Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 16:21
Static task
static1
Behavioral task
behavioral1
Sample
ebb8f6a9404068518cf8e14da9df95c5_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ebb8f6a9404068518cf8e14da9df95c5_JaffaCakes118.exe
-
Size
519KB
-
MD5
ebb8f6a9404068518cf8e14da9df95c5
-
SHA1
06851421db48a190c656eaf65d6919cb242572cc
-
SHA256
cb54b281d83fd949fca3317e5d7b9fa941ebb6cc183bea69c7334bd0c0b92461
-
SHA512
6538129c0b64c6d738f3b51eee41d7d6120811106fba35efdbe72b39c08339ee23af657a622608e914a0e156186fadde25fbd3d3a63c24ccc343d14402a56f59
-
SSDEEP
12288:7+wUcCTJ5iUtD/ZDedM7hxUysgX3GkN1+O7YricUWe:7+PcCTJ5igVSWPX3GkmJr9UWe
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 64 IoCs
pid Process 2784 nhlduqy.exe 2668 fhlltzr.exe 1236 jtftmae.exe 1144 zczlnej.exe 1988 logtseg.exe 1716 swclnth.exe 1736 xfkgdyn.exe 2944 xbwlape.exe 2564 zlnbslm.exe 1856 bdnrkhm.exe 1508 dutgimz.exe 888 lvagxtd.exe 2536 ntgwvyr.exe 2108 qauhkpa.exe 2936 rrioiuf.exe 2080 uxpzxmo.exe 2776 zkihivt.exe 1792 excpcxg.exe 1604 voezpdm.exe 1064 gkfrxxm.exe 2188 smlhikr.exe 2172 fdfczkw.exe 1080 sbiehsc.exe 1676 ceypvvi.exe 1984 pcsrddo.exe 1940 ctnumel.exe 2356 mhorkly.exe 2020 zufhqpx.exe 328 mkakypd.exe 2152 ymgakch.exe 2924 ldjcskn.exe 3004 nnyffnt.exe 3008 aethwny.exe 2952 ngzxhad.exe 2352 awcaqii.exe 2448 nvxczio.exe 1128 wjyappb.exe 2112 jwhpvta.exe 876 wqnxgye.exe 684 galibbk.exe 1148 wflcfoh.exe 868 gtlavnu.exe 1564 sjgdewa.exe 1756 fijfmef.exe 2608 syeived.exe 2856 zkdnsgt.exe 448 mifqbgz.exe 1204 xeyaiaa.exe 1100 kubdzix.exe 3000 ufqnmml.exe 2768 gvlqvuj.exe 2908 opkvsnz.exe 2576 etsqotw.exe 1624 lervlme.exe 600 xgxlwzr.exe 1936 kxsofho.exe 2212 xvvqnhu.exe 1068 kmptepz.exe 1764 xckwnyx.exe 2468 hqlldxk.exe 2756 upoolfq.exe 2176 gfiqunv.exe 2732 twdtcnt.exe 1952 dgtdyrh.exe -
Identifies Wine through registry keys 2 TTPs 64 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine iqvjheh.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine xetllhk.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine uyseeqt.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine ebb8f6a9404068518cf8e14da9df95c5_JaffaCakes118.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine isfjlhg.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine rtywtim.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine fhfzsrr.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine yzpkgsl.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine qsznjek.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine iruukge.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine fhbudnj.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine qnyukmd.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine jzskjsl.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine ulspodl.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine gppdman.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine cvayrkr.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine kgzawuo.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine vvmlxua.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine apivxqy.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine xeyaiaa.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine bsafuig.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine icmndwx.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine zexskqt.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine ztmxbyx.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine vtxdmgb.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine ddatazz.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine efamesc.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine mkakypd.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine wqnxgye.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine fijfmef.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine ovvftvl.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine dvkuyzb.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine gsjbqdz.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine vapqlec.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine vmgdzws.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine gilnkyr.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine texglkk.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine mvwbnkg.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine czutlwu.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine xpicrww.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine bweigcu.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine erszbqk.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine zdbfnfh.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine rfmvqkw.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine xdcehxm.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine bkgjquc.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine knsqyzs.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine hbrxbbf.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine tnwbihs.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine pvnexnr.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine cstuclc.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine jvwgocr.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine twkeini.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine cvwjgtm.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine nkwyjwj.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine msgkowm.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine vxqxhop.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine xjzinkn.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine nhawtpx.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine itvinpw.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine avwqstz.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine clkideb.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine ywfoyvi.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine mjwzwaz.exe -
Loads dropped DLL 64 IoCs
pid Process 2280 ebb8f6a9404068518cf8e14da9df95c5_JaffaCakes118.exe 2280 ebb8f6a9404068518cf8e14da9df95c5_JaffaCakes118.exe 2784 nhlduqy.exe 2784 nhlduqy.exe 2668 fhlltzr.exe 2668 fhlltzr.exe 1236 jtftmae.exe 1236 jtftmae.exe 1144 zczlnej.exe 1144 zczlnej.exe 1988 logtseg.exe 1988 logtseg.exe 1716 swclnth.exe 1716 swclnth.exe 1736 xfkgdyn.exe 1736 xfkgdyn.exe 2840 mvtykdg.exe 2840 mvtykdg.exe 2564 zlnbslm.exe 2564 zlnbslm.exe 1856 bdnrkhm.exe 1856 bdnrkhm.exe 1508 dutgimz.exe 1508 dutgimz.exe 888 lvagxtd.exe 888 lvagxtd.exe 2536 ntgwvyr.exe 2536 ntgwvyr.exe 2108 qauhkpa.exe 2108 qauhkpa.exe 2936 rrioiuf.exe 2936 rrioiuf.exe 2080 uxpzxmo.exe 2080 uxpzxmo.exe 2776 zkihivt.exe 2776 zkihivt.exe 1792 excpcxg.exe 1792 excpcxg.exe 1604 voezpdm.exe 1604 voezpdm.exe 1064 gkfrxxm.exe 1064 gkfrxxm.exe 2188 smlhikr.exe 2188 smlhikr.exe 2172 fdfczkw.exe 2172 fdfczkw.exe 1080 sbiehsc.exe 1080 sbiehsc.exe 1676 ceypvvi.exe 1676 ceypvvi.exe 1984 pcsrddo.exe 1984 pcsrddo.exe 1940 ctnumel.exe 1940 ctnumel.exe 2356 mhorkly.exe 2356 mhorkly.exe 2020 zufhqpx.exe 2020 zufhqpx.exe 328 mkakypd.exe 328 mkakypd.exe 2152 ymgakch.exe 2152 ymgakch.exe 2924 ldjcskn.exe 2924 ldjcskn.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\syopeyb.exe isozozo.exe File created C:\Windows\SysWOW64\efcsxos.exe rohpgov.exe File opened for modification C:\Windows\SysWOW64\prxnfel.exe cbclwwf.exe File created C:\Windows\SysWOW64\ohlkshw.exe bjrhjzr.exe File opened for modification C:\Windows\SysWOW64\ztmxbyx.exe mcsvsyr.exe File opened for modification C:\Windows\SysWOW64\vevroig.exe iobpgaa.exe File created C:\Windows\SysWOW64\jirutsq.exe zurevkl.exe File created C:\Windows\SysWOW64\npbpprj.exe cqprxsj.exe File created C:\Windows\SysWOW64\zmrepfy.exe mvobyfa.exe File opened for modification C:\Windows\SysWOW64\ngjuibr.exe xbbzeou.exe File opened for modification C:\Windows\SysWOW64\vfqogkc.exe iovlxcw.exe File created C:\Windows\SysWOW64\rnmuepf.exe fwjrngz.exe File opened for modification C:\Windows\SysWOW64\xpicrww.exe kznzbvq.exe File opened for modification C:\Windows\SysWOW64\purjmoj.exe calcbbx.exe File opened for modification C:\Windows\SysWOW64\sbpdklo.exe ivpfudb.exe File opened for modification C:\Windows\SysWOW64\jrbvdfv.exe zdbfnfh.exe File created C:\Windows\SysWOW64\jartfnl.exe zmrepfy.exe File opened for modification C:\Windows\SysWOW64\zkdnsgt.exe syeived.exe File opened for modification C:\Windows\SysWOW64\qiztjdl.exe dgtdyrh.exe File created C:\Windows\SysWOW64\eectezg.exe rnhqvrb.exe File opened for modification C:\Windows\SysWOW64\aqpgjns.exe nzudafm.exe File created C:\Windows\SysWOW64\egtbsja.exe rpyyciv.exe File opened for modification C:\Windows\SysWOW64\qtnxhzg.exe dvkuyzb.exe File opened for modification C:\Windows\SysWOW64\kdasnql.exe apivxqy.exe File created C:\Windows\SysWOW64\mqyagah.exe ccxditu.exe File created C:\Windows\SysWOW64\digmkwn.exe qrlkbop.exe File opened for modification C:\Windows\SysWOW64\gtlavnu.exe wflcfoh.exe File opened for modification C:\Windows\SysWOW64\rpccfsi.exe ezhaxkk.exe File created C:\Windows\SysWOW64\axvybxc.exe nhawtpx.exe File opened for modification C:\Windows\SysWOW64\nwpbkxa.exe axvybxc.exe File created C:\Windows\SysWOW64\iobpgaa.exe zaaritn.exe File created C:\Windows\SysWOW64\lhmohmn.exe yrrlqeq.exe File created C:\Windows\SysWOW64\zlnbslm.exe mvtykdg.exe File created C:\Windows\SysWOW64\ypphwri.exe mymenrk.exe File created C:\Windows\SysWOW64\ndumlzg.exe dsfbqwz.exe File opened for modification C:\Windows\SysWOW64\msgkowm.exe ztlhyoo.exe File created C:\Windows\SysWOW64\ovrqlta.exe ceoncku.exe File opened for modification C:\Windows\SysWOW64\mqyagah.exe ccxditu.exe File created C:\Windows\SysWOW64\zkdnsgt.exe syeived.exe File opened for modification C:\Windows\SysWOW64\tkhtplu.exe gumzgko.exe File created C:\Windows\SysWOW64\ilzieuh.exe vnwnwmk.exe File opened for modification C:\Windows\SysWOW64\zivtzos.exe qcvwjhe.exe File opened for modification C:\Windows\SysWOW64\kosimav.exe xqxfeaq.exe File opened for modification C:\Windows\SysWOW64\zenpzuz.exe pqmrbvu.exe File opened for modification C:\Windows\SysWOW64\gppdman.exe tymadap.exe File created C:\Windows\SysWOW64\zctgzwe.exe mlzdroh.exe File created C:\Windows\SysWOW64\eaunquo.exe rbzkimi.exe File created C:\Windows\SysWOW64\ridlufh.exe foxwiad.exe File created C:\Windows\SysWOW64\awcaqii.exe ngzxhad.exe File created C:\Windows\SysWOW64\pqdbydd.exe crizqcy.exe File opened for modification C:\Windows\SysWOW64\krmlsxk.exe xbjikof.exe File opened for modification C:\Windows\SysWOW64\vttxgrj.exe idquxid.exe File opened for modification C:\Windows\SysWOW64\akobryt.exe qeodbrg.exe File created C:\Windows\SysWOW64\zvsubzj.exe mtleqme.exe File created C:\Windows\SysWOW64\lvagxtd.exe dutgimz.exe File created C:\Windows\SysWOW64\kkefwkh.exe bweigcu.exe File opened for modification C:\Windows\SysWOW64\celiabk.exe pfjfrtf.exe File opened for modification C:\Windows\SysWOW64\kdruocw.exe ffxrgcq.exe File created C:\Windows\SysWOW64\aqmbrdm.exe ndumlzg.exe File opened for modification C:\Windows\SysWOW64\lhfgsya.exe bxpvfvu.exe File created C:\Windows\SysWOW64\gdkmdgc.exe tnpkvyw.exe File created C:\Windows\SysWOW64\vdzxkqu.exe ineucqo.exe File opened for modification C:\Windows\SysWOW64\ttxartk.exe jfwdblf.exe File created C:\Windows\SysWOW64\xafjpcq.exe hwfolpu.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dqbqreq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sewwcgo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vcafehr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pkvbhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zkrfpji.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vziogko.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fthazoe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mgywhpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lervlme.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kxsofho.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kattrns.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dlitoee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ilzieuh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vcuknun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bijfdol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gqjiiva.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uogtgxj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ucsfcii.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zkmnpcm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thmyjwe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language idtqotz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mjfpzkp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffxrgcq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zvsubzj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xujjyje.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caqxrcw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jhuvuzt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bgmftze.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiwxmns.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language giqpwsx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language efamesc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kmptepz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zvruvkv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language necojlt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kznzbvq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mjhwkef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mpshrwx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iypdvgg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vehlvxo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mhorkly.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvwjgtm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwpbkxa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ikevuva.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vlrtuwr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kbehqfs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shoothw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tqqrdtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvcxmuu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cbclwwf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pldazlo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xbbzeou.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arnsmop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zbraqyy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nkpnxap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rmqhzwt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language exmomrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gumzgko.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bqcxlev.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language napqzji.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language boyposk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pytaalc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fhbudnj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language purjmoj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jhycagl.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2784 2280 ebb8f6a9404068518cf8e14da9df95c5_JaffaCakes118.exe 31 PID 2280 wrote to memory of 2784 2280 ebb8f6a9404068518cf8e14da9df95c5_JaffaCakes118.exe 31 PID 2280 wrote to memory of 2784 2280 ebb8f6a9404068518cf8e14da9df95c5_JaffaCakes118.exe 31 PID 2280 wrote to memory of 2784 2280 ebb8f6a9404068518cf8e14da9df95c5_JaffaCakes118.exe 31 PID 2784 wrote to memory of 2668 2784 nhlduqy.exe 32 PID 2784 wrote to memory of 2668 2784 nhlduqy.exe 32 PID 2784 wrote to memory of 2668 2784 nhlduqy.exe 32 PID 2784 wrote to memory of 2668 2784 nhlduqy.exe 32 PID 2668 wrote to memory of 1236 2668 fhlltzr.exe 33 PID 2668 wrote to memory of 1236 2668 fhlltzr.exe 33 PID 2668 wrote to memory of 1236 2668 fhlltzr.exe 33 PID 2668 wrote to memory of 1236 2668 fhlltzr.exe 33 PID 1236 wrote to memory of 1144 1236 jtftmae.exe 34 PID 1236 wrote to memory of 1144 1236 jtftmae.exe 34 PID 1236 wrote to memory of 1144 1236 jtftmae.exe 34 PID 1236 wrote to memory of 1144 1236 jtftmae.exe 34 PID 1144 wrote to memory of 1988 1144 zczlnej.exe 35 PID 1144 wrote to memory of 1988 1144 zczlnej.exe 35 PID 1144 wrote to memory of 1988 1144 zczlnej.exe 35 PID 1144 wrote to memory of 1988 1144 zczlnej.exe 35 PID 1988 wrote to memory of 1716 1988 logtseg.exe 36 PID 1988 wrote to memory of 1716 1988 logtseg.exe 36 PID 1988 wrote to memory of 1716 1988 logtseg.exe 36 PID 1988 wrote to memory of 1716 1988 logtseg.exe 36 PID 1716 wrote to memory of 1736 1716 swclnth.exe 37 PID 1716 wrote to memory of 1736 1716 swclnth.exe 37 PID 1716 wrote to memory of 1736 1716 swclnth.exe 37 PID 1716 wrote to memory of 1736 1716 swclnth.exe 37 PID 1736 wrote to memory of 2944 1736 xfkgdyn.exe 38 PID 1736 wrote to memory of 2944 1736 xfkgdyn.exe 38 PID 1736 wrote to memory of 2944 1736 xfkgdyn.exe 38 PID 1736 wrote to memory of 2944 1736 xfkgdyn.exe 38 PID 2840 wrote to memory of 2564 2840 mvtykdg.exe 40 PID 2840 wrote to memory of 2564 2840 mvtykdg.exe 40 PID 2840 wrote to memory of 2564 2840 mvtykdg.exe 40 PID 2840 wrote to memory of 2564 2840 mvtykdg.exe 40 PID 2564 wrote to memory of 1856 2564 zlnbslm.exe 41 PID 2564 wrote to memory of 1856 2564 zlnbslm.exe 41 PID 2564 wrote to memory of 1856 2564 zlnbslm.exe 41 PID 2564 wrote to memory of 1856 2564 zlnbslm.exe 41 PID 1856 wrote to memory of 1508 1856 bdnrkhm.exe 42 PID 1856 wrote to memory of 1508 1856 bdnrkhm.exe 42 PID 1856 wrote to memory of 1508 1856 bdnrkhm.exe 42 PID 1856 wrote to memory of 1508 1856 bdnrkhm.exe 42 PID 1508 wrote to memory of 888 1508 dutgimz.exe 43 PID 1508 wrote to memory of 888 1508 dutgimz.exe 43 PID 1508 wrote to memory of 888 1508 dutgimz.exe 43 PID 1508 wrote to memory of 888 1508 dutgimz.exe 43 PID 888 wrote to memory of 2536 888 lvagxtd.exe 44 PID 888 wrote to memory of 2536 888 lvagxtd.exe 44 PID 888 wrote to memory of 2536 888 lvagxtd.exe 44 PID 888 wrote to memory of 2536 888 lvagxtd.exe 44 PID 2536 wrote to memory of 2108 2536 ntgwvyr.exe 45 PID 2536 wrote to memory of 2108 2536 ntgwvyr.exe 45 PID 2536 wrote to memory of 2108 2536 ntgwvyr.exe 45 PID 2536 wrote to memory of 2108 2536 ntgwvyr.exe 45 PID 2108 wrote to memory of 2936 2108 qauhkpa.exe 46 PID 2108 wrote to memory of 2936 2108 qauhkpa.exe 46 PID 2108 wrote to memory of 2936 2108 qauhkpa.exe 46 PID 2108 wrote to memory of 2936 2108 qauhkpa.exe 46 PID 2936 wrote to memory of 2080 2936 rrioiuf.exe 47 PID 2936 wrote to memory of 2080 2936 rrioiuf.exe 47 PID 2936 wrote to memory of 2080 2936 rrioiuf.exe 47 PID 2936 wrote to memory of 2080 2936 rrioiuf.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebb8f6a9404068518cf8e14da9df95c5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ebb8f6a9404068518cf8e14da9df95c5_JaffaCakes118.exe"1⤵
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\nhlduqy.exeC:\Windows\system32\nhlduqy.exe 636 "C:\Users\Admin\AppData\Local\Temp\ebb8f6a9404068518cf8e14da9df95c5_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\fhlltzr.exeC:\Windows\system32\fhlltzr.exe 616 "C:\Windows\SysWOW64\nhlduqy.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\jtftmae.exeC:\Windows\system32\jtftmae.exe 612 "C:\Windows\SysWOW64\fhlltzr.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\SysWOW64\zczlnej.exeC:\Windows\system32\zczlnej.exe 620 "C:\Windows\SysWOW64\jtftmae.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\SysWOW64\logtseg.exeC:\Windows\system32\logtseg.exe 624 "C:\Windows\SysWOW64\zczlnej.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\swclnth.exeC:\Windows\system32\swclnth.exe 716 "C:\Windows\SysWOW64\logtseg.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\xfkgdyn.exeC:\Windows\system32\xfkgdyn.exe 628 "C:\Windows\SysWOW64\swclnth.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\xbwlape.exeC:\Windows\system32\xbwlape.exe 632 "C:\Windows\SysWOW64\xfkgdyn.exe"9⤵
- Executes dropped EXE
PID:2944 -
C:\Windows\SysWOW64\mvtykdg.exeC:\Windows\system32\mvtykdg.exe 732 "C:\Windows\SysWOW64\xbwlape.exe"10⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\zlnbslm.exeC:\Windows\system32\zlnbslm.exe 720 "C:\Windows\SysWOW64\mvtykdg.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\bdnrkhm.exeC:\Windows\system32\bdnrkhm.exe 656 "C:\Windows\SysWOW64\zlnbslm.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\dutgimz.exeC:\Windows\system32\dutgimz.exe 644 "C:\Windows\SysWOW64\bdnrkhm.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\lvagxtd.exeC:\Windows\system32\lvagxtd.exe 648 "C:\Windows\SysWOW64\dutgimz.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\SysWOW64\ntgwvyr.exeC:\Windows\system32\ntgwvyr.exe 700 "C:\Windows\SysWOW64\lvagxtd.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\qauhkpa.exeC:\Windows\system32\qauhkpa.exe 672 "C:\Windows\SysWOW64\ntgwvyr.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\rrioiuf.exeC:\Windows\system32\rrioiuf.exe 712 "C:\Windows\SysWOW64\qauhkpa.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\uxpzxmo.exeC:\Windows\system32\uxpzxmo.exe 676 "C:\Windows\SysWOW64\rrioiuf.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2080 -
C:\Windows\SysWOW64\zkihivt.exeC:\Windows\system32\zkihivt.exe 660 "C:\Windows\SysWOW64\uxpzxmo.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2776 -
C:\Windows\SysWOW64\excpcxg.exeC:\Windows\system32\excpcxg.exe 688 "C:\Windows\SysWOW64\zkihivt.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1792 -
C:\Windows\SysWOW64\voezpdm.exeC:\Windows\system32\voezpdm.exe 772 "C:\Windows\SysWOW64\excpcxg.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1604 -
C:\Windows\SysWOW64\gkfrxxm.exeC:\Windows\system32\gkfrxxm.exe 768 "C:\Windows\SysWOW64\voezpdm.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1064 -
C:\Windows\SysWOW64\smlhikr.exeC:\Windows\system32\smlhikr.exe 776 "C:\Windows\SysWOW64\gkfrxxm.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2188 -
C:\Windows\SysWOW64\fdfczkw.exeC:\Windows\system32\fdfczkw.exe 764 "C:\Windows\SysWOW64\smlhikr.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2172 -
C:\Windows\SysWOW64\sbiehsc.exeC:\Windows\system32\sbiehsc.exe 780 "C:\Windows\SysWOW64\fdfczkw.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1080 -
C:\Windows\SysWOW64\ceypvvi.exeC:\Windows\system32\ceypvvi.exe 788 "C:\Windows\SysWOW64\sbiehsc.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1676 -
C:\Windows\SysWOW64\pcsrddo.exeC:\Windows\system32\pcsrddo.exe 792 "C:\Windows\SysWOW64\ceypvvi.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1984 -
C:\Windows\SysWOW64\ctnumel.exeC:\Windows\system32\ctnumel.exe 796 "C:\Windows\SysWOW64\pcsrddo.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1940 -
C:\Windows\SysWOW64\mhorkly.exeC:\Windows\system32\mhorkly.exe 800 "C:\Windows\SysWOW64\ctnumel.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2356 -
C:\Windows\SysWOW64\zufhqpx.exeC:\Windows\system32\zufhqpx.exe 804 "C:\Windows\SysWOW64\mhorkly.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2020 -
C:\Windows\SysWOW64\mkakypd.exeC:\Windows\system32\mkakypd.exe 784 "C:\Windows\SysWOW64\zufhqpx.exe"31⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
PID:328 -
C:\Windows\SysWOW64\ymgakch.exeC:\Windows\system32\ymgakch.exe 816 "C:\Windows\SysWOW64\mkakypd.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2152 -
C:\Windows\SysWOW64\ldjcskn.exeC:\Windows\system32\ldjcskn.exe 812 "C:\Windows\SysWOW64\ymgakch.exe"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2924 -
C:\Windows\SysWOW64\nnyffnt.exeC:\Windows\system32\nnyffnt.exe 824 "C:\Windows\SysWOW64\ldjcskn.exe"34⤵
- Executes dropped EXE
PID:3004 -
C:\Windows\SysWOW64\aethwny.exeC:\Windows\system32\aethwny.exe 820 "C:\Windows\SysWOW64\nnyffnt.exe"35⤵
- Executes dropped EXE
PID:3008 -
C:\Windows\SysWOW64\ngzxhad.exeC:\Windows\system32\ngzxhad.exe 832 "C:\Windows\SysWOW64\aethwny.exe"36⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2952 -
C:\Windows\SysWOW64\awcaqii.exeC:\Windows\system32\awcaqii.exe 808 "C:\Windows\SysWOW64\ngzxhad.exe"37⤵
- Executes dropped EXE
PID:2352 -
C:\Windows\SysWOW64\nvxczio.exeC:\Windows\system32\nvxczio.exe 840 "C:\Windows\SysWOW64\awcaqii.exe"38⤵
- Executes dropped EXE
PID:2448 -
C:\Windows\SysWOW64\wjyappb.exeC:\Windows\system32\wjyappb.exe 836 "C:\Windows\SysWOW64\nvxczio.exe"39⤵
- Executes dropped EXE
PID:1128 -
C:\Windows\SysWOW64\jwhpvta.exeC:\Windows\system32\jwhpvta.exe 852 "C:\Windows\SysWOW64\wjyappb.exe"40⤵
- Executes dropped EXE
PID:2112 -
C:\Windows\SysWOW64\wqnxgye.exeC:\Windows\system32\wqnxgye.exe 844 "C:\Windows\SysWOW64\jwhpvta.exe"41⤵
- Executes dropped EXE
- Identifies Wine through registry keys
PID:876 -
C:\Windows\SysWOW64\galibbk.exeC:\Windows\system32\galibbk.exe 856 "C:\Windows\SysWOW64\wqnxgye.exe"42⤵
- Executes dropped EXE
PID:684 -
C:\Windows\SysWOW64\wflcfoh.exeC:\Windows\system32\wflcfoh.exe 828 "C:\Windows\SysWOW64\galibbk.exe"43⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1148 -
C:\Windows\SysWOW64\gtlavnu.exeC:\Windows\system32\gtlavnu.exe 864 "C:\Windows\SysWOW64\wflcfoh.exe"44⤵
- Executes dropped EXE
PID:868 -
C:\Windows\SysWOW64\sjgdewa.exeC:\Windows\system32\sjgdewa.exe 860 "C:\Windows\SysWOW64\gtlavnu.exe"45⤵
- Executes dropped EXE
PID:1564 -
C:\Windows\SysWOW64\fijfmef.exeC:\Windows\system32\fijfmef.exe 868 "C:\Windows\SysWOW64\sjgdewa.exe"46⤵
- Executes dropped EXE
- Identifies Wine through registry keys
PID:1756 -
C:\Windows\SysWOW64\syeived.exeC:\Windows\system32\syeived.exe 872 "C:\Windows\SysWOW64\fijfmef.exe"47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2608 -
C:\Windows\SysWOW64\zkdnsgt.exeC:\Windows\system32\zkdnsgt.exe 888 "C:\Windows\SysWOW64\syeived.exe"48⤵
- Executes dropped EXE
PID:2856 -
C:\Windows\SysWOW64\mifqbgz.exeC:\Windows\system32\mifqbgz.exe 880 "C:\Windows\SysWOW64\zkdnsgt.exe"49⤵
- Executes dropped EXE
PID:448 -
C:\Windows\SysWOW64\xeyaiaa.exeC:\Windows\system32\xeyaiaa.exe 884 "C:\Windows\SysWOW64\mifqbgz.exe"50⤵
- Executes dropped EXE
- Identifies Wine through registry keys
PID:1204 -
C:\Windows\SysWOW64\kubdzix.exeC:\Windows\system32\kubdzix.exe 848 "C:\Windows\SysWOW64\xeyaiaa.exe"51⤵
- Executes dropped EXE
PID:1100 -
C:\Windows\SysWOW64\ufqnmml.exeC:\Windows\system32\ufqnmml.exe 892 "C:\Windows\SysWOW64\kubdzix.exe"52⤵
- Executes dropped EXE
PID:3000 -
C:\Windows\SysWOW64\gvlqvuj.exeC:\Windows\system32\gvlqvuj.exe 876 "C:\Windows\SysWOW64\ufqnmml.exe"53⤵
- Executes dropped EXE
PID:2768 -
C:\Windows\SysWOW64\opkvsnz.exeC:\Windows\system32\opkvsnz.exe 912 "C:\Windows\SysWOW64\gvlqvuj.exe"54⤵
- Executes dropped EXE
PID:2908 -
C:\Windows\SysWOW64\etsqotw.exeC:\Windows\system32\etsqotw.exe 900 "C:\Windows\SysWOW64\opkvsnz.exe"55⤵
- Executes dropped EXE
PID:2576 -
C:\Windows\SysWOW64\lervlme.exeC:\Windows\system32\lervlme.exe 920 "C:\Windows\SysWOW64\etsqotw.exe"56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1624 -
C:\Windows\SysWOW64\xgxlwzr.exeC:\Windows\system32\xgxlwzr.exe 896 "C:\Windows\SysWOW64\lervlme.exe"57⤵
- Executes dropped EXE
PID:600 -
C:\Windows\SysWOW64\kxsofho.exeC:\Windows\system32\kxsofho.exe 928 "C:\Windows\SysWOW64\xgxlwzr.exe"58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1936 -
C:\Windows\SysWOW64\xvvqnhu.exeC:\Windows\system32\xvvqnhu.exe 904 "C:\Windows\SysWOW64\kxsofho.exe"59⤵
- Executes dropped EXE
PID:2212 -
C:\Windows\SysWOW64\kmptepz.exeC:\Windows\system32\kmptepz.exe 924 "C:\Windows\SysWOW64\xvvqnhu.exe"60⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1068 -
C:\Windows\SysWOW64\xckwnyx.exeC:\Windows\system32\xckwnyx.exe 908 "C:\Windows\SysWOW64\kmptepz.exe"61⤵
- Executes dropped EXE
PID:1764 -
C:\Windows\SysWOW64\hqlldxk.exeC:\Windows\system32\hqlldxk.exe 932 "C:\Windows\SysWOW64\xckwnyx.exe"62⤵
- Executes dropped EXE
PID:2468 -
C:\Windows\SysWOW64\upoolfq.exeC:\Windows\system32\upoolfq.exe 916 "C:\Windows\SysWOW64\hqlldxk.exe"63⤵
- Executes dropped EXE
PID:2756 -
C:\Windows\SysWOW64\gfiqunv.exeC:\Windows\system32\gfiqunv.exe 952 "C:\Windows\SysWOW64\upoolfq.exe"64⤵
- Executes dropped EXE
PID:2176 -
C:\Windows\SysWOW64\twdtcnt.exeC:\Windows\system32\twdtcnt.exe 936 "C:\Windows\SysWOW64\gfiqunv.exe"65⤵
- Executes dropped EXE
PID:2732 -
C:\Windows\SysWOW64\dgtdyrh.exeC:\Windows\system32\dgtdyrh.exe 948 "C:\Windows\SysWOW64\twdtcnt.exe"66⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1952 -
C:\Windows\SysWOW64\qiztjdl.exeC:\Windows\system32\qiztjdl.exe 944 "C:\Windows\SysWOW64\dgtdyrh.exe"67⤵PID:1588
-
C:\Windows\SysWOW64\fuvgtro.exeC:\Windows\system32\fuvgtro.exe 956 "C:\Windows\SysWOW64\qiztjdl.exe"68⤵PID:1768
-
C:\Windows\SysWOW64\ssyjbzt.exeC:\Windows\system32\ssyjbzt.exe 940 "C:\Windows\SysWOW64\fuvgtro.exe"69⤵PID:2880
-
C:\Windows\SysWOW64\fjtlkhz.exeC:\Windows\system32\fjtlkhz.exe 968 "C:\Windows\SysWOW64\ssyjbzt.exe"70⤵PID:2712
-
C:\Windows\SysWOW64\shoothw.exeC:\Windows\system32\shoothw.exe 964 "C:\Windows\SysWOW64\fjtlkhz.exe"71⤵
- System Location Discovery: System Language Discovery
PID:2828 -
C:\Windows\SysWOW64\fyrrbqc.exeC:\Windows\system32\fyrrbqc.exe 972 "C:\Windows\SysWOW64\shoothw.exe"72⤵PID:2060
-
C:\Windows\SysWOW64\pmrgzxp.exeC:\Windows\system32\pmrgzxp.exe 976 "C:\Windows\SysWOW64\fyrrbqc.exe"73⤵PID:572
-
C:\Windows\SysWOW64\ccmjixv.exeC:\Windows\system32\ccmjixv.exe 984 "C:\Windows\SysWOW64\pmrgzxp.exe"74⤵PID:1424
-
C:\Windows\SysWOW64\obhmqfs.exeC:\Windows\system32\obhmqfs.exe 980 "C:\Windows\SysWOW64\ccmjixv.exe"75⤵PID:2200
-
C:\Windows\SysWOW64\brkozny.exeC:\Windows\system32\brkozny.exe 1000 "C:\Windows\SysWOW64\obhmqfs.exe"76⤵PID:1536
-
C:\Windows\SysWOW64\oieriod.exeC:\Windows\system32\oieriod.exe 988 "C:\Windows\SysWOW64\brkozny.exe"77⤵PID:1440
-
C:\Windows\SysWOW64\ywfoyvi.exeC:\Windows\system32\ywfoyvi.exe 996 "C:\Windows\SysWOW64\oieriod.exe"78⤵
- Identifies Wine through registry keys
PID:2808 -
C:\Windows\SysWOW64\luargdo.exeC:\Windows\system32\luargdo.exe 992 "C:\Windows\SysWOW64\ywfoyvi.exe"79⤵PID:2752
-
C:\Windows\SysWOW64\ylvuxlt.exeC:\Windows\system32\ylvuxlt.exe 1004 "C:\Windows\SysWOW64\luargdo.exe"80⤵PID:2040
-
C:\Windows\SysWOW64\lbywfmz.exeC:\Windows\system32\lbywfmz.exe 1008 "C:\Windows\SysWOW64\ylvuxlt.exe"81⤵PID:1908
-
C:\Windows\SysWOW64\yasroux.exeC:\Windows\system32\yasroux.exe 1012 "C:\Windows\SysWOW64\lbywfmz.exe"82⤵PID:2416
-
C:\Windows\SysWOW64\zotoebk.exeC:\Windows\system32\zotoebk.exe 1016 "C:\Windows\SysWOW64\yasroux.exe"83⤵PID:2368
-
C:\Windows\SysWOW64\meornbp.exeC:\Windows\system32\meornbp.exe 1036 "C:\Windows\SysWOW64\zotoebk.exe"84⤵PID:2844
-
C:\Windows\SysWOW64\zvruvkv.exeC:\Windows\system32\zvruvkv.exe 1020 "C:\Windows\SysWOW64\meornbp.exe"85⤵
- System Location Discovery: System Language Discovery
PID:2728 -
C:\Windows\SysWOW64\mtlwess.exeC:\Windows\system32\mtlwess.exe 1028 "C:\Windows\SysWOW64\zvruvkv.exe"86⤵PID:1728
-
C:\Windows\SysWOW64\zkgzusy.exeC:\Windows\system32\zkgzusy.exe 1032 "C:\Windows\SysWOW64\mtlwess.exe"87⤵PID:1248
-
C:\Windows\SysWOW64\jyhplzl.exeC:\Windows\system32\jyhplzl.exe 1040 "C:\Windows\SysWOW64\zkgzusy.exe"88⤵PID:2384
-
C:\Windows\SysWOW64\vokrthr.exeC:\Windows\system32\vokrthr.exe 1044 "C:\Windows\SysWOW64\jyhplzl.exe"89⤵PID:2884
-
C:\Windows\SysWOW64\ineucqo.exeC:\Windows\system32\ineucqo.exe 1048 "C:\Windows\SysWOW64\vokrthr.exe"90⤵
- Drops file in System32 directory
PID:2596 -
C:\Windows\SysWOW64\vdzxkqu.exeC:\Windows\system32\vdzxkqu.exe 1052 "C:\Windows\SysWOW64\ineucqo.exe"91⤵PID:720
-
C:\Windows\SysWOW64\iccztyz.exeC:\Windows\system32\iccztyz.exe 1056 "C:\Windows\SysWOW64\vdzxkqu.exe"92⤵PID:1592
-
C:\Windows\SysWOW64\sivxrfm.exeC:\Windows\system32\sivxrfm.exe 1060 "C:\Windows\SysWOW64\iccztyz.exe"93⤵PID:996
-
C:\Windows\SysWOW64\fhyzagk.exeC:\Windows\system32\fhyzagk.exe 1064 "C:\Windows\SysWOW64\sivxrfm.exe"94⤵PID:1660
-
C:\Windows\SysWOW64\sxsciop.exeC:\Windows\system32\sxsciop.exe 1068 "C:\Windows\SysWOW64\fhyzagk.exe"95⤵PID:2760
-
C:\Windows\SysWOW64\fwnfrwv.exeC:\Windows\system32\fwnfrwv.exe 1072 "C:\Windows\SysWOW64\sxsciop.exe"96⤵PID:1964
-
C:\Windows\SysWOW64\rmqhzwt.exeC:\Windows\system32\rmqhzwt.exe 960 "C:\Windows\SysWOW64\fwnfrwv.exe"97⤵
- System Location Discovery: System Language Discovery
PID:2260 -
C:\Windows\SysWOW64\barxxdg.exeC:\Windows\system32\barxxdg.exe 1080 "C:\Windows\SysWOW64\rmqhzwt.exe"98⤵PID:832
-
C:\Windows\SysWOW64\orlzgml.exeC:\Windows\system32\orlzgml.exe 1076 "C:\Windows\SysWOW64\barxxdg.exe"99⤵PID:1696
-
C:\Windows\SysWOW64\bpgcpur.exeC:\Windows\system32\bpgcpur.exe 1088 "C:\Windows\SysWOW64\orlzgml.exe"100⤵PID:2392
-
C:\Windows\SysWOW64\ogjfxuo.exeC:\Windows\system32\ogjfxuo.exe 1092 "C:\Windows\SysWOW64\bpgcpur.exe"101⤵PID:2460
-
C:\Windows\SysWOW64\bweigcu.exeC:\Windows\system32\bweigcu.exe 1096 "C:\Windows\SysWOW64\ogjfxuo.exe"102⤵
- Identifies Wine through registry keys
- Drops file in System32 directory
PID:2100 -
C:\Windows\SysWOW64\kkefwkh.exeC:\Windows\system32\kkefwkh.exe 1084 "C:\Windows\SysWOW64\bweigcu.exe"103⤵PID:1188
-
C:\Windows\SysWOW64\xjzinkn.exeC:\Windows\system32\xjzinkn.exe 1104 "C:\Windows\SysWOW64\kkefwkh.exe"104⤵
- Identifies Wine through registry keys
PID:628 -
C:\Windows\SysWOW64\kzucvsk.exeC:\Windows\system32\kzucvsk.exe 1100 "C:\Windows\SysWOW64\xjzinkn.exe"105⤵PID:2748
-
C:\Windows\SysWOW64\xqxfeaq.exeC:\Windows\system32\xqxfeaq.exe 1116 "C:\Windows\SysWOW64\kzucvsk.exe"106⤵
- Drops file in System32 directory
PID:2428 -
C:\Windows\SysWOW64\kosimav.exeC:\Windows\system32\kosimav.exe 1112 "C:\Windows\SysWOW64\xqxfeaq.exe"107⤵PID:2408
-
C:\Windows\SysWOW64\ucsfcii.exeC:\Windows\system32\ucsfcii.exe 1120 "C:\Windows\SysWOW64\kosimav.exe"108⤵
- System Location Discovery: System Language Discovery
PID:2896 -
C:\Windows\SysWOW64\htnilqg.exeC:\Windows\system32\htnilqg.exe 1124 "C:\Windows\SysWOW64\ucsfcii.exe"109⤵PID:1712
-
C:\Windows\SysWOW64\ujqkuyl.exeC:\Windows\system32\ujqkuyl.exe 1140 "C:\Windows\SysWOW64\htnilqg.exe"110⤵PID:2600
-
C:\Windows\SysWOW64\gilnkyr.exeC:\Windows\system32\gilnkyr.exe 1128 "C:\Windows\SysWOW64\ujqkuyl.exe"111⤵
- Identifies Wine through registry keys
PID:348 -
C:\Windows\SysWOW64\tygqtgp.exeC:\Windows\system32\tygqtgp.exe 1136 "C:\Windows\SysWOW64\gilnkyr.exe"112⤵PID:3012
-
C:\Windows\SysWOW64\dmgfjoc.exeC:\Windows\system32\dmgfjoc.exe 1132 "C:\Windows\SysWOW64\tygqtgp.exe"113⤵PID:1664
-
C:\Windows\SysWOW64\qdjiroh.exeC:\Windows\system32\qdjiroh.exe 1144 "C:\Windows\SysWOW64\dmgfjoc.exe"114⤵PID:2740
-
C:\Windows\SysWOW64\dbelawn.exeC:\Windows\system32\dbelawn.exe 1148 "C:\Windows\SysWOW64\qdjiroh.exe"115⤵PID:2724
-
C:\Windows\SysWOW64\qsznjek.exeC:\Windows\system32\qsznjek.exe 1152 "C:\Windows\SysWOW64\dbelawn.exe"116⤵
- Identifies Wine through registry keys
PID:1512 -
C:\Windows\SysWOW64\dqbqreq.exeC:\Windows\system32\dqbqreq.exe 1156 "C:\Windows\SysWOW64\qsznjek.exe"117⤵
- System Location Discovery: System Language Discovery
PID:2400 -
C:\Windows\SysWOW64\mwunpmd.exeC:\Windows\system32\mwunpmd.exe 1168 "C:\Windows\SysWOW64\dqbqreq.exe"118⤵PID:2116
-
C:\Windows\SysWOW64\zvxqyui.exeC:\Windows\system32\zvxqyui.exe 1160 "C:\Windows\SysWOW64\mwunpmd.exe"119⤵PID:1688
-
C:\Windows\SysWOW64\mlstgug.exeC:\Windows\system32\mlstgug.exe 1164 "C:\Windows\SysWOW64\zvxqyui.exe"120⤵PID:2612
-
C:\Windows\SysWOW64\zkmnpcm.exeC:\Windows\system32\zkmnpcm.exe 1172 "C:\Windows\SysWOW64\mlstgug.exe"121⤵
- System Location Discovery: System Language Discovery
PID:2956 -
C:\Windows\SysWOW64\mapqykr.exeC:\Windows\system32\mapqykr.exe 1176 "C:\Windows\SysWOW64\zkmnpcm.exe"122⤵PID:1396
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-