Analysis
-
max time kernel
150s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
23-09-2024 16:11
Static task
static1
Behavioral task
behavioral1
Sample
f2a2a1ff78930e3465c115672b5992da_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f2a2a1ff78930e3465c115672b5992da_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f2a2a1ff78930e3465c115672b5992da_JaffaCakes118.exe
-
Size
362KB
-
MD5
f2a2a1ff78930e3465c115672b5992da
-
SHA1
8b8ec549638496c5933d579cc1a429ebceffee96
-
SHA256
976cb27f27db00e77ffc592a8fa5e03668b2bf13e709531e60ea6911b15ec306
-
SHA512
9cdea4f7cd75f5f92fab819e4f2934f89b1cec2ed2353c0b2f5a9196d9bb469a205eb1278b30189d7834df094a34829d4f3da93c9b2bc6249389dd946cd42b05
-
SSDEEP
6144:5S6p7C/ZzSBw6q6shq6sUbN+WnQcj1LzcvZvAMa8+5KrJERbKzQ:8ZmC6sY6sUbEWnnj9CZYM/TQ
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 64 IoCs
pid Process 2596 nwtxvaaz.exe 2732 nwtxvaaz.exe 2608 jxdczema.exe 2472 jxdczema.exe 1932 obxkknqi.exe 2192 obxkknqi.exe 1200 wghxbyty.exe 2408 wghxbyty.exe 1668 gqwiocia.exe 2796 gqwiocia.exe 2412 thrkfkfh.exe 1292 thrkfkfh.exe 3044 gujalgem.exe 1324 gujalgem.exe 2872 qbnxvelm.exe 1868 qbnxvelm.exe 1712 xiiyqcve.exe 656 xiiyqcve.exe 896 iimvabce.exe 1032 iimvabce.exe 1520 uypyjbil.exe 264 uypyjbil.exe 756 fftvtaik.exe 2632 fftvtaik.exe 1016 mqsaqtyx.exe 1548 mqsaqtyx.exe 1716 zhvdzbve.exe 1356 zhvdzbve.exe 3012 efqghkbl.exe 2576 efqghkbl.exe 2596 qwkiqkhb.exe 2808 qwkiqkhb.exe 2644 aklyorux.exe 2224 aklyorux.exe 2520 naoawzre.exe 2948 naoawzre.exe 1004 anxqcdyj.exe 1968 anxqcdyj.exe 2264 kcynsddg.exe 1600 kcynsddg.exe 1124 xpqdygks.exe 2288 xpqdygks.exe 108 hzfotkqm.exe 1724 hzfotkqm.exe 1052 uqaqcswu.exe 1904 uqaqcswu.exe 1908 hodtlstj.exe 1912 hodtlstj.exe 1988 ufxwtazq.exe 1324 ufxwtazq.exe 1712 dpnggdfk.exe 1972 dpnggdfk.exe 684 qgijpllr.exe 1864 qgijpllr.exe 2396 dwklgmqg.exe 784 dwklgmqg.exe 2624 nklbwtdd.exe 2244 nklbwtdd.exe 2232 ajgdebbk.exe 988 ajgdebbk.exe 2340 nzbgnbgr.exe 2176 nzbgnbgr.exe 2904 xcqrienl.exe 2588 xcqrienl.exe -
Loads dropped DLL 64 IoCs
pid Process 3016 f2a2a1ff78930e3465c115672b5992da_JaffaCakes118.exe 3016 f2a2a1ff78930e3465c115672b5992da_JaffaCakes118.exe 2596 nwtxvaaz.exe 2732 nwtxvaaz.exe 2732 nwtxvaaz.exe 2608 jxdczema.exe 2472 jxdczema.exe 2472 jxdczema.exe 2192 obxkknqi.exe 2192 obxkknqi.exe 2408 wghxbyty.exe 2408 wghxbyty.exe 2796 gqwiocia.exe 2796 gqwiocia.exe 1292 thrkfkfh.exe 1292 thrkfkfh.exe 1324 gujalgem.exe 1324 gujalgem.exe 1868 qbnxvelm.exe 1868 qbnxvelm.exe 656 xiiyqcve.exe 656 xiiyqcve.exe 1032 iimvabce.exe 1032 iimvabce.exe 264 uypyjbil.exe 264 uypyjbil.exe 2632 fftvtaik.exe 2632 fftvtaik.exe 1548 mqsaqtyx.exe 1548 mqsaqtyx.exe 1356 zhvdzbve.exe 1356 zhvdzbve.exe 2576 efqghkbl.exe 2576 efqghkbl.exe 2808 qwkiqkhb.exe 2808 qwkiqkhb.exe 2224 aklyorux.exe 2224 aklyorux.exe 2948 naoawzre.exe 2948 naoawzre.exe 1968 anxqcdyj.exe 1968 anxqcdyj.exe 1600 kcynsddg.exe 1600 kcynsddg.exe 2288 xpqdygks.exe 2288 xpqdygks.exe 1724 hzfotkqm.exe 1724 hzfotkqm.exe 1904 uqaqcswu.exe 1904 uqaqcswu.exe 1912 hodtlstj.exe 1912 hodtlstj.exe 1324 ufxwtazq.exe 1324 ufxwtazq.exe 1972 dpnggdfk.exe 1972 dpnggdfk.exe 1864 qgijpllr.exe 1864 qgijpllr.exe 784 dwklgmqg.exe 784 dwklgmqg.exe 2244 nklbwtdd.exe 2244 nklbwtdd.exe 988 ajgdebbk.exe 988 ajgdebbk.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\xcqrienl.exe nzbgnbgr.exe File created C:\Windows\SysWOW64\vqmyjbdn.exe jogjqpqd.exe File opened for modification C:\Windows\SysWOW64\vgqmzaoa.exe iekxgvjq.exe File created C:\Windows\SysWOW64\ujoertsj.exe hhiofooz.exe File created C:\Windows\SysWOW64\fzkdndnl.exe Process not Found File created C:\Windows\SysWOW64\nfxgbjro.exe apudsamh.exe File created C:\Windows\SysWOW64\ijewiggm.exe vhyoxtbd.exe File opened for modification C:\Windows\SysWOW64\bssmmirl.exe ocpkeilw.exe File opened for modification C:\Windows\SysWOW64\ihqrqqge.exe vjnoihap.exe File created C:\Windows\SysWOW64\hmvzrbsx.exe Process not Found File created C:\Windows\SysWOW64\efqghkbl.exe zhvdzbve.exe File created C:\Windows\SysWOW64\edrxxgyb.exe rexvpysu.exe File created C:\Windows\SysWOW64\quqvxomu.exe ddvspghf.exe File opened for modification C:\Windows\SysWOW64\hrwzcqkj.exe vpqrqlfz.exe File opened for modification C:\Windows\SysWOW64\kmzshbpc.exe fvxpybrv.exe File opened for modification C:\Windows\SysWOW64\ielhiith.exe vgqmzaoa.exe File opened for modification C:\Windows\SysWOW64\aqpxucez.exe namumugs.exe File created C:\Windows\SysWOW64\qxmfgwrj.exe gjmiqomn.exe File opened for modification C:\Windows\SysWOW64\bnludhgf.exe Process not Found File opened for modification C:\Windows\SysWOW64\qwplyxxz.exe Process not Found File opened for modification C:\Windows\SysWOW64\aoclfdyh.exe Process not Found File opened for modification C:\Windows\SysWOW64\nwkmfmka.exe Process not Found File created C:\Windows\SysWOW64\voweiwoi.exe iybbzorb.exe File opened for modification C:\Windows\SysWOW64\blumcyws.exe ouskuqql.exe File created C:\Windows\SysWOW64\dsjixlsh.exe ruofodma.exe File created C:\Windows\SysWOW64\dmgkeyda.exe rsavstqy.exe File opened for modification C:\Windows\SysWOW64\iwfwpyjs.exe vyluhqdl.exe File created C:\Windows\SysWOW64\yaxituez.exe Process not Found File opened for modification C:\Windows\SysWOW64\mgoxjyes.exe Process not Found File created C:\Windows\SysWOW64\jbotnfuy.exe Process not Found File created C:\Windows\SysWOW64\fsenajjd.exe Process not Found File created C:\Windows\SysWOW64\ypmoldho.exe Process not Found File created C:\Windows\SysWOW64\kxigoimy.exe xcqrienl.exe File opened for modification C:\Windows\SysWOW64\geetoenn.exe tnjqfdpg.exe File opened for modification C:\Windows\SysWOW64\fspucklz.exe suurtcfr.exe File created C:\Windows\SysWOW64\otrqvtyz.exe duntluqz.exe File opened for modification C:\Windows\SysWOW64\gdnlhdeh.exe Process not Found File created C:\Windows\SysWOW64\tsqgwrna.exe ffhqqnov.exe File opened for modification C:\Windows\SysWOW64\qnfqrzth.exe docobrwr.exe File created C:\Windows\SysWOW64\zxtyqxvg.exe pueoduom.exe File created C:\Windows\SysWOW64\kxcrjpwc.exe Process not Found File created C:\Windows\SysWOW64\zwrzrgja.exe Process not Found File opened for modification C:\Windows\SysWOW64\erkndoho.exe Process not Found File created C:\Windows\SysWOW64\mryzrpte.exe Process not Found File opened for modification C:\Windows\SysWOW64\vdeywsbb.exe Process not Found File opened for modification C:\Windows\SysWOW64\xcqrienl.exe nzbgnbgr.exe File created C:\Windows\SysWOW64\junccpfm.exe wwszupaf.exe File opened for modification C:\Windows\SysWOW64\vrtharld.exe jxnrpngc.exe File created C:\Windows\SysWOW64\pljlmpia.exe fjubzmcy.exe File opened for modification C:\Windows\SysWOW64\ziejczap.exe pfpzovun.exe File opened for modification C:\Windows\SysWOW64\tiqbxgda.exe dwqgtagg.exe File created C:\Windows\SysWOW64\wcjwbyyc.exe jlotspsv.exe File opened for modification C:\Windows\SysWOW64\qcvwjhev.exe chlgddgi.exe File created C:\Windows\SysWOW64\nwtxvaaz.exe f2a2a1ff78930e3465c115672b5992da_JaffaCakes118.exe File created C:\Windows\SysWOW64\rexvpysu.exe hqwxzqfy.exe File opened for modification C:\Windows\SysWOW64\iybbzorb.exe vzhzrglt.exe File created C:\Windows\SysWOW64\wusrysbi.exe jvypisvb.exe File created C:\Windows\SysWOW64\hfunhrbs.exe uozlzjwk.exe File created C:\Windows\SysWOW64\xxevpjpu.exe Process not Found File created C:\Windows\SysWOW64\jzqdzgnp.exe winbqyih.exe File opened for modification C:\Windows\SysWOW64\usvnpqii.exe hqpxeeey.exe File opened for modification C:\Windows\SysWOW64\mxrnrzha.exe ahokarct.exe File opened for modification C:\Windows\SysWOW64\wifqigse.exe jjknzynx.exe File created C:\Windows\SysWOW64\kebrynxq.exe Process not Found -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 1056 set thread context of 3016 1056 f2a2a1ff78930e3465c115672b5992da_JaffaCakes118.exe 29 PID 2596 set thread context of 2732 2596 nwtxvaaz.exe 31 PID 2608 set thread context of 2472 2608 jxdczema.exe 33 PID 1932 set thread context of 2192 1932 obxkknqi.exe 35 PID 1200 set thread context of 2408 1200 wghxbyty.exe 37 PID 1668 set thread context of 2796 1668 gqwiocia.exe 39 PID 2412 set thread context of 1292 2412 thrkfkfh.exe 41 PID 3044 set thread context of 1324 3044 gujalgem.exe 43 PID 2872 set thread context of 1868 2872 qbnxvelm.exe 45 PID 1712 set thread context of 656 1712 xiiyqcve.exe 47 PID 896 set thread context of 1032 896 iimvabce.exe 49 PID 1520 set thread context of 264 1520 uypyjbil.exe 51 PID 756 set thread context of 2632 756 fftvtaik.exe 53 PID 1016 set thread context of 1548 1016 mqsaqtyx.exe 55 PID 1716 set thread context of 1356 1716 zhvdzbve.exe 57 PID 3012 set thread context of 2576 3012 efqghkbl.exe 59 PID 2596 set thread context of 2808 2596 qwkiqkhb.exe 61 PID 2644 set thread context of 2224 2644 aklyorux.exe 63 PID 2520 set thread context of 2948 2520 naoawzre.exe 65 PID 1004 set thread context of 1968 1004 anxqcdyj.exe 67 PID 2264 set thread context of 1600 2264 kcynsddg.exe 69 PID 1124 set thread context of 2288 1124 xpqdygks.exe 71 PID 108 set thread context of 1724 108 hzfotkqm.exe 73 PID 1052 set thread context of 1904 1052 uqaqcswu.exe 75 PID 1908 set thread context of 1912 1908 hodtlstj.exe 77 PID 1988 set thread context of 1324 1988 ufxwtazq.exe 79 PID 1712 set thread context of 1972 1712 dpnggdfk.exe 81 PID 684 set thread context of 1864 684 qgijpllr.exe 83 PID 2396 set thread context of 784 2396 dwklgmqg.exe 85 PID 2624 set thread context of 2244 2624 nklbwtdd.exe 87 PID 2232 set thread context of 988 2232 ajgdebbk.exe 89 PID 2340 set thread context of 2176 2340 nzbgnbgr.exe 91 PID 2904 set thread context of 2588 2904 xcqrienl.exe 93 PID 1056 set thread context of 2684 1056 kxigoimy.exe 95 PID 2756 set thread context of 2580 2756 uzxrblas.exe 97 PID 3000 set thread context of 2016 3000 hystkuxz.exe 99 PID 1328 set thread context of 440 1328 uovwsudp.exe 101 PID 1200 set thread context of 2948 1200 drkgnxjj.exe 103 PID 836 set thread context of 1668 836 qqfjwfpq.exe 105 PID 448 set thread context of 2820 448 dgimffux.exe 107 PID 604 set thread context of 1096 604 qfconnae.exe 109 PID 2036 set thread context of 1984 2036 aldedvfj.exe 111 PID 1992 set thread context of 1556 1992 njyhmdlq.exe 113 PID 2884 set thread context of 1568 2884 awpeszjv.exe 115 PID 1700 set thread context of 1820 1700 kkquqgwr.exe 117 PID 900 set thread context of 276 900 wblwyocy.exe 119 PID 1864 set thread context of 2364 1864 hapujnky.exe 121 PID 336 set thread context of 2140 336 tcvjusoi.exe 123 PID 756 set thread context of 2208 756 gsymlatp.exe 125 PID 1516 set thread context of 1548 1516 tnhcresc.exe 127 PID 2304 set thread context of 2652 2304 ghnrcixd.exe 129 PID 2540 set thread context of 2844 2540 qslcpldf.exe 131 PID 2480 set thread context of 2560 2480 dmrkbypp.exe 133 PID 2492 set thread context of 2568 2492 pkmmjgnw.exe 135 PID 2444 set thread context of 1928 2444 dxdcpcub.exe 137 PID 1004 set thread context of 1756 1004 pzjsioyl.exe 139 PID 1084 set thread context of 2812 1084 cqeurwvs.exe 141 PID 772 set thread context of 1956 772 matferku.exe 143 PID 2408 set thread context of 2376 2408 zuauqeov.exe 145 PID 2108 set thread context of 1904 2108 mhrkwini.exe 147 PID 776 set thread context of 1912 776 wwszupaf.exe 149 PID 1988 set thread context of 920 1988 junccpfm.exe 151 PID 1632 set thread context of 1972 1632 wheaitez.exe 153 PID 1400 set thread context of 632 1400 fvxpybrv.exe 155 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uzuunwyr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language docobrwr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aomlkixm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gktcjqwk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asggmuie.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mplykiku.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhohyuzs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qjmlflxo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ichbpqoj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language udmitugt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lksbgjis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kblsccmy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbrwdzqb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zjzzsgpq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language macbaoux.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language efqghkbl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winbqyih.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ztbivcri.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jalykgvr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aqvumxgn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sxtsxsts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sjedffoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdqptbgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iywoidas.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lhgupyxj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shiznohg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nkpnxaps.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iqdlolwv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xeokaoss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mdggnula.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iybbzorb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjnapwpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbpplztz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bmiraihz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xogisnbm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shjrvlab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cqobuity.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tqhashxb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uqaqcswu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uzxrblas.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hfunhrbs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cfeztqem.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language advfwlgj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bssmmirl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iwlaqwnv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fvxpybrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language geetoenn.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1056 wrote to memory of 3016 1056 f2a2a1ff78930e3465c115672b5992da_JaffaCakes118.exe 29 PID 1056 wrote to memory of 3016 1056 f2a2a1ff78930e3465c115672b5992da_JaffaCakes118.exe 29 PID 1056 wrote to memory of 3016 1056 f2a2a1ff78930e3465c115672b5992da_JaffaCakes118.exe 29 PID 1056 wrote to memory of 3016 1056 f2a2a1ff78930e3465c115672b5992da_JaffaCakes118.exe 29 PID 1056 wrote to memory of 3016 1056 f2a2a1ff78930e3465c115672b5992da_JaffaCakes118.exe 29 PID 1056 wrote to memory of 3016 1056 f2a2a1ff78930e3465c115672b5992da_JaffaCakes118.exe 29 PID 3016 wrote to memory of 2596 3016 f2a2a1ff78930e3465c115672b5992da_JaffaCakes118.exe 30 PID 3016 wrote to memory of 2596 3016 f2a2a1ff78930e3465c115672b5992da_JaffaCakes118.exe 30 PID 3016 wrote to memory of 2596 3016 f2a2a1ff78930e3465c115672b5992da_JaffaCakes118.exe 30 PID 3016 wrote to memory of 2596 3016 f2a2a1ff78930e3465c115672b5992da_JaffaCakes118.exe 30 PID 2596 wrote to memory of 2732 2596 nwtxvaaz.exe 31 PID 2596 wrote to memory of 2732 2596 nwtxvaaz.exe 31 PID 2596 wrote to memory of 2732 2596 nwtxvaaz.exe 31 PID 2596 wrote to memory of 2732 2596 nwtxvaaz.exe 31 PID 2596 wrote to memory of 2732 2596 nwtxvaaz.exe 31 PID 2596 wrote to memory of 2732 2596 nwtxvaaz.exe 31 PID 2732 wrote to memory of 2608 2732 nwtxvaaz.exe 32 PID 2732 wrote to memory of 2608 2732 nwtxvaaz.exe 32 PID 2732 wrote to memory of 2608 2732 nwtxvaaz.exe 32 PID 2732 wrote to memory of 2608 2732 nwtxvaaz.exe 32 PID 2608 wrote to memory of 2472 2608 jxdczema.exe 33 PID 2608 wrote to memory of 2472 2608 jxdczema.exe 33 PID 2608 wrote to memory of 2472 2608 jxdczema.exe 33 PID 2608 wrote to memory of 2472 2608 jxdczema.exe 33 PID 2608 wrote to memory of 2472 2608 jxdczema.exe 33 PID 2608 wrote to memory of 2472 2608 jxdczema.exe 33 PID 2472 wrote to memory of 1932 2472 jxdczema.exe 34 PID 2472 wrote to memory of 1932 2472 jxdczema.exe 34 PID 2472 wrote to memory of 1932 2472 jxdczema.exe 34 PID 2472 wrote to memory of 1932 2472 jxdczema.exe 34 PID 1932 wrote to memory of 2192 1932 obxkknqi.exe 35 PID 1932 wrote to memory of 2192 1932 obxkknqi.exe 35 PID 1932 wrote to memory of 2192 1932 obxkknqi.exe 35 PID 1932 wrote to memory of 2192 1932 obxkknqi.exe 35 PID 1932 wrote to memory of 2192 1932 obxkknqi.exe 35 PID 1932 wrote to memory of 2192 1932 obxkknqi.exe 35 PID 2192 wrote to memory of 1200 2192 obxkknqi.exe 36 PID 2192 wrote to memory of 1200 2192 obxkknqi.exe 36 PID 2192 wrote to memory of 1200 2192 obxkknqi.exe 36 PID 2192 wrote to memory of 1200 2192 obxkknqi.exe 36 PID 1200 wrote to memory of 2408 1200 wghxbyty.exe 37 PID 1200 wrote to memory of 2408 1200 wghxbyty.exe 37 PID 1200 wrote to memory of 2408 1200 wghxbyty.exe 37 PID 1200 wrote to memory of 2408 1200 wghxbyty.exe 37 PID 1200 wrote to memory of 2408 1200 wghxbyty.exe 37 PID 1200 wrote to memory of 2408 1200 wghxbyty.exe 37 PID 2408 wrote to memory of 1668 2408 wghxbyty.exe 38 PID 2408 wrote to memory of 1668 2408 wghxbyty.exe 38 PID 2408 wrote to memory of 1668 2408 wghxbyty.exe 38 PID 2408 wrote to memory of 1668 2408 wghxbyty.exe 38 PID 1668 wrote to memory of 2796 1668 gqwiocia.exe 39 PID 1668 wrote to memory of 2796 1668 gqwiocia.exe 39 PID 1668 wrote to memory of 2796 1668 gqwiocia.exe 39 PID 1668 wrote to memory of 2796 1668 gqwiocia.exe 39 PID 1668 wrote to memory of 2796 1668 gqwiocia.exe 39 PID 1668 wrote to memory of 2796 1668 gqwiocia.exe 39 PID 2796 wrote to memory of 2412 2796 gqwiocia.exe 40 PID 2796 wrote to memory of 2412 2796 gqwiocia.exe 40 PID 2796 wrote to memory of 2412 2796 gqwiocia.exe 40 PID 2796 wrote to memory of 2412 2796 gqwiocia.exe 40 PID 2412 wrote to memory of 1292 2412 thrkfkfh.exe 41 PID 2412 wrote to memory of 1292 2412 thrkfkfh.exe 41 PID 2412 wrote to memory of 1292 2412 thrkfkfh.exe 41 PID 2412 wrote to memory of 1292 2412 thrkfkfh.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2a2a1ff78930e3465c115672b5992da_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f2a2a1ff78930e3465c115672b5992da_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\f2a2a1ff78930e3465c115672b5992da_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f2a2a1ff78930e3465c115672b5992da_JaffaCakes118.exe D:\Hex Proje2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\nwtxvaaz.exeC:\Windows\system32\nwtxvaaz.exe 476 "C:\Users\Admin\AppData\Local\Temp\f2a2a1ff78930e3465c115672b5992da_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\nwtxvaaz.exeC:\Windows\SysWOW64\nwtxvaaz.exe D:\Hex Proje4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\jxdczema.exeC:\Windows\system32\jxdczema.exe 516 "C:\Windows\SysWOW64\nwtxvaaz.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\jxdczema.exeC:\Windows\SysWOW64\jxdczema.exe D:\Hex Proje6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\obxkknqi.exeC:\Windows\system32\obxkknqi.exe 456 "C:\Windows\SysWOW64\jxdczema.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\obxkknqi.exeC:\Windows\SysWOW64\obxkknqi.exe D:\Hex Proje8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\wghxbyty.exeC:\Windows\system32\wghxbyty.exe 456 "C:\Windows\SysWOW64\obxkknqi.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\wghxbyty.exeC:\Windows\SysWOW64\wghxbyty.exe D:\Hex Proje10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\gqwiocia.exeC:\Windows\system32\gqwiocia.exe 516 "C:\Windows\SysWOW64\wghxbyty.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\gqwiocia.exeC:\Windows\SysWOW64\gqwiocia.exe D:\Hex Proje12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\thrkfkfh.exeC:\Windows\system32\thrkfkfh.exe 516 "C:\Windows\SysWOW64\gqwiocia.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\thrkfkfh.exeC:\Windows\SysWOW64\thrkfkfh.exe D:\Hex Proje14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1292 -
C:\Windows\SysWOW64\gujalgem.exeC:\Windows\system32\gujalgem.exe 516 "C:\Windows\SysWOW64\thrkfkfh.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3044 -
C:\Windows\SysWOW64\gujalgem.exeC:\Windows\SysWOW64\gujalgem.exe D:\Hex Proje16⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1324 -
C:\Windows\SysWOW64\qbnxvelm.exeC:\Windows\system32\qbnxvelm.exe 464 "C:\Windows\SysWOW64\gujalgem.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2872 -
C:\Windows\SysWOW64\qbnxvelm.exeC:\Windows\SysWOW64\qbnxvelm.exe D:\Hex Proje18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1868 -
C:\Windows\SysWOW64\xiiyqcve.exeC:\Windows\system32\xiiyqcve.exe 468 "C:\Windows\SysWOW64\qbnxvelm.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1712 -
C:\Windows\SysWOW64\xiiyqcve.exeC:\Windows\SysWOW64\xiiyqcve.exe D:\Hex Proje20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:656 -
C:\Windows\SysWOW64\iimvabce.exeC:\Windows\system32\iimvabce.exe 516 "C:\Windows\SysWOW64\xiiyqcve.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:896 -
C:\Windows\SysWOW64\iimvabce.exeC:\Windows\SysWOW64\iimvabce.exe D:\Hex Proje22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1032 -
C:\Windows\SysWOW64\uypyjbil.exeC:\Windows\system32\uypyjbil.exe 528 "C:\Windows\SysWOW64\iimvabce.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1520 -
C:\Windows\SysWOW64\uypyjbil.exeC:\Windows\SysWOW64\uypyjbil.exe D:\Hex Proje24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:264 -
C:\Windows\SysWOW64\fftvtaik.exeC:\Windows\system32\fftvtaik.exe 484 "C:\Windows\SysWOW64\uypyjbil.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:756 -
C:\Windows\SysWOW64\fftvtaik.exeC:\Windows\SysWOW64\fftvtaik.exe D:\Hex Proje26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2632 -
C:\Windows\SysWOW64\mqsaqtyx.exeC:\Windows\system32\mqsaqtyx.exe 476 "C:\Windows\SysWOW64\fftvtaik.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1016 -
C:\Windows\SysWOW64\mqsaqtyx.exeC:\Windows\SysWOW64\mqsaqtyx.exe D:\Hex Proje28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1548 -
C:\Windows\SysWOW64\zhvdzbve.exeC:\Windows\system32\zhvdzbve.exe 516 "C:\Windows\SysWOW64\mqsaqtyx.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1716 -
C:\Windows\SysWOW64\zhvdzbve.exeC:\Windows\SysWOW64\zhvdzbve.exe D:\Hex Proje30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1356 -
C:\Windows\SysWOW64\efqghkbl.exeC:\Windows\system32\efqghkbl.exe 516 "C:\Windows\SysWOW64\zhvdzbve.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3012 -
C:\Windows\SysWOW64\efqghkbl.exeC:\Windows\SysWOW64\efqghkbl.exe D:\Hex Proje32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2576 -
C:\Windows\SysWOW64\qwkiqkhb.exeC:\Windows\system32\qwkiqkhb.exe 524 "C:\Windows\SysWOW64\efqghkbl.exe"33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2596 -
C:\Windows\SysWOW64\qwkiqkhb.exeC:\Windows\SysWOW64\qwkiqkhb.exe D:\Hex Proje34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2808 -
C:\Windows\SysWOW64\aklyorux.exeC:\Windows\system32\aklyorux.exe 520 "C:\Windows\SysWOW64\qwkiqkhb.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2644 -
C:\Windows\SysWOW64\aklyorux.exeC:\Windows\SysWOW64\aklyorux.exe D:\Hex Proje36⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2224 -
C:\Windows\SysWOW64\naoawzre.exeC:\Windows\system32\naoawzre.exe 524 "C:\Windows\SysWOW64\aklyorux.exe"37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2520 -
C:\Windows\SysWOW64\naoawzre.exeC:\Windows\SysWOW64\naoawzre.exe D:\Hex Proje38⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2948 -
C:\Windows\SysWOW64\anxqcdyj.exeC:\Windows\system32\anxqcdyj.exe 516 "C:\Windows\SysWOW64\naoawzre.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1004 -
C:\Windows\SysWOW64\anxqcdyj.exeC:\Windows\SysWOW64\anxqcdyj.exe D:\Hex Proje40⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1968 -
C:\Windows\SysWOW64\kcynsddg.exeC:\Windows\system32\kcynsddg.exe 516 "C:\Windows\SysWOW64\anxqcdyj.exe"41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2264 -
C:\Windows\SysWOW64\kcynsddg.exeC:\Windows\SysWOW64\kcynsddg.exe D:\Hex Proje42⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1600 -
C:\Windows\SysWOW64\xpqdygks.exeC:\Windows\system32\xpqdygks.exe 520 "C:\Windows\SysWOW64\kcynsddg.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1124 -
C:\Windows\SysWOW64\xpqdygks.exeC:\Windows\SysWOW64\xpqdygks.exe D:\Hex Proje44⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2288 -
C:\Windows\SysWOW64\hzfotkqm.exeC:\Windows\system32\hzfotkqm.exe 528 "C:\Windows\SysWOW64\xpqdygks.exe"45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:108 -
C:\Windows\SysWOW64\hzfotkqm.exeC:\Windows\SysWOW64\hzfotkqm.exe D:\Hex Proje46⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1724 -
C:\Windows\SysWOW64\uqaqcswu.exeC:\Windows\system32\uqaqcswu.exe 516 "C:\Windows\SysWOW64\hzfotkqm.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1052 -
C:\Windows\SysWOW64\uqaqcswu.exeC:\Windows\SysWOW64\uqaqcswu.exe D:\Hex Proje48⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1904 -
C:\Windows\SysWOW64\hodtlstj.exeC:\Windows\system32\hodtlstj.exe 516 "C:\Windows\SysWOW64\uqaqcswu.exe"49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1908 -
C:\Windows\SysWOW64\hodtlstj.exeC:\Windows\SysWOW64\hodtlstj.exe D:\Hex Proje50⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1912 -
C:\Windows\SysWOW64\ufxwtazq.exeC:\Windows\system32\ufxwtazq.exe 516 "C:\Windows\SysWOW64\hodtlstj.exe"51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1988 -
C:\Windows\SysWOW64\ufxwtazq.exeC:\Windows\SysWOW64\ufxwtazq.exe D:\Hex Proje52⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1324 -
C:\Windows\SysWOW64\dpnggdfk.exeC:\Windows\system32\dpnggdfk.exe 516 "C:\Windows\SysWOW64\ufxwtazq.exe"53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1712 -
C:\Windows\SysWOW64\dpnggdfk.exeC:\Windows\SysWOW64\dpnggdfk.exe D:\Hex Proje54⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1972 -
C:\Windows\SysWOW64\qgijpllr.exeC:\Windows\system32\qgijpllr.exe 520 "C:\Windows\SysWOW64\dpnggdfk.exe"55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:684 -
C:\Windows\SysWOW64\qgijpllr.exeC:\Windows\SysWOW64\qgijpllr.exe D:\Hex Proje56⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1864 -
C:\Windows\SysWOW64\dwklgmqg.exeC:\Windows\system32\dwklgmqg.exe 516 "C:\Windows\SysWOW64\qgijpllr.exe"57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2396 -
C:\Windows\SysWOW64\dwklgmqg.exeC:\Windows\SysWOW64\dwklgmqg.exe D:\Hex Proje58⤵
- Executes dropped EXE
- Loads dropped DLL
PID:784 -
C:\Windows\SysWOW64\nklbwtdd.exeC:\Windows\system32\nklbwtdd.exe 516 "C:\Windows\SysWOW64\dwklgmqg.exe"59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2624 -
C:\Windows\SysWOW64\nklbwtdd.exeC:\Windows\SysWOW64\nklbwtdd.exe D:\Hex Proje60⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2244 -
C:\Windows\SysWOW64\ajgdebbk.exeC:\Windows\system32\ajgdebbk.exe 524 "C:\Windows\SysWOW64\nklbwtdd.exe"61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2232 -
C:\Windows\SysWOW64\ajgdebbk.exeC:\Windows\SysWOW64\ajgdebbk.exe D:\Hex Proje62⤵
- Executes dropped EXE
- Loads dropped DLL
PID:988 -
C:\Windows\SysWOW64\nzbgnbgr.exeC:\Windows\system32\nzbgnbgr.exe 528 "C:\Windows\SysWOW64\ajgdebbk.exe"63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2340 -
C:\Windows\SysWOW64\nzbgnbgr.exeC:\Windows\SysWOW64\nzbgnbgr.exe D:\Hex Proje64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2176 -
C:\Windows\SysWOW64\xcqrienl.exeC:\Windows\system32\xcqrienl.exe 516 "C:\Windows\SysWOW64\nzbgnbgr.exe"65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2904 -
C:\Windows\SysWOW64\xcqrienl.exeC:\Windows\SysWOW64\xcqrienl.exe D:\Hex Proje66⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2588 -
C:\Windows\SysWOW64\kxigoimy.exeC:\Windows\system32\kxigoimy.exe 520 "C:\Windows\SysWOW64\xcqrienl.exe"67⤵
- Suspicious use of SetThreadContext
PID:1056 -
C:\Windows\SysWOW64\kxigoimy.exeC:\Windows\SysWOW64\kxigoimy.exe D:\Hex Proje68⤵PID:2684
-
C:\Windows\SysWOW64\uzxrblas.exeC:\Windows\system32\uzxrblas.exe 536 "C:\Windows\SysWOW64\kxigoimy.exe"69⤵
- Suspicious use of SetThreadContext
PID:2756 -
C:\Windows\SysWOW64\uzxrblas.exeC:\Windows\SysWOW64\uzxrblas.exe D:\Hex Proje70⤵
- System Location Discovery: System Language Discovery
PID:2580 -
C:\Windows\SysWOW64\hystkuxz.exeC:\Windows\system32\hystkuxz.exe 524 "C:\Windows\SysWOW64\uzxrblas.exe"71⤵
- Suspicious use of SetThreadContext
PID:3000 -
C:\Windows\SysWOW64\hystkuxz.exeC:\Windows\SysWOW64\hystkuxz.exe D:\Hex Proje72⤵PID:2016
-
C:\Windows\SysWOW64\uovwsudp.exeC:\Windows\system32\uovwsudp.exe 520 "C:\Windows\SysWOW64\hystkuxz.exe"73⤵
- Suspicious use of SetThreadContext
PID:1328 -
C:\Windows\SysWOW64\uovwsudp.exeC:\Windows\SysWOW64\uovwsudp.exe D:\Hex Proje74⤵PID:440
-
C:\Windows\SysWOW64\drkgnxjj.exeC:\Windows\system32\drkgnxjj.exe 516 "C:\Windows\SysWOW64\uovwsudp.exe"75⤵
- Suspicious use of SetThreadContext
PID:1200 -
C:\Windows\SysWOW64\drkgnxjj.exeC:\Windows\SysWOW64\drkgnxjj.exe D:\Hex Proje76⤵PID:2948
-
C:\Windows\SysWOW64\qqfjwfpq.exeC:\Windows\system32\qqfjwfpq.exe 524 "C:\Windows\SysWOW64\drkgnxjj.exe"77⤵
- Suspicious use of SetThreadContext
PID:836 -
C:\Windows\SysWOW64\qqfjwfpq.exeC:\Windows\SysWOW64\qqfjwfpq.exe D:\Hex Proje78⤵PID:1668
-
C:\Windows\SysWOW64\dgimffux.exeC:\Windows\system32\dgimffux.exe 524 "C:\Windows\SysWOW64\qqfjwfpq.exe"79⤵
- Suspicious use of SetThreadContext
PID:448 -
C:\Windows\SysWOW64\dgimffux.exeC:\Windows\SysWOW64\dgimffux.exe D:\Hex Proje80⤵PID:2820
-
C:\Windows\SysWOW64\qfconnae.exeC:\Windows\system32\qfconnae.exe 516 "C:\Windows\SysWOW64\dgimffux.exe"81⤵
- Suspicious use of SetThreadContext
PID:604 -
C:\Windows\SysWOW64\qfconnae.exeC:\Windows\SysWOW64\qfconnae.exe D:\Hex Proje82⤵PID:1096
-
C:\Windows\SysWOW64\aldedvfj.exeC:\Windows\system32\aldedvfj.exe 516 "C:\Windows\SysWOW64\qfconnae.exe"83⤵
- Suspicious use of SetThreadContext
PID:2036 -
C:\Windows\SysWOW64\aldedvfj.exeC:\Windows\SysWOW64\aldedvfj.exe D:\Hex Proje84⤵PID:1984
-
C:\Windows\SysWOW64\njyhmdlq.exeC:\Windows\system32\njyhmdlq.exe 516 "C:\Windows\SysWOW64\aldedvfj.exe"85⤵
- Suspicious use of SetThreadContext
PID:1992 -
C:\Windows\SysWOW64\njyhmdlq.exeC:\Windows\SysWOW64\njyhmdlq.exe D:\Hex Proje86⤵PID:1556
-
C:\Windows\SysWOW64\awpeszjv.exeC:\Windows\system32\awpeszjv.exe 520 "C:\Windows\SysWOW64\njyhmdlq.exe"87⤵
- Suspicious use of SetThreadContext
PID:2884 -
C:\Windows\SysWOW64\awpeszjv.exeC:\Windows\SysWOW64\awpeszjv.exe D:\Hex Proje88⤵PID:1568
-
C:\Windows\SysWOW64\kkquqgwr.exeC:\Windows\system32\kkquqgwr.exe 528 "C:\Windows\SysWOW64\awpeszjv.exe"89⤵
- Suspicious use of SetThreadContext
PID:1700 -
C:\Windows\SysWOW64\kkquqgwr.exeC:\Windows\SysWOW64\kkquqgwr.exe D:\Hex Proje90⤵PID:1820
-
C:\Windows\SysWOW64\wblwyocy.exeC:\Windows\system32\wblwyocy.exe 524 "C:\Windows\SysWOW64\kkquqgwr.exe"91⤵
- Suspicious use of SetThreadContext
PID:900 -
C:\Windows\SysWOW64\wblwyocy.exeC:\Windows\SysWOW64\wblwyocy.exe D:\Hex Proje92⤵PID:276
-
C:\Windows\SysWOW64\hapujnky.exeC:\Windows\system32\hapujnky.exe 532 "C:\Windows\SysWOW64\wblwyocy.exe"93⤵
- Suspicious use of SetThreadContext
PID:1864 -
C:\Windows\SysWOW64\hapujnky.exeC:\Windows\SysWOW64\hapujnky.exe D:\Hex Proje94⤵PID:2364
-
C:\Windows\SysWOW64\tcvjusoi.exeC:\Windows\system32\tcvjusoi.exe 520 "C:\Windows\SysWOW64\hapujnky.exe"95⤵
- Suspicious use of SetThreadContext
PID:336 -
C:\Windows\SysWOW64\tcvjusoi.exeC:\Windows\SysWOW64\tcvjusoi.exe D:\Hex Proje96⤵PID:2140
-
C:\Windows\SysWOW64\gsymlatp.exeC:\Windows\system32\gsymlatp.exe 520 "C:\Windows\SysWOW64\tcvjusoi.exe"97⤵
- Suspicious use of SetThreadContext
PID:756 -
C:\Windows\SysWOW64\gsymlatp.exeC:\Windows\SysWOW64\gsymlatp.exe D:\Hex Proje98⤵PID:2208
-
C:\Windows\SysWOW64\tnhcresc.exeC:\Windows\system32\tnhcresc.exe 524 "C:\Windows\SysWOW64\gsymlatp.exe"99⤵
- Suspicious use of SetThreadContext
PID:1516 -
C:\Windows\SysWOW64\tnhcresc.exeC:\Windows\SysWOW64\tnhcresc.exe D:\Hex Proje100⤵PID:1548
-
C:\Windows\SysWOW64\ghnrcixd.exeC:\Windows\system32\ghnrcixd.exe 528 "C:\Windows\SysWOW64\tnhcresc.exe"101⤵
- Suspicious use of SetThreadContext
PID:2304 -
C:\Windows\SysWOW64\ghnrcixd.exeC:\Windows\SysWOW64\ghnrcixd.exe D:\Hex Proje102⤵PID:2652
-
C:\Windows\SysWOW64\qslcpldf.exeC:\Windows\system32\qslcpldf.exe 516 "C:\Windows\SysWOW64\ghnrcixd.exe"103⤵
- Suspicious use of SetThreadContext
PID:2540 -
C:\Windows\SysWOW64\qslcpldf.exeC:\Windows\SysWOW64\qslcpldf.exe D:\Hex Proje104⤵PID:2844
-
C:\Windows\SysWOW64\dmrkbypp.exeC:\Windows\system32\dmrkbypp.exe 516 "C:\Windows\SysWOW64\qslcpldf.exe"105⤵
- Suspicious use of SetThreadContext
PID:2480 -
C:\Windows\SysWOW64\dmrkbypp.exeC:\Windows\SysWOW64\dmrkbypp.exe D:\Hex Proje106⤵PID:2560
-
C:\Windows\SysWOW64\pkmmjgnw.exeC:\Windows\system32\pkmmjgnw.exe 516 "C:\Windows\SysWOW64\dmrkbypp.exe"107⤵
- Suspicious use of SetThreadContext
PID:2492 -
C:\Windows\SysWOW64\pkmmjgnw.exeC:\Windows\SysWOW64\pkmmjgnw.exe D:\Hex Proje108⤵PID:2568
-
C:\Windows\SysWOW64\dxdcpcub.exeC:\Windows\system32\dxdcpcub.exe 516 "C:\Windows\SysWOW64\pkmmjgnw.exe"109⤵
- Suspicious use of SetThreadContext
PID:2444 -
C:\Windows\SysWOW64\dxdcpcub.exeC:\Windows\SysWOW64\dxdcpcub.exe D:\Hex Proje110⤵PID:1928
-
C:\Windows\SysWOW64\pzjsioyl.exeC:\Windows\system32\pzjsioyl.exe 516 "C:\Windows\SysWOW64\dxdcpcub.exe"111⤵
- Suspicious use of SetThreadContext
PID:1004 -
C:\Windows\SysWOW64\pzjsioyl.exeC:\Windows\SysWOW64\pzjsioyl.exe D:\Hex Proje112⤵PID:1756
-
C:\Windows\SysWOW64\cqeurwvs.exeC:\Windows\system32\cqeurwvs.exe 516 "C:\Windows\SysWOW64\pzjsioyl.exe"113⤵
- Suspicious use of SetThreadContext
PID:1084 -
C:\Windows\SysWOW64\cqeurwvs.exeC:\Windows\SysWOW64\cqeurwvs.exe D:\Hex Proje114⤵PID:2812
-
C:\Windows\SysWOW64\matferku.exeC:\Windows\system32\matferku.exe 524 "C:\Windows\SysWOW64\cqeurwvs.exe"115⤵
- Suspicious use of SetThreadContext
PID:772 -
C:\Windows\SysWOW64\matferku.exeC:\Windows\SysWOW64\matferku.exe D:\Hex Proje116⤵PID:1956
-
C:\Windows\SysWOW64\zuauqeov.exeC:\Windows\system32\zuauqeov.exe 520 "C:\Windows\SysWOW64\matferku.exe"117⤵
- Suspicious use of SetThreadContext
PID:2408 -
C:\Windows\SysWOW64\zuauqeov.exeC:\Windows\SysWOW64\zuauqeov.exe D:\Hex Proje118⤵PID:2376
-
C:\Windows\SysWOW64\mhrkwini.exeC:\Windows\system32\mhrkwini.exe 516 "C:\Windows\SysWOW64\zuauqeov.exe"119⤵
- Suspicious use of SetThreadContext
PID:2108 -
C:\Windows\SysWOW64\mhrkwini.exeC:\Windows\SysWOW64\mhrkwini.exe D:\Hex Proje120⤵PID:1904
-
C:\Windows\SysWOW64\wwszupaf.exeC:\Windows\system32\wwszupaf.exe 528 "C:\Windows\SysWOW64\mhrkwini.exe"121⤵
- Suspicious use of SetThreadContext
PID:776 -
C:\Windows\SysWOW64\wwszupaf.exeC:\Windows\SysWOW64\wwszupaf.exe D:\Hex Proje122⤵
- Drops file in System32 directory
PID:1912
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-