Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-09-2024 11:34
Static task
static1
Behavioral task
behavioral1
Sample
f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe
-
Size
222KB
-
MD5
f38d258532673cf62200ab2d7dd5268a
-
SHA1
39bf714b2e9ffb5a8cf534977588b71e35952ec6
-
SHA256
5edaadd37dd1dd9425dbbbdcd360194fe1f965ae971a5c8165a3effdc25c7e80
-
SHA512
b2c994c3e6575c0463d4278220f79e29867f37049076e28c97feab5af90eec86a472a0f12945df608d73336121c2ff7b9a0c6b30ba82906c67d7f3fdcedc28cf
-
SSDEEP
6144:ASOrStDEnqmNpMBN+Mcqfbobx4aRrxyre5HfTLGSa:pOrp/N2h4x4aRYixLba
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 64 IoCs
pid Process 3980 lconcf.exe 3356 lconcf.exe 2388 dqoyyo.exe 1648 dqoyyo.exe 3776 yewwsz.exe 860 yewwsz.exe 1988 bowlkv.exe 3984 bowlkv.exe 1036 bziezz.exe 996 bziezz.exe 8 bzjjkh.exe 3108 bzjjkh.exe 1384 vfzmne.exe 4692 vfzmne.exe 3204 tokmbd.exe 3900 tokmbd.exe 980 wuqxqu.exe 4180 wuqxqu.exe 3988 ojqhmv.exe 3012 ojqhmv.exe 3016 lgxhfc.exe 4808 lgxhfc.exe 4488 ojafsq.exe 3268 ojafsq.exe 5092 iefvsj.exe 3064 iefvsj.exe 3260 jegaer.exe 3360 jegaer.exe 2184 guyjrh.exe 4676 guyjrh.exe 4640 ashduf.exe 1092 ashduf.exe 3788 vgxtgp.exe 3228 vgxtgp.exe 4444 tphbco.exe 2104 tphbco.exe 3044 imobvu.exe 5068 imobvu.exe 3300 gvzcqt.exe 4300 gvzcqt.exe 2480 aqmrim.exe 4868 aqmrim.exe 5072 aqnxum.exe 2564 aqnxum.exe 3008 dtqvgz.exe 2536 dtqvgz.exe 4464 aqpvhg.exe 2828 aqpvhg.exe 3460 bqyitg.exe 1868 bqyitg.exe 2164 yrinpr.exe 1944 yrinpr.exe 3620 ydvglv.exe 2916 ydvglv.exe 224 vpqbby.exe 4880 vpqbby.exe 708 vadtqk.exe 3640 vadtqk.exe 4296 vaezbj.exe 3108 vaezbj.exe 4968 vmqrqn.exe 2360 vmqrqn.exe 2128 sbxrru.exe 3612 sbxrru.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\lgxhfc.exe ojqhmv.exe File opened for modification C:\Windows\SysWOW64\ekdoil.exe bparwy.exe File opened for modification C:\Windows\SysWOW64\iyqtdi.exe iuebpw.exe File opened for modification C:\Windows\SysWOW64\fejhwz.exe iochva.exe File created C:\Windows\SysWOW64\ucevgc.exe ursdsq.exe File created C:\Windows\SysWOW64\sixppg.exe pfurcs.exe File created C:\Windows\SysWOW64\upvqlf.exe usxqck.exe File created C:\Windows\SysWOW64\bodphm.exe bdrwsi.exe File opened for modification C:\Windows\SysWOW64\rvtqqj.exe rjhxcf.exe File opened for modification C:\Windows\SysWOW64\lpydug.exe imdfit.exe File created C:\Windows\SysWOW64\gsiity.exe govpfu.exe File created C:\Windows\SysWOW64\nqmkvj.exe qsfjuc.exe File opened for modification C:\Windows\SysWOW64\szzaov.exe ujsano.exe File created C:\Windows\SysWOW64\fkxriw.exe eglytk.exe File opened for modification C:\Windows\SysWOW64\msfkan.exe mlhfjf.exe File opened for modification C:\Windows\SysWOW64\chosgp.exe bhfmuh.exe File created C:\Windows\SysWOW64\eqqqui.exe eneyfw.exe File opened for modification C:\Windows\SysWOW64\dxvcxu.exe dtikiq.exe File opened for modification C:\Windows\SysWOW64\ccdrwi.exe crrqze.exe File opened for modification C:\Windows\SysWOW64\qehbni.exe qpkwwa.exe File opened for modification C:\Windows\SysWOW64\tmnlet.exe xtvyjh.exe File opened for modification C:\Windows\SysWOW64\uxajme.exe txrdtx.exe File created C:\Windows\SysWOW64\gvzcqt.exe imobvu.exe File opened for modification C:\Windows\SysWOW64\adrvha.exe aotyqk.exe File created C:\Windows\SysWOW64\pblnvy.exe pxzvhu.exe File created C:\Windows\SysWOW64\mxdyig.exe juabvt.exe File created C:\Windows\SysWOW64\dmirpi.exe gamwzg.exe File created C:\Windows\SysWOW64\bzjjkh.exe bziezz.exe File created C:\Windows\SysWOW64\ckoxsn.exe cvyrbw.exe File created C:\Windows\SysWOW64\uxajme.exe txrdtx.exe File opened for modification C:\Windows\SysWOW64\yfsnig.exe yfrhwh.exe File created C:\Windows\SysWOW64\vinzmg.exe vtquuy.exe File opened for modification C:\Windows\SysWOW64\dmtuoc.exe dbgcay.exe File opened for modification C:\Windows\SysWOW64\hjdlhe.exe hjtfve.exe File opened for modification C:\Windows\SysWOW64\twpdsg.exe ttckdc.exe File opened for modification C:\Windows\SysWOW64\fpicko.exe fphwrp.exe File opened for modification C:\Windows\SysWOW64\lskvjs.exe lpydug.exe File created C:\Windows\SysWOW64\txrdtx.exe tmnlet.exe File created C:\Windows\SysWOW64\olruye.exe rwkuff.exe File created C:\Windows\SysWOW64\vpcxmh.exe vlqeyv.exe File created C:\Windows\SysWOW64\ujcbxl.exe ucevgc.exe File opened for modification C:\Windows\SysWOW64\ujnjbi.exe uxajme.exe File opened for modification C:\Windows\SysWOW64\ozpnjr.exe nzoiyj.exe File opened for modification C:\Windows\SysWOW64\isawyi.exe fxfylu.exe File opened for modification C:\Windows\SysWOW64\bzjjkh.exe bziezz.exe File opened for modification C:\Windows\SysWOW64\ftvbay.exe cxsyey.exe File opened for modification C:\Windows\SysWOW64\qyusut.exe uxjnyi.exe File opened for modification C:\Windows\SysWOW64\ydvglv.exe yrinpr.exe File created C:\Windows\SysWOW64\bopqvh.exe eqqqui.exe File created C:\Windows\SysWOW64\qsfjuc.exe pseeid.exe File opened for modification C:\Windows\SysWOW64\urdgjk.exe ujcbxl.exe File opened for modification C:\Windows\SysWOW64\dtikiq.exe gznpkn.exe File created C:\Windows\SysWOW64\pnsjlb.exe pgveuk.exe File created C:\Windows\SysWOW64\ckbtiv.exe cypauj.exe File created C:\Windows\SysWOW64\qeprjz.exe nfygzq.exe File created C:\Windows\SysWOW64\kyjtwu.exe niktvv.exe File created C:\Windows\SysWOW64\vnqppv.exe xbucza.exe File opened for modification C:\Windows\SysWOW64\adlknj.exe cuscal.exe File created C:\Windows\SysWOW64\mauhjt.exe pgyulr.exe File created C:\Windows\SysWOW64\errtpf.exe bazifv.exe File created C:\Windows\SysWOW64\oxxohs.exe oizjpk.exe File created C:\Windows\SysWOW64\fpicko.exe fphwrp.exe File created C:\Windows\SysWOW64\bpqtqm.exe errtpf.exe File created C:\Windows\SysWOW64\okaqjq.exe rvtqqj.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 516 set thread context of 2436 516 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe 89 PID 3980 set thread context of 3356 3980 lconcf.exe 91 PID 2388 set thread context of 1648 2388 dqoyyo.exe 93 PID 3776 set thread context of 860 3776 yewwsz.exe 95 PID 1988 set thread context of 3984 1988 bowlkv.exe 97 PID 1036 set thread context of 996 1036 bziezz.exe 99 PID 8 set thread context of 3108 8 bzjjkh.exe 101 PID 1384 set thread context of 4692 1384 vfzmne.exe 103 PID 3204 set thread context of 3900 3204 tokmbd.exe 105 PID 980 set thread context of 4180 980 wuqxqu.exe 107 PID 3988 set thread context of 3012 3988 ojqhmv.exe 109 PID 3016 set thread context of 4808 3016 lgxhfc.exe 112 PID 4488 set thread context of 3268 4488 ojafsq.exe 114 PID 5092 set thread context of 3064 5092 iefvsj.exe 118 PID 3260 set thread context of 3360 3260 jegaer.exe 120 PID 2184 set thread context of 4676 2184 guyjrh.exe 124 PID 4640 set thread context of 1092 4640 ashduf.exe 126 PID 3788 set thread context of 3228 3788 vgxtgp.exe 128 PID 4444 set thread context of 2104 4444 tphbco.exe 130 PID 3044 set thread context of 5068 3044 imobvu.exe 132 PID 3300 set thread context of 4300 3300 gvzcqt.exe 134 PID 2480 set thread context of 4868 2480 aqmrim.exe 136 PID 5072 set thread context of 2564 5072 aqnxum.exe 139 PID 3008 set thread context of 2536 3008 dtqvgz.exe 141 PID 4464 set thread context of 2828 4464 aqpvhg.exe 143 PID 3460 set thread context of 1868 3460 bqyitg.exe 145 PID 2164 set thread context of 1944 2164 yrinpr.exe 147 PID 3620 set thread context of 2916 3620 ydvglv.exe 149 PID 224 set thread context of 4880 224 vpqbby.exe 151 PID 708 set thread context of 3640 708 vadtqk.exe 155 PID 4296 set thread context of 3108 4296 vaezbj.exe 157 PID 4968 set thread context of 2360 4968 vmqrqn.exe 159 PID 2128 set thread context of 3612 2128 sbxrru.exe 161 PID 3900 set thread context of 4628 3900 ywrubr.exe 163 PID 3988 set thread context of 60 3988 vtquuy.exe 165 PID 2852 set thread context of 4616 2852 vinzmg.exe 167 PID 3008 set thread context of 4560 3008 viofxg.exe 169 PID 5092 set thread context of 956 5092 trhnte.exe 171 PID 3064 set thread context of 3260 3064 vbydla.exe 173 PID 4408 set thread context of 3360 4408 akhytg.exe 175 PID 228 set thread context of 4528 228 aotyqk.exe 177 PID 1004 set thread context of 448 1004 adrvha.exe 179 PID 3540 set thread context of 4784 3540 xxmqxv.exe 181 PID 3424 set thread context of 3760 3424 sspokq.exe 183 PID 1172 set thread context of 1212 1172 shflby.exe 185 PID 2872 set thread context of 2928 2872 shgzny.exe 187 PID 3012 set thread context of 2568 3012 tssrjk.exe 189 PID 1972 set thread context of 4908 1972 ptkefn.exe 191 PID 2308 set thread context of 672 2308 pxxxtz.exe 193 PID 4208 set thread context of 3016 4208 twphdj.exe 195 PID 1096 set thread context of 4552 1096 pxzvhu.exe 197 PID 996 set thread context of 412 996 pblnvy.exe 199 PID 4600 set thread context of 2856 4600 sadyfh.exe 201 PID 1236 set thread context of 208 1236 nrfauw.exe 203 PID 1232 set thread context of 2540 1232 ngcglm.exe 205 PID 2312 set thread context of 708 2312 nvsllu.exe 207 PID 2956 set thread context of 4296 2956 ncqjcd.exe 209 PID 3140 set thread context of 3204 3140 nkrwnk.exe 211 PID 5068 set thread context of 2552 5068 nodoco.exe 213 PID 4124 set thread context of 3612 4124 pgveuk.exe 215 PID 764 set thread context of 3848 764 pnsjlb.exe 217 PID 532 set thread context of 5072 532 pyfcif.exe 219 PID 2308 set thread context of 3968 2308 pkruwr.exe 221 PID 4808 set thread context of 2268 4808 qndnkv.exe 223 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mtgdua.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bpqtqm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nmojuw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ujnjbi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wymtdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yewwsz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pkruwr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ckbtiv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gokmga.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eglytk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wzxuez.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ybwwgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language viofxg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vadtqk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vadtqk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pxzvhu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lotsmj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language veacdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpqbby.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wfmwil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcjprp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eqqqui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scmbqc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrurzs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imobvu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bpqtqm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dtikiq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language errtpf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxmqxv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zdwjdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mauhjt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tlwhye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imdfit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ggmktu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dweyif.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sbxrru.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dmsaok.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hfbzow.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnmnvn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ggmktu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmnlet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lexqts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cfdfbd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mtrjqf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bzcqjt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nfdcyz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language trhnte.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ngcglm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jcermz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eqqqui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nyabia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adrvha.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wvvkkv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hjdlhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language usxqck.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qpircs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ujnjbi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfkoez.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ikattf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fpicko.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwytln.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pgveuk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rqgjsq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rjhxcf.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 516 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe 516 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe 3980 lconcf.exe 3980 lconcf.exe 2388 dqoyyo.exe 2388 dqoyyo.exe 3776 yewwsz.exe 3776 yewwsz.exe 1988 bowlkv.exe 1988 bowlkv.exe 1036 bziezz.exe 1036 bziezz.exe 8 bzjjkh.exe 8 bzjjkh.exe 1384 vfzmne.exe 1384 vfzmne.exe 3204 tokmbd.exe 3204 tokmbd.exe 980 wuqxqu.exe 980 wuqxqu.exe 3988 ojqhmv.exe 3988 ojqhmv.exe 3016 lgxhfc.exe 3016 lgxhfc.exe 4488 ojafsq.exe 4488 ojafsq.exe 5092 iefvsj.exe 5092 iefvsj.exe 3260 jegaer.exe 3260 jegaer.exe 2184 guyjrh.exe 2184 guyjrh.exe 4640 ashduf.exe 4640 ashduf.exe 3788 vgxtgp.exe 3788 vgxtgp.exe 4444 tphbco.exe 4444 tphbco.exe 3044 imobvu.exe 3044 imobvu.exe 3300 gvzcqt.exe 3300 gvzcqt.exe 2480 aqmrim.exe 2480 aqmrim.exe 5072 aqnxum.exe 5072 aqnxum.exe 3008 dtqvgz.exe 3008 dtqvgz.exe 4464 aqpvhg.exe 4464 aqpvhg.exe 3460 bqyitg.exe 3460 bqyitg.exe 2164 yrinpr.exe 2164 yrinpr.exe 3620 ydvglv.exe 3620 ydvglv.exe 224 vpqbby.exe 224 vpqbby.exe 708 vadtqk.exe 708 vadtqk.exe 4296 vaezbj.exe 4296 vaezbj.exe 4968 vmqrqn.exe 4968 vmqrqn.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 516 wrote to memory of 2436 516 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe 89 PID 516 wrote to memory of 2436 516 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe 89 PID 516 wrote to memory of 2436 516 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe 89 PID 516 wrote to memory of 2436 516 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe 89 PID 516 wrote to memory of 2436 516 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe 89 PID 2436 wrote to memory of 3980 2436 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe 90 PID 2436 wrote to memory of 3980 2436 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe 90 PID 2436 wrote to memory of 3980 2436 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe 90 PID 3980 wrote to memory of 3356 3980 lconcf.exe 91 PID 3980 wrote to memory of 3356 3980 lconcf.exe 91 PID 3980 wrote to memory of 3356 3980 lconcf.exe 91 PID 3980 wrote to memory of 3356 3980 lconcf.exe 91 PID 3980 wrote to memory of 3356 3980 lconcf.exe 91 PID 3356 wrote to memory of 2388 3356 lconcf.exe 92 PID 3356 wrote to memory of 2388 3356 lconcf.exe 92 PID 3356 wrote to memory of 2388 3356 lconcf.exe 92 PID 2388 wrote to memory of 1648 2388 dqoyyo.exe 93 PID 2388 wrote to memory of 1648 2388 dqoyyo.exe 93 PID 2388 wrote to memory of 1648 2388 dqoyyo.exe 93 PID 2388 wrote to memory of 1648 2388 dqoyyo.exe 93 PID 2388 wrote to memory of 1648 2388 dqoyyo.exe 93 PID 1648 wrote to memory of 3776 1648 dqoyyo.exe 94 PID 1648 wrote to memory of 3776 1648 dqoyyo.exe 94 PID 1648 wrote to memory of 3776 1648 dqoyyo.exe 94 PID 3776 wrote to memory of 860 3776 yewwsz.exe 95 PID 3776 wrote to memory of 860 3776 yewwsz.exe 95 PID 3776 wrote to memory of 860 3776 yewwsz.exe 95 PID 3776 wrote to memory of 860 3776 yewwsz.exe 95 PID 3776 wrote to memory of 860 3776 yewwsz.exe 95 PID 860 wrote to memory of 1988 860 yewwsz.exe 96 PID 860 wrote to memory of 1988 860 yewwsz.exe 96 PID 860 wrote to memory of 1988 860 yewwsz.exe 96 PID 1988 wrote to memory of 3984 1988 bowlkv.exe 97 PID 1988 wrote to memory of 3984 1988 bowlkv.exe 97 PID 1988 wrote to memory of 3984 1988 bowlkv.exe 97 PID 1988 wrote to memory of 3984 1988 bowlkv.exe 97 PID 1988 wrote to memory of 3984 1988 bowlkv.exe 97 PID 3984 wrote to memory of 1036 3984 bowlkv.exe 98 PID 3984 wrote to memory of 1036 3984 bowlkv.exe 98 PID 3984 wrote to memory of 1036 3984 bowlkv.exe 98 PID 1036 wrote to memory of 996 1036 bziezz.exe 99 PID 1036 wrote to memory of 996 1036 bziezz.exe 99 PID 1036 wrote to memory of 996 1036 bziezz.exe 99 PID 1036 wrote to memory of 996 1036 bziezz.exe 99 PID 1036 wrote to memory of 996 1036 bziezz.exe 99 PID 996 wrote to memory of 8 996 bziezz.exe 100 PID 996 wrote to memory of 8 996 bziezz.exe 100 PID 996 wrote to memory of 8 996 bziezz.exe 100 PID 8 wrote to memory of 3108 8 bzjjkh.exe 101 PID 8 wrote to memory of 3108 8 bzjjkh.exe 101 PID 8 wrote to memory of 3108 8 bzjjkh.exe 101 PID 8 wrote to memory of 3108 8 bzjjkh.exe 101 PID 8 wrote to memory of 3108 8 bzjjkh.exe 101 PID 3108 wrote to memory of 1384 3108 bzjjkh.exe 102 PID 3108 wrote to memory of 1384 3108 bzjjkh.exe 102 PID 3108 wrote to memory of 1384 3108 bzjjkh.exe 102 PID 1384 wrote to memory of 4692 1384 vfzmne.exe 103 PID 1384 wrote to memory of 4692 1384 vfzmne.exe 103 PID 1384 wrote to memory of 4692 1384 vfzmne.exe 103 PID 1384 wrote to memory of 4692 1384 vfzmne.exe 103 PID 1384 wrote to memory of 4692 1384 vfzmne.exe 103 PID 4692 wrote to memory of 3204 4692 vfzmne.exe 104 PID 4692 wrote to memory of 3204 4692 vfzmne.exe 104 PID 4692 wrote to memory of 3204 4692 vfzmne.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Users\Admin\AppData\Local\Temp\f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\lconcf.exeC:\Windows\system32\lconcf.exe 984 "C:\Users\Admin\AppData\Local\Temp\f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Windows\SysWOW64\lconcf.exe984 C:\Users\Admin\AppData\Local\Temp\f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\SysWOW64\dqoyyo.exeC:\Windows\system32\dqoyyo.exe 1032 "C:\Windows\SysWOW64\lconcf.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\dqoyyo.exe1032 C:\Windows\SysWOW64\lconcf.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\yewwsz.exeC:\Windows\system32\yewwsz.exe 1140 "C:\Windows\SysWOW64\dqoyyo.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Windows\SysWOW64\yewwsz.exe1140 C:\Windows\SysWOW64\dqoyyo.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\SysWOW64\bowlkv.exeC:\Windows\system32\bowlkv.exe 1028 "C:\Windows\SysWOW64\yewwsz.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\bowlkv.exe1028 C:\Windows\SysWOW64\yewwsz.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\SysWOW64\bziezz.exeC:\Windows\system32\bziezz.exe 1048 "C:\Windows\SysWOW64\bowlkv.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\bziezz.exe1048 C:\Windows\SysWOW64\bowlkv.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\SysWOW64\bzjjkh.exeC:\Windows\system32\bzjjkh.exe 1144 "C:\Windows\SysWOW64\bziezz.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Windows\SysWOW64\bzjjkh.exe1144 C:\Windows\SysWOW64\bziezz.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\SysWOW64\vfzmne.exeC:\Windows\system32\vfzmne.exe 1032 "C:\Windows\SysWOW64\bzjjkh.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\vfzmne.exe1032 C:\Windows\SysWOW64\bzjjkh.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\SysWOW64\tokmbd.exeC:\Windows\system32\tokmbd.exe 1008 "C:\Windows\SysWOW64\vfzmne.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:3204 -
C:\Windows\SysWOW64\tokmbd.exe1008 C:\Windows\SysWOW64\vfzmne.exe18⤵
- Executes dropped EXE
PID:3900 -
C:\Windows\SysWOW64\wuqxqu.exeC:\Windows\system32\wuqxqu.exe 1032 "C:\Windows\SysWOW64\tokmbd.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:980 -
C:\Windows\SysWOW64\wuqxqu.exe1032 C:\Windows\SysWOW64\tokmbd.exe20⤵
- Executes dropped EXE
PID:4180 -
C:\Windows\SysWOW64\ojqhmv.exeC:\Windows\system32\ojqhmv.exe 1048 "C:\Windows\SysWOW64\wuqxqu.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:3988 -
C:\Windows\SysWOW64\ojqhmv.exe1048 C:\Windows\SysWOW64\wuqxqu.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3012 -
C:\Windows\SysWOW64\lgxhfc.exeC:\Windows\system32\lgxhfc.exe 1012 "C:\Windows\SysWOW64\ojqhmv.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:3016 -
C:\Windows\SysWOW64\lgxhfc.exe1012 C:\Windows\SysWOW64\ojqhmv.exe24⤵
- Executes dropped EXE
PID:4808 -
C:\Windows\SysWOW64\ojafsq.exeC:\Windows\system32\ojafsq.exe 1140 "C:\Windows\SysWOW64\lgxhfc.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:4488 -
C:\Windows\SysWOW64\ojafsq.exe1140 C:\Windows\SysWOW64\lgxhfc.exe26⤵
- Executes dropped EXE
PID:3268 -
C:\Windows\SysWOW64\iefvsj.exeC:\Windows\system32\iefvsj.exe 1028 "C:\Windows\SysWOW64\ojafsq.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:5092 -
C:\Windows\SysWOW64\iefvsj.exe1028 C:\Windows\SysWOW64\ojafsq.exe28⤵
- Executes dropped EXE
PID:3064 -
C:\Windows\SysWOW64\jegaer.exeC:\Windows\system32\jegaer.exe 1016 "C:\Windows\SysWOW64\iefvsj.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:3260 -
C:\Windows\SysWOW64\jegaer.exe1016 C:\Windows\SysWOW64\iefvsj.exe30⤵
- Executes dropped EXE
PID:3360 -
C:\Windows\SysWOW64\guyjrh.exeC:\Windows\system32\guyjrh.exe 1152 "C:\Windows\SysWOW64\jegaer.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2184 -
C:\Windows\SysWOW64\guyjrh.exe1152 C:\Windows\SysWOW64\jegaer.exe32⤵
- Executes dropped EXE
PID:4676 -
C:\Windows\SysWOW64\ashduf.exeC:\Windows\system32\ashduf.exe 1036 "C:\Windows\SysWOW64\guyjrh.exe"33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:4640 -
C:\Windows\SysWOW64\ashduf.exe1036 C:\Windows\SysWOW64\guyjrh.exe34⤵
- Executes dropped EXE
PID:1092 -
C:\Windows\SysWOW64\vgxtgp.exeC:\Windows\system32\vgxtgp.exe 1032 "C:\Windows\SysWOW64\ashduf.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:3788 -
C:\Windows\SysWOW64\vgxtgp.exe1032 C:\Windows\SysWOW64\ashduf.exe36⤵
- Executes dropped EXE
PID:3228 -
C:\Windows\SysWOW64\tphbco.exeC:\Windows\system32\tphbco.exe 1028 "C:\Windows\SysWOW64\vgxtgp.exe"37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:4444 -
C:\Windows\SysWOW64\tphbco.exe1028 C:\Windows\SysWOW64\vgxtgp.exe38⤵
- Executes dropped EXE
PID:2104 -
C:\Windows\SysWOW64\imobvu.exeC:\Windows\system32\imobvu.exe 1008 "C:\Windows\SysWOW64\tphbco.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3044 -
C:\Windows\SysWOW64\imobvu.exe1008 C:\Windows\SysWOW64\tphbco.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5068 -
C:\Windows\SysWOW64\gvzcqt.exeC:\Windows\system32\gvzcqt.exe 1128 "C:\Windows\SysWOW64\imobvu.exe"41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:3300 -
C:\Windows\SysWOW64\gvzcqt.exe1128 C:\Windows\SysWOW64\imobvu.exe42⤵
- Executes dropped EXE
PID:4300 -
C:\Windows\SysWOW64\aqmrim.exeC:\Windows\system32\aqmrim.exe 1008 "C:\Windows\SysWOW64\gvzcqt.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2480 -
C:\Windows\SysWOW64\aqmrim.exe1008 C:\Windows\SysWOW64\gvzcqt.exe44⤵
- Executes dropped EXE
PID:4868 -
C:\Windows\SysWOW64\aqnxum.exeC:\Windows\system32\aqnxum.exe 1020 "C:\Windows\SysWOW64\aqmrim.exe"45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:5072 -
C:\Windows\SysWOW64\aqnxum.exe1020 C:\Windows\SysWOW64\aqmrim.exe46⤵
- Executes dropped EXE
PID:2564 -
C:\Windows\SysWOW64\dtqvgz.exeC:\Windows\system32\dtqvgz.exe 1020 "C:\Windows\SysWOW64\aqnxum.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:3008 -
C:\Windows\SysWOW64\dtqvgz.exe1020 C:\Windows\SysWOW64\aqnxum.exe48⤵
- Executes dropped EXE
PID:2536 -
C:\Windows\SysWOW64\aqpvhg.exeC:\Windows\system32\aqpvhg.exe 1104 "C:\Windows\SysWOW64\dtqvgz.exe"49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:4464 -
C:\Windows\SysWOW64\aqpvhg.exe1104 C:\Windows\SysWOW64\dtqvgz.exe50⤵
- Executes dropped EXE
PID:2828 -
C:\Windows\SysWOW64\bqyitg.exeC:\Windows\system32\bqyitg.exe 1140 "C:\Windows\SysWOW64\aqpvhg.exe"51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:3460 -
C:\Windows\SysWOW64\bqyitg.exe1140 C:\Windows\SysWOW64\aqpvhg.exe52⤵
- Executes dropped EXE
PID:1868 -
C:\Windows\SysWOW64\yrinpr.exeC:\Windows\system32\yrinpr.exe 1140 "C:\Windows\SysWOW64\bqyitg.exe"53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2164 -
C:\Windows\SysWOW64\yrinpr.exe1140 C:\Windows\SysWOW64\bqyitg.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1944 -
C:\Windows\SysWOW64\ydvglv.exeC:\Windows\system32\ydvglv.exe 1008 "C:\Windows\SysWOW64\yrinpr.exe"55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:3620 -
C:\Windows\SysWOW64\ydvglv.exe1008 C:\Windows\SysWOW64\yrinpr.exe56⤵
- Executes dropped EXE
PID:2916 -
C:\Windows\SysWOW64\vpqbby.exeC:\Windows\system32\vpqbby.exe 1020 "C:\Windows\SysWOW64\ydvglv.exe"57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:224 -
C:\Windows\SysWOW64\vpqbby.exe1020 C:\Windows\SysWOW64\ydvglv.exe58⤵
- Executes dropped EXE
PID:4880 -
C:\Windows\SysWOW64\vadtqk.exeC:\Windows\system32\vadtqk.exe 1140 "C:\Windows\SysWOW64\vpqbby.exe"59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:708 -
C:\Windows\SysWOW64\vadtqk.exe1140 C:\Windows\SysWOW64\vpqbby.exe60⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3640 -
C:\Windows\SysWOW64\vaezbj.exeC:\Windows\system32\vaezbj.exe 1032 "C:\Windows\SysWOW64\vadtqk.exe"61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:4296 -
C:\Windows\SysWOW64\vaezbj.exe1032 C:\Windows\SysWOW64\vadtqk.exe62⤵
- Executes dropped EXE
PID:3108 -
C:\Windows\SysWOW64\vmqrqn.exeC:\Windows\system32\vmqrqn.exe 1140 "C:\Windows\SysWOW64\vaezbj.exe"63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:4968 -
C:\Windows\SysWOW64\vmqrqn.exe1140 C:\Windows\SysWOW64\vaezbj.exe64⤵
- Executes dropped EXE
PID:2360 -
C:\Windows\SysWOW64\sbxrru.exeC:\Windows\system32\sbxrru.exe 1028 "C:\Windows\SysWOW64\vmqrqn.exe"65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2128 -
C:\Windows\SysWOW64\sbxrru.exe1028 C:\Windows\SysWOW64\vmqrqn.exe66⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3612 -
C:\Windows\SysWOW64\ywrubr.exeC:\Windows\system32\ywrubr.exe 1008 "C:\Windows\SysWOW64\sbxrru.exe"67⤵
- Suspicious use of SetThreadContext
PID:3900 -
C:\Windows\SysWOW64\ywrubr.exe1008 C:\Windows\SysWOW64\sbxrru.exe68⤵PID:4628
-
C:\Windows\SysWOW64\vtquuy.exeC:\Windows\system32\vtquuy.exe 1144 "C:\Windows\SysWOW64\ywrubr.exe"69⤵
- Suspicious use of SetThreadContext
PID:3988 -
C:\Windows\SysWOW64\vtquuy.exe1144 C:\Windows\SysWOW64\ywrubr.exe70⤵
- Drops file in System32 directory
PID:60 -
C:\Windows\SysWOW64\vinzmg.exeC:\Windows\system32\vinzmg.exe 1032 "C:\Windows\SysWOW64\vtquuy.exe"71⤵
- Suspicious use of SetThreadContext
PID:2852 -
C:\Windows\SysWOW64\vinzmg.exe1032 C:\Windows\SysWOW64\vtquuy.exe72⤵PID:4616
-
C:\Windows\SysWOW64\viofxg.exeC:\Windows\system32\viofxg.exe 1140 "C:\Windows\SysWOW64\vinzmg.exe"73⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3008 -
C:\Windows\SysWOW64\viofxg.exe1140 C:\Windows\SysWOW64\vinzmg.exe74⤵PID:4560
-
C:\Windows\SysWOW64\trhnte.exeC:\Windows\system32\trhnte.exe 1032 "C:\Windows\SysWOW64\viofxg.exe"75⤵
- Suspicious use of SetThreadContext
PID:5092 -
C:\Windows\SysWOW64\trhnte.exe1032 C:\Windows\SysWOW64\viofxg.exe76⤵
- System Location Discovery: System Language Discovery
PID:956 -
C:\Windows\SysWOW64\vbydla.exeC:\Windows\system32\vbydla.exe 1036 "C:\Windows\SysWOW64\trhnte.exe"77⤵
- Suspicious use of SetThreadContext
PID:3064 -
C:\Windows\SysWOW64\vbydla.exe1036 C:\Windows\SysWOW64\trhnte.exe78⤵PID:3260
-
C:\Windows\SysWOW64\akhytg.exeC:\Windows\system32\akhytg.exe 1008 "C:\Windows\SysWOW64\vbydla.exe"79⤵
- Suspicious use of SetThreadContext
PID:4408 -
C:\Windows\SysWOW64\akhytg.exe1008 C:\Windows\SysWOW64\vbydla.exe80⤵PID:3360
-
C:\Windows\SysWOW64\aotyqk.exeC:\Windows\system32\aotyqk.exe 1088 "C:\Windows\SysWOW64\akhytg.exe"81⤵
- Suspicious use of SetThreadContext
PID:228 -
C:\Windows\SysWOW64\aotyqk.exe1088 C:\Windows\SysWOW64\akhytg.exe82⤵
- Drops file in System32 directory
PID:4528 -
C:\Windows\SysWOW64\adrvha.exeC:\Windows\system32\adrvha.exe 1028 "C:\Windows\SysWOW64\aotyqk.exe"83⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1004 -
C:\Windows\SysWOW64\adrvha.exe1028 C:\Windows\SysWOW64\aotyqk.exe84⤵PID:448
-
C:\Windows\SysWOW64\xxmqxv.exeC:\Windows\system32\xxmqxv.exe 1020 "C:\Windows\SysWOW64\adrvha.exe"85⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3540 -
C:\Windows\SysWOW64\xxmqxv.exe1020 C:\Windows\SysWOW64\adrvha.exe86⤵PID:4784
-
C:\Windows\SysWOW64\sspokq.exeC:\Windows\system32\sspokq.exe 1012 "C:\Windows\SysWOW64\xxmqxv.exe"87⤵
- Suspicious use of SetThreadContext
PID:3424 -
C:\Windows\SysWOW64\sspokq.exe1012 C:\Windows\SysWOW64\xxmqxv.exe88⤵PID:3760
-
C:\Windows\SysWOW64\shflby.exeC:\Windows\system32\shflby.exe 1144 "C:\Windows\SysWOW64\sspokq.exe"89⤵
- Suspicious use of SetThreadContext
PID:1172 -
C:\Windows\SysWOW64\shflby.exe1144 C:\Windows\SysWOW64\sspokq.exe90⤵PID:1212
-
C:\Windows\SysWOW64\shgzny.exeC:\Windows\system32\shgzny.exe 1140 "C:\Windows\SysWOW64\shflby.exe"91⤵
- Suspicious use of SetThreadContext
PID:2872 -
C:\Windows\SysWOW64\shgzny.exe1140 C:\Windows\SysWOW64\shflby.exe92⤵PID:2928
-
C:\Windows\SysWOW64\tssrjk.exeC:\Windows\system32\tssrjk.exe 1020 "C:\Windows\SysWOW64\shgzny.exe"93⤵
- Suspicious use of SetThreadContext
PID:3012 -
C:\Windows\SysWOW64\tssrjk.exe1020 C:\Windows\SysWOW64\shgzny.exe94⤵PID:2568
-
C:\Windows\SysWOW64\ptkefn.exeC:\Windows\system32\ptkefn.exe 1104 "C:\Windows\SysWOW64\tssrjk.exe"95⤵
- Suspicious use of SetThreadContext
PID:1972 -
C:\Windows\SysWOW64\ptkefn.exe1104 C:\Windows\SysWOW64\tssrjk.exe96⤵PID:4908
-
C:\Windows\SysWOW64\pxxxtz.exeC:\Windows\system32\pxxxtz.exe 1144 "C:\Windows\SysWOW64\ptkefn.exe"97⤵
- Suspicious use of SetThreadContext
PID:2308 -
C:\Windows\SysWOW64\pxxxtz.exe1144 C:\Windows\SysWOW64\ptkefn.exe98⤵PID:672
-
C:\Windows\SysWOW64\twphdj.exeC:\Windows\system32\twphdj.exe 1008 "C:\Windows\SysWOW64\pxxxtz.exe"99⤵
- Suspicious use of SetThreadContext
PID:4208 -
C:\Windows\SysWOW64\twphdj.exe1008 C:\Windows\SysWOW64\pxxxtz.exe100⤵PID:3016
-
C:\Windows\SysWOW64\pxzvhu.exeC:\Windows\system32\pxzvhu.exe 1008 "C:\Windows\SysWOW64\twphdj.exe"101⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1096 -
C:\Windows\SysWOW64\pxzvhu.exe1008 C:\Windows\SysWOW64\twphdj.exe102⤵
- Drops file in System32 directory
PID:4552 -
C:\Windows\SysWOW64\pblnvy.exeC:\Windows\system32\pblnvy.exe 1020 "C:\Windows\SysWOW64\pxzvhu.exe"103⤵
- Suspicious use of SetThreadContext
PID:996 -
C:\Windows\SysWOW64\pblnvy.exe1020 C:\Windows\SysWOW64\pxzvhu.exe104⤵PID:412
-
C:\Windows\SysWOW64\sadyfh.exeC:\Windows\system32\sadyfh.exe 1032 "C:\Windows\SysWOW64\pblnvy.exe"105⤵
- Suspicious use of SetThreadContext
PID:4600 -
C:\Windows\SysWOW64\sadyfh.exe1032 C:\Windows\SysWOW64\pblnvy.exe106⤵PID:2856
-
C:\Windows\SysWOW64\nrfauw.exeC:\Windows\system32\nrfauw.exe 1144 "C:\Windows\SysWOW64\sadyfh.exe"107⤵
- Suspicious use of SetThreadContext
PID:1236 -
C:\Windows\SysWOW64\nrfauw.exe1144 C:\Windows\SysWOW64\sadyfh.exe108⤵PID:208
-
C:\Windows\SysWOW64\ngcglm.exeC:\Windows\system32\ngcglm.exe 1140 "C:\Windows\SysWOW64\nrfauw.exe"109⤵
- Suspicious use of SetThreadContext
PID:1232 -
C:\Windows\SysWOW64\ngcglm.exe1140 C:\Windows\SysWOW64\nrfauw.exe110⤵
- System Location Discovery: System Language Discovery
PID:2540 -
C:\Windows\SysWOW64\nvsllu.exeC:\Windows\system32\nvsllu.exe 1008 "C:\Windows\SysWOW64\ngcglm.exe"111⤵
- Suspicious use of SetThreadContext
PID:2312 -
C:\Windows\SysWOW64\nvsllu.exe1008 C:\Windows\SysWOW64\ngcglm.exe112⤵PID:708
-
C:\Windows\SysWOW64\ncqjcd.exeC:\Windows\system32\ncqjcd.exe 1140 "C:\Windows\SysWOW64\nvsllu.exe"113⤵
- Suspicious use of SetThreadContext
PID:2956 -
C:\Windows\SysWOW64\ncqjcd.exe1140 C:\Windows\SysWOW64\nvsllu.exe114⤵PID:4296
-
C:\Windows\SysWOW64\nkrwnk.exeC:\Windows\system32\nkrwnk.exe 1032 "C:\Windows\SysWOW64\ncqjcd.exe"115⤵
- Suspicious use of SetThreadContext
PID:3140 -
C:\Windows\SysWOW64\nkrwnk.exe1032 C:\Windows\SysWOW64\ncqjcd.exe116⤵PID:3204
-
C:\Windows\SysWOW64\nodoco.exeC:\Windows\system32\nodoco.exe 1036 "C:\Windows\SysWOW64\nkrwnk.exe"117⤵
- Suspicious use of SetThreadContext
PID:5068 -
C:\Windows\SysWOW64\nodoco.exe1036 C:\Windows\SysWOW64\nkrwnk.exe118⤵PID:2552
-
C:\Windows\SysWOW64\pgveuk.exeC:\Windows\system32\pgveuk.exe 1144 "C:\Windows\SysWOW64\nodoco.exe"119⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4124 -
C:\Windows\SysWOW64\pgveuk.exe1144 C:\Windows\SysWOW64\nodoco.exe120⤵
- Drops file in System32 directory
PID:3612 -
C:\Windows\SysWOW64\pnsjlb.exeC:\Windows\system32\pnsjlb.exe 1020 "C:\Windows\SysWOW64\pgveuk.exe"121⤵
- Suspicious use of SetThreadContext
PID:764 -
C:\Windows\SysWOW64\pnsjlb.exe1020 C:\Windows\SysWOW64\pgveuk.exe122⤵PID:3848
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-