exe"82⤵PID:3132
-
C:\Windows\SysWOW64\ixfeum.exeC:\Windows\system32\ixfeum.exe 1476 "C:\Windows\SysWOW64\xbemms.exe"83⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1392 -
C:\Windows\SysWOW64\petxoc.exeC:\Windows\system32\petxoc.exe 1480 "C:\Windows\SysWOW64\ixfeum.exe"84⤵PID:5048
-
C:\Windows\SysWOW64\eypkyq.exeC:\Windows\system32\eypkyq.exe 1472 "C:\Windows\SysWOW64\petxoc.exe"85⤵PID:4024
-
C:\Windows\SysWOW64\pifpdg.exeC:\Windows\system32\pifpdg.exe 1488 "C:\Windows\SysWOW64\eypkyq.exe"86⤵PID:3464
-
C:\Windows\SysWOW64\zprmnf.exeC:\Windows\system32\zprmnf.exe 1484 "C:\Windows\SysWOW64\pifpdg.exe"87⤵
- System Location Discovery: System Language Discovery
PID:100 -
C:\Windows\SysWOW64\pqouoo.exeC:\Windows\system32\pqouoo.exe 1492 "C:\Windows\SysWOW64\zprmnf.exe"88⤵PID:2904
-
C:\Windows\SysWOW64\cvxxdw.exeC:\Windows\system32\cvxxdw.exe 1500 "C:\Windows\SysWOW64\pqouoo.exe"89⤵PID:1344
-
C:\Windows\SysWOW64\nckqni.exeC:\Windows\system32\nckqni.exe 1508 "C:\Windows\SysWOW64\cvxxdw.exe"90⤵PID:3244
-
C:\Windows\SysWOW64\cvgdwe.exeC:\Windows\system32\cvgdwe.exe 1496 "C:\Windows\SysWOW64\nckqni.exe"91⤵
- Drops file in System32 directory
PID:3924 -
C:\Windows\SysWOW64\piqsci.exeC:\Windows\system32\piqsci.exe 1512 "C:\Windows\SysWOW64\cvgdwe.exe"92⤵
- Drops file in System32 directory
PID:4072 -
C:\Windows\SysWOW64\ztfdpd.exeC:\Windows\system32\ztfdpd.exe 1516 "C:\Windows\SysWOW64\piqsci.exe"93⤵PID:1100
-
C:\Windows\SysWOW64\ncmnsd.exeC:\Windows\system32\ncmnsd.exe 1136 "C:\Windows\SysWOW64\ztfdpd.exe"94⤵PID:2912
-
C:\Windows\SysWOW64\apddyg.exeC:\Windows\system32\apddyg.exe 1524 "C:\Windows\SysWOW64\ncmnsd.exe"95⤵
- System Location Discovery: System Language Discovery
PID:2916 -
C:\Windows\SysWOW64\ngyghp.exeC:\Windows\system32\ngyghp.exe 1520 "C:\Windows\SysWOW64\apddyg.exe"96⤵
- System Location Discovery: System Language Discovery
PID:2472 -
C:\Windows\SysWOW64\xrnqcs.exeC:\Windows\system32\xrnqcs.exe 1528 "C:\Windows\SysWOW64\ngyghp.exe"97⤵
- System Location Discovery: System Language Discovery
PID:3816 -
C:\Windows\SysWOW64\kautfj.exeC:\Windows\system32\kautfj.exe 1548 "C:\Windows\SysWOW64\xrnqcs.exe"98⤵PID:4248
-
C:\Windows\SysWOW64\xrxwnr.exeC:\Windows\system32\xrxwnr.exe 1536 "C:\Windows\SysWOW64\kautfj.exe"99⤵PID:1200
-
C:\Windows\SysWOW64\kegltv.exeC:\Windows\system32\kegltv.exe 1532 "C:\Windows\SysWOW64\xrxwnr.exe"100⤵PID:3984
-
C:\Windows\SysWOW64\uovwgy.exeC:\Windows\system32\uovwgy.exe 1544 "C:\Windows\SysWOW64\kegltv.exe"101⤵PID:1008
-
C:\Windows\SysWOW64\hbnlmu.exeC:\Windows\system32\hbnlmu.exe 1556 "C:\Windows\SysWOW64\uovwgy.exe"102⤵PID:4908
-
C:\Windows\SysWOW64\uofjsy.exeC:\Windows\system32\uofjsy.exe 1540 "C:\Windows\SysWOW64\hbnlmu.exe"103⤵PID:1084
-
C:\Windows\SysWOW64\enjgkx.exeC:\Windows\system32\enjgkx.exe 1560 "C:\Windows\SysWOW64\uofjsy.exe"104⤵PID:904
-
C:\Windows\SysWOW64\rmdjtf.exeC:\Windows\system32\rmdjtf.exe 1564 "C:\Windows\SysWOW64\enjgkx.exe"105⤵PID:4212
-
C:\Windows\SysWOW64\fvkmwe.exeC:\Windows\system32\fvkmwe.exe 1552 "C:\Windows\SysWOW64\rmdjtf.exe"106⤵PID:2520
-
C:\Windows\SysWOW64\smnpff.exeC:\Windows\system32\smnpff.exe 1568 "C:\Windows\SysWOW64\fvkmwe.exe"107⤵PID:3280
-
C:\Windows\SysWOW64\clrmpd.exeC:\Windows\system32\clrmpd.exe 1580 "C:\Windows\SysWOW64\smnpff.exe"108⤵PID:4760
-
C:\Windows\SysWOW64\pyicvh.exeC:\Windows\system32\pyicvh.exe 1572 "C:\Windows\SysWOW64\clrmpd.exe"109⤵PID:4500
-
C:\Windows\SysWOW64\cwdedp.exeC:\Windows\system32\cwdedp.exe 1588 "C:\Windows\SysWOW64\pyicvh.exe"110⤵PID:3292
-
C:\Windows\SysWOW64\pjnujt.exeC:\Windows\system32\pjnujt.exe 1584 "C:\Windows\SysWOW64\cwdedp.exe"111⤵PID:4636
-
C:\Windows\SysWOW64\cwespp.exeC:\Windows\system32\cwespp.exe 1596 "C:\Windows\SysWOW64\pjnujt.exe"112⤵PID:3216
-
C:\Windows\SysWOW64\mhucks.exeC:\Windows\system32\mhucks.exe 1600 "C:\Windows\SysWOW64\cwespp.exe"113⤵PID:3628
-
C:\Windows\SysWOW64\zulsqw.exeC:\Windows\system32\zulsqw.exe 1464 "C:\Windows\SysWOW64\mhucks.exe"114⤵PID:3956
-
C:\Windows\SysWOW64\ndrvtw.exeC:\Windows\system32\ndrvtw.exe 1012 "C:\Windows\SysWOW64\zulsqw.exe"115⤵PID:3708
-
C:\Windows\SysWOW64\aumxcw.exeC:\Windows\system32\aumxcw.exe 1604 "C:\Windows\SysWOW64\ndrvtw.exe"116⤵PID:2700
-
C:\Windows\SysWOW64\jecipz.exeC:\Windows\system32\jecipz.exe 1612 "C:\Windows\SysWOW64\aumxcw.exe"117⤵PID:4672
-
C:\Windows\SysWOW64\xrtxdd.exeC:\Windows\system32\xrtxdd.exe 1044 "C:\Windows\SysWOW64\jecipz.exe"118⤵PID:2964
-
C:\Windows\SysWOW64\kbzigc.exeC:\Windows\system32\kbzigc.exe 1624 "C:\Windows\SysWOW64\xrtxdd.exe"119⤵PID:2880
-
C:\Windows\SysWOW64\uepttf.exeC:\Windows\system32\uepttf.exe 1620 "C:\Windows\SysWOW64\kbzigc.exe"120⤵PID:3688
-
C:\Windows\SysWOW64\znvvwf.exeC:\Windows\system32\znvvwf.exe 1004 "C:\Windows\SysWOW64\uepttf.exe"121⤵PID:4768
-
C:\Windows\SysWOW64\jykgja.exeC:\Windows\system32\jykgja.exe 1628 "C:\Windows\SysWOW64\znvvwf.exe"122⤵PID:1560
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-