Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-09-2024 11:34
Static task
static1
Behavioral task
behavioral1
Sample
f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe
-
Size
222KB
-
MD5
f38d258532673cf62200ab2d7dd5268a
-
SHA1
39bf714b2e9ffb5a8cf534977588b71e35952ec6
-
SHA256
5edaadd37dd1dd9425dbbbdcd360194fe1f965ae971a5c8165a3effdc25c7e80
-
SHA512
b2c994c3e6575c0463d4278220f79e29867f37049076e28c97feab5af90eec86a472a0f12945df608d73336121c2ff7b9a0c6b30ba82906c67d7f3fdcedc28cf
-
SSDEEP
6144:ASOrStDEnqmNpMBN+Mcqfbobx4aRrxyre5HfTLGSa:pOrp/N2h4x4aRYixLba
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 64 IoCs
pid Process 2152 ypivtr.exe 2716 ypivtr.exe 1624 kvkvnc.exe 2772 kvkvnc.exe 2588 jmiqok.exe 2584 jmiqok.exe 1856 qjtwsi.exe 1604 qjtwsi.exe 1824 ycbgaj.exe 2824 ycbgaj.exe 1936 hxrjqz.exe 2876 hxrjqz.exe 704 rutmro.exe 1960 rutmro.exe 2948 jasbwc.exe 2316 jasbwc.exe 2064 qbomke.exe 2060 qbomke.exe 752 zsbcxy.exe 1008 zsbcxy.exe 892 jvswen.exe 1640 jvswen.exe 936 snfmqz.exe 2276 snfmqz.exe 1412 isozoz.exe 2460 isozoz.exe 3000 matfer.exe 2096 matfer.exe 628 ynifkr.exe 1392 ynifkr.exe 2784 leeaul.exe 2800 leeaul.exe 2812 stnsby.exe 2548 stnsby.exe 2576 ecrfdt.exe 2772 ecrfdt.exe 1296 tookhu.exe 2504 tookhu.exe 2396 dobauf.exe 2860 dobauf.exe 2856 uvbqyb.exe 520 uvbqyb.exe 2592 jgydcc.exe 2320 jgydcc.exe 1948 gefdvj.exe 1104 gefdvj.exe 2292 eqbqtl.exe 1952 eqbqtl.exe 1384 ntzlab.exe 1148 ntzlab.exe 2380 xhboki.exe 532 xhboki.exe 2008 ggcdcc.exe 1732 ggcdcc.exe 2424 txgrfx.exe 2052 txgrfx.exe 2444 dotgrj.exe 936 dotgrj.exe 1612 moywvu.exe 2308 moywvu.exe 1556 egjuui.exe 1564 egjuui.exe 2992 thdrer.exe 2096 thdrer.exe -
Loads dropped DLL 64 IoCs
pid Process 3004 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe 3004 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe 2152 ypivtr.exe 2716 ypivtr.exe 2716 ypivtr.exe 1624 kvkvnc.exe 2772 kvkvnc.exe 2772 kvkvnc.exe 2584 jmiqok.exe 2584 jmiqok.exe 1604 qjtwsi.exe 1604 qjtwsi.exe 2824 ycbgaj.exe 2824 ycbgaj.exe 2876 hxrjqz.exe 2876 hxrjqz.exe 1960 rutmro.exe 1960 rutmro.exe 2316 jasbwc.exe 2316 jasbwc.exe 2060 qbomke.exe 2060 qbomke.exe 1008 zsbcxy.exe 1008 zsbcxy.exe 1640 jvswen.exe 1640 jvswen.exe 2276 snfmqz.exe 2276 snfmqz.exe 2460 isozoz.exe 2460 isozoz.exe 2096 matfer.exe 2096 matfer.exe 1392 ynifkr.exe 1392 ynifkr.exe 2800 leeaul.exe 2800 leeaul.exe 2548 stnsby.exe 2548 stnsby.exe 2772 ecrfdt.exe 2772 ecrfdt.exe 2504 tookhu.exe 2504 tookhu.exe 2860 dobauf.exe 2860 dobauf.exe 520 uvbqyb.exe 520 uvbqyb.exe 2320 jgydcc.exe 2320 jgydcc.exe 1104 gefdvj.exe 1104 gefdvj.exe 1952 eqbqtl.exe 1952 eqbqtl.exe 1148 ntzlab.exe 1148 ntzlab.exe 532 xhboki.exe 532 xhboki.exe 1732 ggcdcc.exe 1732 ggcdcc.exe 2052 txgrfx.exe 2052 txgrfx.exe 936 dotgrj.exe 936 dotgrj.exe 2308 moywvu.exe 2308 moywvu.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\zrhwbd.exe ctbwaw.exe File created C:\Windows\SysWOW64\sjokqy.exe mfhnzk.exe File created C:\Windows\SysWOW64\fwhsqo.exe sjokqy.exe File opened for modification C:\Windows\SysWOW64\ekmgjh.exe jphqrn.exe File opened for modification C:\Windows\SysWOW64\dvktko.exe jxuypq.exe File created C:\Windows\SysWOW64\kjbxff.exe acbaaq.exe File opened for modification C:\Windows\SysWOW64\dztdjl.exe tvwtib.exe File opened for modification C:\Windows\SysWOW64\osursk.exe xduboo.exe File opened for modification C:\Windows\SysWOW64\zvoxqu.exe ydbidj.exe File opened for modification C:\Windows\SysWOW64\sjokqy.exe mfhnzk.exe File opened for modification C:\Windows\SysWOW64\naqqxx.exe qcjqeq.exe File created C:\Windows\SysWOW64\xylfvd.exe lstxvm.exe File created C:\Windows\SysWOW64\dobauf.exe tookhu.exe File created C:\Windows\SysWOW64\jfcxwa.exe rycirm.exe File opened for modification C:\Windows\SysWOW64\jcrjel.exe rcgmff.exe File created C:\Windows\SysWOW64\eyjeyf.exe noytqm.exe File opened for modification C:\Windows\SysWOW64\zxjrzy.exe pxyuas.exe File created C:\Windows\SysWOW64\zsbcxy.exe qbomke.exe File opened for modification C:\Windows\SysWOW64\leeaul.exe ynifkr.exe File created C:\Windows\SysWOW64\suurtc.exe igtosv.exe File created C:\Windows\SysWOW64\pjiesb.exe usojvm.exe File created C:\Windows\SysWOW64\lnnucb.exe rwtsfm.exe File created C:\Windows\SysWOW64\fmpnah.exe wrztlr.exe File opened for modification C:\Windows\SysWOW64\pjiesb.exe usojvm.exe File opened for modification C:\Windows\SysWOW64\wqdxco.exe ffsmuw.exe File opened for modification C:\Windows\SysWOW64\dbfotc.exe wbrdns.exe File created C:\Windows\SysWOW64\xlnrqx.exe defwnz.exe File created C:\Windows\SysWOW64\jlotsp.exe rizirf.exe File opened for modification C:\Windows\SysWOW64\xrvgjj.exe naqqxx.exe File created C:\Windows\SysWOW64\uyseeq.exe hhorbv.exe File created C:\Windows\SysWOW64\nufvwu.exe yihqsl.exe File created C:\Windows\SysWOW64\zxpluh.exe fzzqrk.exe File created C:\Windows\SysWOW64\rxsrtv.exe zxpluh.exe File opened for modification C:\Windows\SysWOW64\nmsjfl.exe zxjrzy.exe File created C:\Windows\SysWOW64\jvswen.exe zsbcxy.exe File opened for modification C:\Windows\SysWOW64\eohmym.exe hulrij.exe File opened for modification C:\Windows\SysWOW64\ydbidj.exe glqfwq.exe File opened for modification C:\Windows\SysWOW64\igtosv.exe yogzfj.exe File opened for modification C:\Windows\SysWOW64\ccbcmq.exe nmsjfl.exe File created C:\Windows\SysWOW64\cvwqel.exe ipgnbn.exe File created C:\Windows\SysWOW64\biomkc.exe mwqggu.exe File created C:\Windows\SysWOW64\ncdktm.exe ynvrmz.exe File created C:\Windows\SysWOW64\fgnabp.exe spsnqc.exe File opened for modification C:\Windows\SysWOW64\wfsmpc.exe hfguoy.exe File created C:\Windows\SysWOW64\leksyq.exe bmxcme.exe File created C:\Windows\SysWOW64\vgnzvs.exe ogqphi.exe File opened for modification C:\Windows\SysWOW64\fwecqn.exe tkxcco.exe File opened for modification C:\Windows\SysWOW64\ntzlab.exe eqbqtl.exe File opened for modification C:\Windows\SysWOW64\moywvu.exe dotgrj.exe File opened for modification C:\Windows\SysWOW64\gvicuu.exe osursk.exe File opened for modification C:\Windows\SysWOW64\ftassr.exe nbpplz.exe File created C:\Windows\SysWOW64\mewzze.exe suurtc.exe File created C:\Windows\SysWOW64\snfmqz.exe jvswen.exe File opened for modification C:\Windows\SysWOW64\uvbqyb.exe dobauf.exe File created C:\Windows\SysWOW64\fzzqrk.exe tfsqmt.exe File created C:\Windows\SysWOW64\rvalbt.exe fxiyty.exe File opened for modification C:\Windows\SysWOW64\frwnol.exe ynoyxe.exe File opened for modification C:\Windows\SysWOW64\tetzqy.exe eokhkl.exe File opened for modification C:\Windows\SysWOW64\ldimos.exe rxsrtv.exe File created C:\Windows\SysWOW64\matfer.exe isozoz.exe File opened for modification C:\Windows\SysWOW64\wusrys.exe ckrktq.exe File opened for modification C:\Windows\SysWOW64\fknxwv.exe tbrkla.exe File opened for modification C:\Windows\SysWOW64\mdsaer.exe uwsdad.exe File created C:\Windows\SysWOW64\egjuui.exe moywvu.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 468 set thread context of 3004 468 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe 30 PID 2152 set thread context of 2716 2152 ypivtr.exe 32 PID 1624 set thread context of 2772 1624 kvkvnc.exe 34 PID 2588 set thread context of 2584 2588 jmiqok.exe 36 PID 1856 set thread context of 1604 1856 qjtwsi.exe 38 PID 1824 set thread context of 2824 1824 ycbgaj.exe 40 PID 1936 set thread context of 2876 1936 hxrjqz.exe 42 PID 704 set thread context of 1960 704 rutmro.exe 44 PID 2948 set thread context of 2316 2948 jasbwc.exe 46 PID 2064 set thread context of 2060 2064 qbomke.exe 48 PID 752 set thread context of 1008 752 zsbcxy.exe 50 PID 892 set thread context of 1640 892 jvswen.exe 52 PID 936 set thread context of 2276 936 snfmqz.exe 54 PID 1412 set thread context of 2460 1412 isozoz.exe 56 PID 3000 set thread context of 2096 3000 matfer.exe 58 PID 628 set thread context of 1392 628 ynifkr.exe 60 PID 2784 set thread context of 2800 2784 leeaul.exe 62 PID 2812 set thread context of 2548 2812 stnsby.exe 64 PID 2576 set thread context of 2772 2576 ecrfdt.exe 66 PID 1296 set thread context of 2504 1296 tookhu.exe 68 PID 2396 set thread context of 2860 2396 dobauf.exe 70 PID 2856 set thread context of 520 2856 uvbqyb.exe 72 PID 2592 set thread context of 2320 2592 jgydcc.exe 74 PID 1948 set thread context of 1104 1948 gefdvj.exe 76 PID 2292 set thread context of 1952 2292 eqbqtl.exe 78 PID 1384 set thread context of 1148 1384 ntzlab.exe 80 PID 2380 set thread context of 532 2380 xhboki.exe 82 PID 2008 set thread context of 1732 2008 ggcdcc.exe 84 PID 2424 set thread context of 2052 2424 txgrfx.exe 86 PID 2444 set thread context of 936 2444 dotgrj.exe 88 PID 1612 set thread context of 2308 1612 moywvu.exe 90 PID 1556 set thread context of 1564 1556 egjuui.exe 92 PID 2992 set thread context of 2096 2992 thdrer.exe 94 PID 2656 set thread context of 2808 2656 dyqhqc.exe 96 PID 2936 set thread context of 2800 2936 hejpqt.exe 98 PID 2748 set thread context of 1656 2748 ckrktq.exe 100 PID 2620 set thread context of 2228 2620 wusrys.exe 102 PID 2384 set thread context of 2404 2384 izlzyj.exe 104 PID 3012 set thread context of 2840 3012 uxdmhm.exe 106 PID 880 set thread context of 2824 880 mxokgs.exe 108 PID 1844 set thread context of 1532 1844 bmxcme.exe 110 PID 2164 set thread context of 1284 2164 leksyq.exe 112 PID 2076 set thread context of 2180 2076 fksnbn.exe 114 PID 1668 set thread context of 1576 1668 pycqdv.exe 116 PID 968 set thread context of 2060 968 bljqiu.exe 118 PID 1616 set thread context of 1348 1616 wrztlr.exe 120 PID 2256 set thread context of 2296 2256 fmpnah.exe 122 PID 2304 set thread context of 2244 2304 sdtidc.exe 124 PID 1560 set thread context of 2472 1560 jktyiq.exe 126 PID 3000 set thread context of 1648 3000 ywqdlz.exe 128 PID 2672 set thread context of 2260 2672 tqvtls.exe 130 PID 2712 set thread context of 2680 2712 defwnz.exe 132 PID 2660 set thread context of 2528 2660 xlnrqx.exe 134 PID 3036 set thread context of 3044 3036 gdybxp.exe 136 PID 316 set thread context of 2028 316 bydjxi.exe 138 PID 1876 set thread context of 2340 1876 vwtesg.exe 140 PID 2864 set thread context of 2832 2864 hulrij.exe 142 PID 2956 set thread context of 1160 2956 eohmym.exe 144 PID 1964 set thread context of 1248 1964 tanrcn.exe 146 PID 2160 set thread context of 2964 2160 nbgzio.exe 148 PID 2044 set thread context of 2316 2044 ffvkky.exe 150 PID 768 set thread context of 2372 768 ucluql.exe 152 PID 1396 set thread context of 1304 1396 eqnfas.exe 154 PID 2408 set thread context of 236 2408 yovauq.exe 156 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rizirf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ufwpae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ovmmcd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvktko.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stnsby.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uxdmhm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language liyxlj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frwnol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ncdktm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnsqeq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rcgmff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ojoxrm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zvoxqu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mfhnzk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eldysc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ldimos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fknxwv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dotgrj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gdybxp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lcegwo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hxquyn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jktyiq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dcidai.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfunfu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvwqel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skqqzo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zjvaxt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qnhfgy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddviti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language leeaul.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language usojvm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language weiweb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wqdxco.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhorbv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jgydcc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tqvtls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ugcble.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language suurtc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flixlc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xhboki.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bljqiu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sjokqy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language magqhv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ynifkr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ggcdcc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hfhpvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spsnqc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jileoz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mxokgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fkhgsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ynzcpo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hsljas.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fwecqn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dyqhqc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tzehsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lercie.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tkxcco.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvswen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language moywvu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jktyiq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ohxyfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pxyuas.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wusrys.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bydjxi.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 468 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe 2152 ypivtr.exe 1624 kvkvnc.exe 2588 jmiqok.exe 1856 qjtwsi.exe 1824 ycbgaj.exe 1936 hxrjqz.exe 704 rutmro.exe 2948 jasbwc.exe 2064 qbomke.exe 752 zsbcxy.exe 892 jvswen.exe 936 snfmqz.exe 1412 isozoz.exe 3000 matfer.exe 628 ynifkr.exe 2784 leeaul.exe 2812 stnsby.exe 2576 ecrfdt.exe 1296 tookhu.exe 2396 dobauf.exe 2856 uvbqyb.exe 2592 jgydcc.exe 1948 gefdvj.exe 2292 eqbqtl.exe 1384 ntzlab.exe 2380 xhboki.exe 2008 ggcdcc.exe 2424 txgrfx.exe 2444 dotgrj.exe 1612 moywvu.exe 1556 egjuui.exe 2992 thdrer.exe 2656 dyqhqc.exe 2936 hejpqt.exe 2748 ckrktq.exe 2620 wusrys.exe 2384 izlzyj.exe 3012 uxdmhm.exe 880 mxokgs.exe 1844 bmxcme.exe 2164 leksyq.exe 2076 fksnbn.exe 1668 pycqdv.exe 968 bljqiu.exe 1616 wrztlr.exe 2256 fmpnah.exe 2304 sdtidc.exe 1560 jktyiq.exe 3000 ywqdlz.exe 2672 tqvtls.exe 2712 defwnz.exe 2660 xlnrqx.exe 3036 gdybxp.exe 316 bydjxi.exe 1876 vwtesg.exe 2864 hulrij.exe 2956 eohmym.exe 1964 tanrcn.exe 2160 nbgzio.exe 2044 ffvkky.exe 768 ucluql.exe 1396 eqnfas.exe 2408 yovauq.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 468 wrote to memory of 3004 468 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe 30 PID 468 wrote to memory of 3004 468 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe 30 PID 468 wrote to memory of 3004 468 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe 30 PID 468 wrote to memory of 3004 468 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe 30 PID 468 wrote to memory of 3004 468 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe 30 PID 468 wrote to memory of 3004 468 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe 30 PID 3004 wrote to memory of 2152 3004 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe 31 PID 3004 wrote to memory of 2152 3004 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe 31 PID 3004 wrote to memory of 2152 3004 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe 31 PID 3004 wrote to memory of 2152 3004 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe 31 PID 2152 wrote to memory of 2716 2152 ypivtr.exe 32 PID 2152 wrote to memory of 2716 2152 ypivtr.exe 32 PID 2152 wrote to memory of 2716 2152 ypivtr.exe 32 PID 2152 wrote to memory of 2716 2152 ypivtr.exe 32 PID 2152 wrote to memory of 2716 2152 ypivtr.exe 32 PID 2152 wrote to memory of 2716 2152 ypivtr.exe 32 PID 2716 wrote to memory of 1624 2716 ypivtr.exe 33 PID 2716 wrote to memory of 1624 2716 ypivtr.exe 33 PID 2716 wrote to memory of 1624 2716 ypivtr.exe 33 PID 2716 wrote to memory of 1624 2716 ypivtr.exe 33 PID 1624 wrote to memory of 2772 1624 kvkvnc.exe 34 PID 1624 wrote to memory of 2772 1624 kvkvnc.exe 34 PID 1624 wrote to memory of 2772 1624 kvkvnc.exe 34 PID 1624 wrote to memory of 2772 1624 kvkvnc.exe 34 PID 1624 wrote to memory of 2772 1624 kvkvnc.exe 34 PID 1624 wrote to memory of 2772 1624 kvkvnc.exe 34 PID 2772 wrote to memory of 2588 2772 kvkvnc.exe 35 PID 2772 wrote to memory of 2588 2772 kvkvnc.exe 35 PID 2772 wrote to memory of 2588 2772 kvkvnc.exe 35 PID 2772 wrote to memory of 2588 2772 kvkvnc.exe 35 PID 2588 wrote to memory of 2584 2588 jmiqok.exe 36 PID 2588 wrote to memory of 2584 2588 jmiqok.exe 36 PID 2588 wrote to memory of 2584 2588 jmiqok.exe 36 PID 2588 wrote to memory of 2584 2588 jmiqok.exe 36 PID 2588 wrote to memory of 2584 2588 jmiqok.exe 36 PID 2588 wrote to memory of 2584 2588 jmiqok.exe 36 PID 2584 wrote to memory of 1856 2584 jmiqok.exe 37 PID 2584 wrote to memory of 1856 2584 jmiqok.exe 37 PID 2584 wrote to memory of 1856 2584 jmiqok.exe 37 PID 2584 wrote to memory of 1856 2584 jmiqok.exe 37 PID 1856 wrote to memory of 1604 1856 qjtwsi.exe 38 PID 1856 wrote to memory of 1604 1856 qjtwsi.exe 38 PID 1856 wrote to memory of 1604 1856 qjtwsi.exe 38 PID 1856 wrote to memory of 1604 1856 qjtwsi.exe 38 PID 1856 wrote to memory of 1604 1856 qjtwsi.exe 38 PID 1856 wrote to memory of 1604 1856 qjtwsi.exe 38 PID 1604 wrote to memory of 1824 1604 qjtwsi.exe 39 PID 1604 wrote to memory of 1824 1604 qjtwsi.exe 39 PID 1604 wrote to memory of 1824 1604 qjtwsi.exe 39 PID 1604 wrote to memory of 1824 1604 qjtwsi.exe 39 PID 1824 wrote to memory of 2824 1824 ycbgaj.exe 40 PID 1824 wrote to memory of 2824 1824 ycbgaj.exe 40 PID 1824 wrote to memory of 2824 1824 ycbgaj.exe 40 PID 1824 wrote to memory of 2824 1824 ycbgaj.exe 40 PID 1824 wrote to memory of 2824 1824 ycbgaj.exe 40 PID 1824 wrote to memory of 2824 1824 ycbgaj.exe 40 PID 2824 wrote to memory of 1936 2824 ycbgaj.exe 41 PID 2824 wrote to memory of 1936 2824 ycbgaj.exe 41 PID 2824 wrote to memory of 1936 2824 ycbgaj.exe 41 PID 2824 wrote to memory of 1936 2824 ycbgaj.exe 41 PID 1936 wrote to memory of 2876 1936 hxrjqz.exe 42 PID 1936 wrote to memory of 2876 1936 hxrjqz.exe 42 PID 1936 wrote to memory of 2876 1936 hxrjqz.exe 42 PID 1936 wrote to memory of 2876 1936 hxrjqz.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Users\Admin\AppData\Local\Temp\f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\ypivtr.exeC:\Windows\system32\ypivtr.exe 488 "C:\Users\Admin\AppData\Local\Temp\f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\ypivtr.exe488 C:\Users\Admin\AppData\Local\Temp\f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\kvkvnc.exeC:\Windows\system32\kvkvnc.exe 444 "C:\Windows\SysWOW64\ypivtr.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\kvkvnc.exe444 C:\Windows\SysWOW64\ypivtr.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\jmiqok.exeC:\Windows\system32\jmiqok.exe 444 "C:\Windows\SysWOW64\kvkvnc.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\jmiqok.exe444 C:\Windows\SysWOW64\kvkvnc.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\qjtwsi.exeC:\Windows\system32\qjtwsi.exe 476 "C:\Windows\SysWOW64\jmiqok.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\qjtwsi.exe476 C:\Windows\SysWOW64\jmiqok.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\ycbgaj.exeC:\Windows\system32\ycbgaj.exe 448 "C:\Windows\SysWOW64\qjtwsi.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\ycbgaj.exe448 C:\Windows\SysWOW64\qjtwsi.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\hxrjqz.exeC:\Windows\system32\hxrjqz.exe 444 "C:\Windows\SysWOW64\ycbgaj.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\hxrjqz.exe444 C:\Windows\SysWOW64\ycbgaj.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2876 -
C:\Windows\SysWOW64\rutmro.exeC:\Windows\system32\rutmro.exe 448 "C:\Windows\SysWOW64\hxrjqz.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:704 -
C:\Windows\SysWOW64\rutmro.exe448 C:\Windows\SysWOW64\hxrjqz.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1960 -
C:\Windows\SysWOW64\jasbwc.exeC:\Windows\system32\jasbwc.exe 472 "C:\Windows\SysWOW64\rutmro.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2948 -
C:\Windows\SysWOW64\jasbwc.exe472 C:\Windows\SysWOW64\rutmro.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2316 -
C:\Windows\SysWOW64\qbomke.exeC:\Windows\system32\qbomke.exe 444 "C:\Windows\SysWOW64\jasbwc.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2064 -
C:\Windows\SysWOW64\qbomke.exe444 C:\Windows\SysWOW64\jasbwc.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2060 -
C:\Windows\SysWOW64\zsbcxy.exeC:\Windows\system32\zsbcxy.exe 456 "C:\Windows\SysWOW64\qbomke.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:752 -
C:\Windows\SysWOW64\zsbcxy.exe456 C:\Windows\SysWOW64\qbomke.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1008 -
C:\Windows\SysWOW64\jvswen.exeC:\Windows\system32\jvswen.exe 448 "C:\Windows\SysWOW64\zsbcxy.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:892 -
C:\Windows\SysWOW64\jvswen.exe448 C:\Windows\SysWOW64\zsbcxy.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1640 -
C:\Windows\SysWOW64\snfmqz.exeC:\Windows\system32\snfmqz.exe 456 "C:\Windows\SysWOW64\jvswen.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:936 -
C:\Windows\SysWOW64\snfmqz.exe456 C:\Windows\SysWOW64\jvswen.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2276 -
C:\Windows\SysWOW64\isozoz.exeC:\Windows\system32\isozoz.exe 492 "C:\Windows\SysWOW64\snfmqz.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1412 -
C:\Windows\SysWOW64\isozoz.exe492 C:\Windows\SysWOW64\snfmqz.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2460 -
C:\Windows\SysWOW64\matfer.exeC:\Windows\system32\matfer.exe 456 "C:\Windows\SysWOW64\isozoz.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:3000 -
C:\Windows\SysWOW64\matfer.exe456 C:\Windows\SysWOW64\isozoz.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2096 -
C:\Windows\SysWOW64\ynifkr.exeC:\Windows\system32\ynifkr.exe 472 "C:\Windows\SysWOW64\matfer.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:628 -
C:\Windows\SysWOW64\ynifkr.exe472 C:\Windows\SysWOW64\matfer.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1392 -
C:\Windows\SysWOW64\leeaul.exeC:\Windows\system32\leeaul.exe 444 "C:\Windows\SysWOW64\ynifkr.exe"33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2784 -
C:\Windows\SysWOW64\leeaul.exe444 C:\Windows\SysWOW64\ynifkr.exe34⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2800 -
C:\Windows\SysWOW64\stnsby.exeC:\Windows\system32\stnsby.exe 488 "C:\Windows\SysWOW64\leeaul.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2812 -
C:\Windows\SysWOW64\stnsby.exe488 C:\Windows\SysWOW64\leeaul.exe36⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2548 -
C:\Windows\SysWOW64\ecrfdt.exeC:\Windows\system32\ecrfdt.exe 452 "C:\Windows\SysWOW64\stnsby.exe"37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2576 -
C:\Windows\SysWOW64\ecrfdt.exe452 C:\Windows\SysWOW64\stnsby.exe38⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2772 -
C:\Windows\SysWOW64\tookhu.exeC:\Windows\system32\tookhu.exe 452 "C:\Windows\SysWOW64\ecrfdt.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1296 -
C:\Windows\SysWOW64\tookhu.exe452 C:\Windows\SysWOW64\ecrfdt.exe40⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2504 -
C:\Windows\SysWOW64\dobauf.exeC:\Windows\system32\dobauf.exe 456 "C:\Windows\SysWOW64\tookhu.exe"41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2396 -
C:\Windows\SysWOW64\dobauf.exe456 C:\Windows\SysWOW64\tookhu.exe42⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2860 -
C:\Windows\SysWOW64\uvbqyb.exeC:\Windows\system32\uvbqyb.exe 456 "C:\Windows\SysWOW64\dobauf.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2856 -
C:\Windows\SysWOW64\uvbqyb.exe456 C:\Windows\SysWOW64\dobauf.exe44⤵
- Executes dropped EXE
- Loads dropped DLL
PID:520 -
C:\Windows\SysWOW64\jgydcc.exeC:\Windows\system32\jgydcc.exe 464 "C:\Windows\SysWOW64\uvbqyb.exe"45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2592 -
C:\Windows\SysWOW64\jgydcc.exe464 C:\Windows\SysWOW64\uvbqyb.exe46⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2320 -
C:\Windows\SysWOW64\gefdvj.exeC:\Windows\system32\gefdvj.exe 456 "C:\Windows\SysWOW64\jgydcc.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1948 -
C:\Windows\SysWOW64\gefdvj.exe456 C:\Windows\SysWOW64\jgydcc.exe48⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1104 -
C:\Windows\SysWOW64\eqbqtl.exeC:\Windows\system32\eqbqtl.exe 452 "C:\Windows\SysWOW64\gefdvj.exe"49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2292 -
C:\Windows\SysWOW64\eqbqtl.exe452 C:\Windows\SysWOW64\gefdvj.exe50⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1952 -
C:\Windows\SysWOW64\ntzlab.exeC:\Windows\system32\ntzlab.exe 532 "C:\Windows\SysWOW64\eqbqtl.exe"51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1384 -
C:\Windows\SysWOW64\ntzlab.exe532 C:\Windows\SysWOW64\eqbqtl.exe52⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1148 -
C:\Windows\SysWOW64\xhboki.exeC:\Windows\system32\xhboki.exe 492 "C:\Windows\SysWOW64\ntzlab.exe"53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2380 -
C:\Windows\SysWOW64\xhboki.exe492 C:\Windows\SysWOW64\ntzlab.exe54⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:532 -
C:\Windows\SysWOW64\ggcdcc.exeC:\Windows\system32\ggcdcc.exe 472 "C:\Windows\SysWOW64\xhboki.exe"55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2008 -
C:\Windows\SysWOW64\ggcdcc.exe472 C:\Windows\SysWOW64\xhboki.exe56⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1732 -
C:\Windows\SysWOW64\txgrfx.exeC:\Windows\system32\txgrfx.exe 472 "C:\Windows\SysWOW64\ggcdcc.exe"57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2424 -
C:\Windows\SysWOW64\txgrfx.exe472 C:\Windows\SysWOW64\ggcdcc.exe58⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2052 -
C:\Windows\SysWOW64\dotgrj.exeC:\Windows\system32\dotgrj.exe 448 "C:\Windows\SysWOW64\txgrfx.exe"59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2444 -
C:\Windows\SysWOW64\dotgrj.exe448 C:\Windows\SysWOW64\txgrfx.exe60⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:936 -
C:\Windows\SysWOW64\moywvu.exeC:\Windows\system32\moywvu.exe 456 "C:\Windows\SysWOW64\dotgrj.exe"61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1612 -
C:\Windows\SysWOW64\moywvu.exe456 C:\Windows\SysWOW64\dotgrj.exe62⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2308 -
C:\Windows\SysWOW64\egjuui.exeC:\Windows\system32\egjuui.exe 460 "C:\Windows\SysWOW64\moywvu.exe"63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1556 -
C:\Windows\SysWOW64\egjuui.exe460 C:\Windows\SysWOW64\moywvu.exe64⤵
- Executes dropped EXE
PID:1564 -
C:\Windows\SysWOW64\thdrer.exeC:\Windows\system32\thdrer.exe 472 "C:\Windows\SysWOW64\egjuui.exe"65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2992 -
C:\Windows\SysWOW64\thdrer.exe472 C:\Windows\SysWOW64\egjuui.exe66⤵
- Executes dropped EXE
PID:2096 -
C:\Windows\SysWOW64\dyqhqc.exeC:\Windows\system32\dyqhqc.exe 464 "C:\Windows\SysWOW64\thdrer.exe"67⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2656 -
C:\Windows\SysWOW64\dyqhqc.exe464 C:\Windows\SysWOW64\thdrer.exe68⤵PID:2808
-
C:\Windows\SysWOW64\hejpqt.exeC:\Windows\system32\hejpqt.exe 444 "C:\Windows\SysWOW64\dyqhqc.exe"69⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2936 -
C:\Windows\SysWOW64\hejpqt.exe444 C:\Windows\SysWOW64\dyqhqc.exe70⤵PID:2800
-
C:\Windows\SysWOW64\ckrktq.exeC:\Windows\system32\ckrktq.exe 444 "C:\Windows\SysWOW64\hejpqt.exe"71⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2748 -
C:\Windows\SysWOW64\ckrktq.exe444 C:\Windows\SysWOW64\hejpqt.exe72⤵
- Drops file in System32 directory
PID:1656 -
C:\Windows\SysWOW64\wusrys.exeC:\Windows\system32\wusrys.exe 468 "C:\Windows\SysWOW64\ckrktq.exe"73⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2620 -
C:\Windows\SysWOW64\wusrys.exe468 C:\Windows\SysWOW64\ckrktq.exe74⤵
- System Location Discovery: System Language Discovery
PID:2228 -
C:\Windows\SysWOW64\izlzyj.exeC:\Windows\system32\izlzyj.exe 492 "C:\Windows\SysWOW64\wusrys.exe"75⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2384 -
C:\Windows\SysWOW64\izlzyj.exe492 C:\Windows\SysWOW64\wusrys.exe76⤵PID:2404
-
C:\Windows\SysWOW64\uxdmhm.exeC:\Windows\system32\uxdmhm.exe 476 "C:\Windows\SysWOW64\izlzyj.exe"77⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:3012 -
C:\Windows\SysWOW64\uxdmhm.exe476 C:\Windows\SysWOW64\izlzyj.exe78⤵
- System Location Discovery: System Language Discovery
PID:2840 -
C:\Windows\SysWOW64\mxokgs.exeC:\Windows\system32\mxokgs.exe 448 "C:\Windows\SysWOW64\uxdmhm.exe"79⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:880 -
C:\Windows\SysWOW64\mxokgs.exe448 C:\Windows\SysWOW64\uxdmhm.exe80⤵
- System Location Discovery: System Language Discovery
PID:2824 -
C:\Windows\SysWOW64\bmxcme.exeC:\Windows\system32\bmxcme.exe 456 "C:\Windows\SysWOW64\mxokgs.exe"81⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1844 -
C:\Windows\SysWOW64\bmxcme.exe456 C:\Windows\SysWOW64\mxokgs.exe82⤵
- Drops file in System32 directory
PID:1532 -
C:\Windows\SysWOW64\leksyq.exeC:\Windows\system32\leksyq.exe 444 "C:\Windows\SysWOW64\bmxcme.exe"83⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2164 -
C:\Windows\SysWOW64\leksyq.exe444 C:\Windows\SysWOW64\bmxcme.exe84⤵PID:1284
-
C:\Windows\SysWOW64\fksnbn.exeC:\Windows\system32\fksnbn.exe 480 "C:\Windows\SysWOW64\leksyq.exe"85⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2076 -
C:\Windows\SysWOW64\fksnbn.exe480 C:\Windows\SysWOW64\leksyq.exe86⤵PID:2180
-
C:\Windows\SysWOW64\pycqdv.exeC:\Windows\system32\pycqdv.exe 524 "C:\Windows\SysWOW64\fksnbn.exe"87⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1668 -
C:\Windows\SysWOW64\pycqdv.exe524 C:\Windows\SysWOW64\fksnbn.exe88⤵PID:1576
-
C:\Windows\SysWOW64\bljqiu.exeC:\Windows\system32\bljqiu.exe 448 "C:\Windows\SysWOW64\pycqdv.exe"89⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:968 -
C:\Windows\SysWOW64\bljqiu.exe448 C:\Windows\SysWOW64\pycqdv.exe90⤵PID:2060
-
C:\Windows\SysWOW64\wrztlr.exeC:\Windows\system32\wrztlr.exe 448 "C:\Windows\SysWOW64\bljqiu.exe"91⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1616 -
C:\Windows\SysWOW64\wrztlr.exe448 C:\Windows\SysWOW64\bljqiu.exe92⤵
- Drops file in System32 directory
PID:1348 -
C:\Windows\SysWOW64\fmpnah.exeC:\Windows\system32\fmpnah.exe 456 "C:\Windows\SysWOW64\wrztlr.exe"93⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2256 -
C:\Windows\SysWOW64\fmpnah.exe456 C:\Windows\SysWOW64\wrztlr.exe94⤵PID:2296
-
C:\Windows\SysWOW64\sdtidc.exeC:\Windows\system32\sdtidc.exe 452 "C:\Windows\SysWOW64\fmpnah.exe"95⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2304 -
C:\Windows\SysWOW64\sdtidc.exe452 C:\Windows\SysWOW64\fmpnah.exe96⤵PID:2244
-
C:\Windows\SysWOW64\jktyiq.exeC:\Windows\system32\jktyiq.exe 456 "C:\Windows\SysWOW64\sdtidc.exe"97⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1560 -
C:\Windows\SysWOW64\jktyiq.exe456 C:\Windows\SysWOW64\sdtidc.exe98⤵
- System Location Discovery: System Language Discovery
PID:2472 -
C:\Windows\SysWOW64\ywqdlz.exeC:\Windows\system32\ywqdlz.exe 464 "C:\Windows\SysWOW64\jktyiq.exe"99⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:3000 -
C:\Windows\SysWOW64\ywqdlz.exe464 C:\Windows\SysWOW64\jktyiq.exe100⤵PID:1648
-
C:\Windows\SysWOW64\tqvtls.exeC:\Windows\system32\tqvtls.exe 440 "C:\Windows\SysWOW64\ywqdlz.exe"101⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2672 -
C:\Windows\SysWOW64\tqvtls.exe440 C:\Windows\SysWOW64\ywqdlz.exe102⤵
- System Location Discovery: System Language Discovery
PID:2260 -
C:\Windows\SysWOW64\defwnz.exeC:\Windows\system32\defwnz.exe 452 "C:\Windows\SysWOW64\tqvtls.exe"103⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2712 -
C:\Windows\SysWOW64\defwnz.exe452 C:\Windows\SysWOW64\tqvtls.exe104⤵
- Drops file in System32 directory
PID:2680 -
C:\Windows\SysWOW64\xlnrqx.exeC:\Windows\system32\xlnrqx.exe 444 "C:\Windows\SysWOW64\defwnz.exe"105⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2660 -
C:\Windows\SysWOW64\xlnrqx.exe444 C:\Windows\SysWOW64\defwnz.exe106⤵PID:2528
-
C:\Windows\SysWOW64\gdybxp.exeC:\Windows\system32\gdybxp.exe 448 "C:\Windows\SysWOW64\xlnrqx.exe"107⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:3036 -
C:\Windows\SysWOW64\gdybxp.exe448 C:\Windows\SysWOW64\xlnrqx.exe108⤵
- System Location Discovery: System Language Discovery
PID:3044 -
C:\Windows\SysWOW64\bydjxi.exeC:\Windows\system32\bydjxi.exe 472 "C:\Windows\SysWOW64\gdybxp.exe"109⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:316 -
C:\Windows\SysWOW64\bydjxi.exe472 C:\Windows\SysWOW64\gdybxp.exe110⤵PID:2028
-
C:\Windows\SysWOW64\vwtesg.exeC:\Windows\system32\vwtesg.exe 456 "C:\Windows\SysWOW64\bydjxi.exe"111⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1876 -
C:\Windows\SysWOW64\vwtesg.exe456 C:\Windows\SysWOW64\bydjxi.exe112⤵PID:2340
-
C:\Windows\SysWOW64\hulrij.exeC:\Windows\system32\hulrij.exe 452 "C:\Windows\SysWOW64\vwtesg.exe"113⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2864 -
C:\Windows\SysWOW64\hulrij.exe452 C:\Windows\SysWOW64\vwtesg.exe114⤵
- Drops file in System32 directory
PID:2832 -
C:\Windows\SysWOW64\eohmym.exeC:\Windows\system32\eohmym.exe 444 "C:\Windows\SysWOW64\hulrij.exe"115⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2956 -
C:\Windows\SysWOW64\eohmym.exe444 C:\Windows\SysWOW64\hulrij.exe116⤵PID:1160
-
C:\Windows\SysWOW64\tanrcn.exeC:\Windows\system32\tanrcn.exe 452 "C:\Windows\SysWOW64\eohmym.exe"117⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1964 -
C:\Windows\SysWOW64\tanrcn.exe452 C:\Windows\SysWOW64\eohmym.exe118⤵PID:1248
-
C:\Windows\SysWOW64\nbgzio.exeC:\Windows\system32\nbgzio.exe 448 "C:\Windows\SysWOW64\tanrcn.exe"119⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2160 -
C:\Windows\SysWOW64\nbgzio.exe448 C:\Windows\SysWOW64\tanrcn.exe120⤵PID:2964
-
C:\Windows\SysWOW64\ffvkky.exeC:\Windows\system32\ffvkky.exe 448 "C:\Windows\SysWOW64\nbgzio.exe"121⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2044 -
C:\Windows\SysWOW64\ffvkky.exe448 C:\Windows\SysWOW64\nbgzio.exe122⤵PID:2316
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-