Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-09-2024 14:22
Static task
static1
Behavioral task
behavioral1
Sample
f88ea9233fec35960bbb4feeabcff945_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f88ea9233fec35960bbb4feeabcff945_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f88ea9233fec35960bbb4feeabcff945_JaffaCakes118.exe
-
Size
137KB
-
MD5
f88ea9233fec35960bbb4feeabcff945
-
SHA1
c28c78118273d41865321b9904fccd820b18bb53
-
SHA256
61aa531af8b25f9f62027debbc860e4d18a7fe9a4f7744a7d596c32b94ba2699
-
SHA512
7c930e5c5fdd6669611a45a378ee5467d5b5d947d61c6201a7b21f926d53c9bc1a05554eb139c4a024e675acbbab8ea7e557b7e01aa0dd8d4a9fb15fc6d73f4a
-
SSDEEP
3072:lghyf/VUpgyY9xhGhy3otLz/a+sjBriJFyokBfpzbh+C2oQCZv6:WCSgJ9xhG2Ya+G2yoW9bhrr3B6
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 64 IoCs
pid Process 4600 tscflz.exe 4640 vkucev.exe 3604 juafhv.exe 2448 tpbqop.exe 2140 dsqajt.exe 4068 twzvny.exe 1868 griltc.exe 3120 tilnck.exe 4304 gvvdig.exe 2000 quhise.exe 4540 yvgjht.exe 4480 olrjnd.exe 1088 afxyzp.exe 2412 ospoft.exe 4408 yketjj.exe 2436 grsmez.exe 2444 weahae.exe 5096 iygwtq.exe 1284 vwbzcz.exe 1700 ijsphu.exe 3316 vwceny.exe 1340 jjuutc.exe 1460 tfunbw.exe 1056 xkehpf.exe 4960 izqazz.exe 3408 tvjkhu.exe 3544 fppasy.exe 1840 vfiizq.exe 2232 fenfjo.exe 1864 vivanu.exe 2492 iveqtx.exe 1732 scrndw.exe 3184 dmgtqm.exe 4272 qomicz.exe 4440 dnhdkz.exe 2608 nxxipp.exe 4444 dniqwh.exe 1592 qddteh.exe 4608 dqujkl.exe 2984 nbktfo.exe 2496 aobjls.exe 1888 oximor.exe 892 xixwbu.exe 3760 lvhuhq.exe 3132 yiyjnu.exe 3976 lytmwc.exe 2612 vqjkis.exe 1600 ispzux.exe 4348 vjrccf.exe 824 iwbsij.exe 4028 vjthon.exe 4160 dzoiac.exe 4324 shzihm.exe 2212 gqgskl.exe 1100 thbvtt.exe 4400 allake.exe 4224 qeivus.exe 4132 awxsyq.exe 4556 qejafa.exe 1924 yfibuh.exe 3284 nyeovd.exe 3148 alwljy.exe 1404 ncrosh.exe 1400 vjegew.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\ovwbmn.exe bftyen.exe File opened for modification C:\Windows\SysWOW64\wirasr.exe ivalmn.exe File created C:\Windows\SysWOW64\iuxklx.exe yvlnby.exe File opened for modification C:\Windows\SysWOW64\gdrimp.exe tepfdh.exe File created C:\Windows\SysWOW64\aydbyf.exe nhigif.exe File created C:\Windows\SysWOW64\srbhuh.exe feksod.exe File created C:\Windows\SysWOW64\mpblhj.exe kipgxl.exe File opened for modification C:\Windows\SysWOW64\mzdduf.exe cszfkg.exe File opened for modification C:\Windows\SysWOW64\knhwkv.exe xaxgfr.exe File opened for modification C:\Windows\SysWOW64\yyohic.exe llwrcz.exe File created C:\Windows\SysWOW64\nifoqg.exe avvrkd.exe File opened for modification C:\Windows\SysWOW64\elmczp.exe rvjzrh.exe File opened for modification C:\Windows\SysWOW64\evmobd.exe rfkmsv.exe File created C:\Windows\SysWOW64\unqjwf.exe hahtqj.exe File created C:\Windows\SysWOW64\kxqwxj.exe xkzgsn.exe File opened for modification C:\Windows\SysWOW64\dkwgdz.exe xxmqxv.exe File opened for modification C:\Windows\SysWOW64\izceus.exe yzyhjt.exe File opened for modification C:\Windows\SysWOW64\llwrcz.exe yynbov.exe File created C:\Windows\SysWOW64\upbraz.exe hcjuvw.exe File created C:\Windows\SysWOW64\pevmwa.exe cjlwjw.exe File opened for modification C:\Windows\SysWOW64\mmlval.exe wlonyd.exe File created C:\Windows\SysWOW64\pnynfg.exe cwdlxg.exe File opened for modification C:\Windows\SysWOW64\vfiizq.exe fppasy.exe File created C:\Windows\SysWOW64\xdfzog.exe jqwjic.exe File opened for modification C:\Windows\SysWOW64\hksjke.exe ubmzhf.exe File opened for modification C:\Windows\SysWOW64\ikpkxc.exe vmuhou.exe File created C:\Windows\SysWOW64\nuuwkj.exe awrtbb.exe File created C:\Windows\SysWOW64\czoqeg.exe sozfjd.exe File opened for modification C:\Windows\SysWOW64\dlbnes.exe qmzlvj.exe File created C:\Windows\SysWOW64\kleejf.exe xyngdb.exe File created C:\Windows\SysWOW64\wkdgnp.exe jxlqhm.exe File created C:\Windows\SysWOW64\rftzed.exe evmobd.exe File created C:\Windows\SysWOW64\tihohh.exe gnqybe.exe File opened for modification C:\Windows\SysWOW64\ysecfn.exe ljyzco.exe File opened for modification C:\Windows\SysWOW64\jzrizx.exe wmattb.exe File created C:\Windows\SysWOW64\izceus.exe yzyhjt.exe File opened for modification C:\Windows\SysWOW64\oyeupt.exe bhjzgk.exe File opened for modification C:\Windows\SysWOW64\tfqsoc.exe govpfu.exe File opened for modification C:\Windows\SysWOW64\prlmzd.exe cetxtz.exe File opened for modification C:\Windows\SysWOW64\bradxm.exe qswgnn.exe File opened for modification C:\Windows\SysWOW64\papkez.exe gpsarw.exe File created C:\Windows\SysWOW64\zreney.exe memxyu.exe File created C:\Windows\SysWOW64\impbog.exe ynlewh.exe File created C:\Windows\SysWOW64\olrrjh.exe bvwway.exe File created C:\Windows\SysWOW64\ysecfn.exe ljyzco.exe File created C:\Windows\SysWOW64\kfhnne.exe xkpyha.exe File opened for modification C:\Windows\SysWOW64\mowqwy.exe zbfaru.exe File opened for modification C:\Windows\SysWOW64\mizclz.exe yvpnfe.exe File created C:\Windows\SysWOW64\azimud.exe qawoke.exe File opened for modification C:\Windows\SysWOW64\yfibuh.exe qejafa.exe File opened for modification C:\Windows\SysWOW64\ahiuli.exe muqwxm.exe File opened for modification C:\Windows\SysWOW64\xbyvbn.exe jrslyn.exe File opened for modification C:\Windows\SysWOW64\sadyfh.exe czoqeg.exe File created C:\Windows\SysWOW64\avvrkd.exe nxswcu.exe File created C:\Windows\SysWOW64\papkez.exe gpsarw.exe File created C:\Windows\SysWOW64\cirklb.exe mhucks.exe File opened for modification C:\Windows\SysWOW64\qqoydl.exe ddxixi.exe File opened for modification C:\Windows\SysWOW64\fppasy.exe tvjkhu.exe File created C:\Windows\SysWOW64\lzxeia.exe ymgpvw.exe File created C:\Windows\SysWOW64\jflilj.exe vstsfn.exe File opened for modification C:\Windows\SysWOW64\mtllxg.exe zgcvrd.exe File opened for modification C:\Windows\SysWOW64\jwcsse.exe zpxvif.exe File created C:\Windows\SysWOW64\btmjkk.exe ocrgcc.exe File opened for modification C:\Windows\SysWOW64\deupyb.exe tfqsoc.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sxrhtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zodack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skbhhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gmtgpx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language twzvny.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dnhdkz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fetxad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language otvplz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wirasr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbavrw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ibkzlz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vqmxny.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language grsmez.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvxfwh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avwewc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nigucg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bkqrth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thxvfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ynlewh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbkmwt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dmgtqm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kipgxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dniqwh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cbsxbk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jaxjvq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ztfsud.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jwcsse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language deupyb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msefpo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlonyd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kidejq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfibze.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mztenx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ooccbx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language griltc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kioall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jnjquq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xbyvbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mzdduf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lmffld.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tilnck.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fzcdwo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zgwoqs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ivalmn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vobbfw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pnmggv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ptxuwh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wajrva.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dqqwdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hxzoed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbmshb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrseyc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language blvsuo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gaglfp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language awxsyq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrnqcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jqwjic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hpbeou.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jxlqhm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wxhshh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mgxavh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language prlmzd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uxabjb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tvjkhu.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4716 wrote to memory of 4600 4716 f88ea9233fec35960bbb4feeabcff945_JaffaCakes118.exe 82 PID 4716 wrote to memory of 4600 4716 f88ea9233fec35960bbb4feeabcff945_JaffaCakes118.exe 82 PID 4716 wrote to memory of 4600 4716 f88ea9233fec35960bbb4feeabcff945_JaffaCakes118.exe 82 PID 4600 wrote to memory of 4640 4600 tscflz.exe 83 PID 4600 wrote to memory of 4640 4600 tscflz.exe 83 PID 4600 wrote to memory of 4640 4600 tscflz.exe 83 PID 4640 wrote to memory of 3604 4640 vkucev.exe 84 PID 4640 wrote to memory of 3604 4640 vkucev.exe 84 PID 4640 wrote to memory of 3604 4640 vkucev.exe 84 PID 3604 wrote to memory of 2448 3604 juafhv.exe 85 PID 3604 wrote to memory of 2448 3604 juafhv.exe 85 PID 3604 wrote to memory of 2448 3604 juafhv.exe 85 PID 2448 wrote to memory of 2140 2448 tpbqop.exe 86 PID 2448 wrote to memory of 2140 2448 tpbqop.exe 86 PID 2448 wrote to memory of 2140 2448 tpbqop.exe 86 PID 2140 wrote to memory of 4068 2140 dsqajt.exe 87 PID 2140 wrote to memory of 4068 2140 dsqajt.exe 87 PID 2140 wrote to memory of 4068 2140 dsqajt.exe 87 PID 4068 wrote to memory of 1868 4068 twzvny.exe 88 PID 4068 wrote to memory of 1868 4068 twzvny.exe 88 PID 4068 wrote to memory of 1868 4068 twzvny.exe 88 PID 1868 wrote to memory of 3120 1868 griltc.exe 89 PID 1868 wrote to memory of 3120 1868 griltc.exe 89 PID 1868 wrote to memory of 3120 1868 griltc.exe 89 PID 3120 wrote to memory of 4304 3120 tilnck.exe 90 PID 3120 wrote to memory of 4304 3120 tilnck.exe 90 PID 3120 wrote to memory of 4304 3120 tilnck.exe 90 PID 4304 wrote to memory of 2000 4304 gvvdig.exe 91 PID 4304 wrote to memory of 2000 4304 gvvdig.exe 91 PID 4304 wrote to memory of 2000 4304 gvvdig.exe 91 PID 2000 wrote to memory of 4540 2000 quhise.exe 92 PID 2000 wrote to memory of 4540 2000 quhise.exe 92 PID 2000 wrote to memory of 4540 2000 quhise.exe 92 PID 4540 wrote to memory of 4480 4540 yvgjht.exe 93 PID 4540 wrote to memory of 4480 4540 yvgjht.exe 93 PID 4540 wrote to memory of 4480 4540 yvgjht.exe 93 PID 4480 wrote to memory of 1088 4480 olrjnd.exe 94 PID 4480 wrote to memory of 1088 4480 olrjnd.exe 94 PID 4480 wrote to memory of 1088 4480 olrjnd.exe 94 PID 1088 wrote to memory of 2412 1088 afxyzp.exe 95 PID 1088 wrote to memory of 2412 1088 afxyzp.exe 95 PID 1088 wrote to memory of 2412 1088 afxyzp.exe 95 PID 2412 wrote to memory of 4408 2412 ospoft.exe 96 PID 2412 wrote to memory of 4408 2412 ospoft.exe 96 PID 2412 wrote to memory of 4408 2412 ospoft.exe 96 PID 4408 wrote to memory of 2436 4408 yketjj.exe 97 PID 4408 wrote to memory of 2436 4408 yketjj.exe 97 PID 4408 wrote to memory of 2436 4408 yketjj.exe 97 PID 2436 wrote to memory of 2444 2436 grsmez.exe 98 PID 2436 wrote to memory of 2444 2436 grsmez.exe 98 PID 2436 wrote to memory of 2444 2436 grsmez.exe 98 PID 2444 wrote to memory of 5096 2444 weahae.exe 99 PID 2444 wrote to memory of 5096 2444 weahae.exe 99 PID 2444 wrote to memory of 5096 2444 weahae.exe 99 PID 5096 wrote to memory of 1284 5096 iygwtq.exe 100 PID 5096 wrote to memory of 1284 5096 iygwtq.exe 100 PID 5096 wrote to memory of 1284 5096 iygwtq.exe 100 PID 1284 wrote to memory of 1700 1284 vwbzcz.exe 101 PID 1284 wrote to memory of 1700 1284 vwbzcz.exe 101 PID 1284 wrote to memory of 1700 1284 vwbzcz.exe 101 PID 1700 wrote to memory of 3316 1700 ijsphu.exe 102 PID 1700 wrote to memory of 3316 1700 ijsphu.exe 102 PID 1700 wrote to memory of 3316 1700 ijsphu.exe 102 PID 3316 wrote to memory of 1340 3316 vwceny.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\f88ea9233fec35960bbb4feeabcff945_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f88ea9233fec35960bbb4feeabcff945_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\SysWOW64\tscflz.exeC:\Windows\system32\tscflz.exe 1192 "C:\Users\Admin\AppData\Local\Temp\f88ea9233fec35960bbb4feeabcff945_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\SysWOW64\vkucev.exeC:\Windows\system32\vkucev.exe 1152 "C:\Windows\SysWOW64\tscflz.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\SysWOW64\juafhv.exeC:\Windows\system32\juafhv.exe 1032 "C:\Windows\SysWOW64\vkucev.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\SysWOW64\tpbqop.exeC:\Windows\system32\tpbqop.exe 1160 "C:\Windows\SysWOW64\juafhv.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\dsqajt.exeC:\Windows\system32\dsqajt.exe 1156 "C:\Windows\SysWOW64\tpbqop.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\twzvny.exeC:\Windows\system32\twzvny.exe 1168 "C:\Windows\SysWOW64\dsqajt.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\SysWOW64\griltc.exeC:\Windows\system32\griltc.exe 1172 "C:\Windows\SysWOW64\twzvny.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\tilnck.exeC:\Windows\system32\tilnck.exe 1176 "C:\Windows\SysWOW64\griltc.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\SysWOW64\gvvdig.exeC:\Windows\system32\gvvdig.exe 1180 "C:\Windows\SysWOW64\tilnck.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\SysWOW64\quhise.exeC:\Windows\system32\quhise.exe 1188 "C:\Windows\SysWOW64\gvvdig.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\yvgjht.exeC:\Windows\system32\yvgjht.exe 1184 "C:\Windows\SysWOW64\quhise.exe"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\SysWOW64\olrjnd.exeC:\Windows\system32\olrjnd.exe 1200 "C:\Windows\SysWOW64\yvgjht.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\SysWOW64\afxyzp.exeC:\Windows\system32\afxyzp.exe 1196 "C:\Windows\SysWOW64\olrjnd.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\ospoft.exeC:\Windows\system32\ospoft.exe 1164 "C:\Windows\SysWOW64\afxyzp.exe"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\yketjj.exeC:\Windows\system32\yketjj.exe 1208 "C:\Windows\SysWOW64\ospoft.exe"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\SysWOW64\grsmez.exeC:\Windows\system32\grsmez.exe 1212 "C:\Windows\SysWOW64\yketjj.exe"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\weahae.exeC:\Windows\system32\weahae.exe 1132 "C:\Windows\SysWOW64\grsmez.exe"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\iygwtq.exeC:\Windows\system32\iygwtq.exe 1216 "C:\Windows\SysWOW64\weahae.exe"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\SysWOW64\vwbzcz.exeC:\Windows\system32\vwbzcz.exe 1224 "C:\Windows\SysWOW64\iygwtq.exe"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\ijsphu.exeC:\Windows\system32\ijsphu.exe 1220 "C:\Windows\SysWOW64\vwbzcz.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\vwceny.exeC:\Windows\system32\vwceny.exe 1236 "C:\Windows\SysWOW64\ijsphu.exe"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Windows\SysWOW64\jjuutc.exeC:\Windows\system32\jjuutc.exe 1232 "C:\Windows\SysWOW64\vwceny.exe"23⤵
- Executes dropped EXE
PID:1340 -
C:\Windows\SysWOW64\tfunbw.exeC:\Windows\system32\tfunbw.exe 1228 "C:\Windows\SysWOW64\jjuutc.exe"24⤵
- Executes dropped EXE
PID:1460 -
C:\Windows\SysWOW64\xkehpf.exeC:\Windows\system32\xkehpf.exe 1204 "C:\Windows\SysWOW64\tfunbw.exe"25⤵
- Executes dropped EXE
PID:1056 -
C:\Windows\SysWOW64\izqazz.exeC:\Windows\system32\izqazz.exe 1248 "C:\Windows\SysWOW64\xkehpf.exe"26⤵
- Executes dropped EXE
PID:4960 -
C:\Windows\SysWOW64\tvjkhu.exeC:\Windows\system32\tvjkhu.exe 1256 "C:\Windows\SysWOW64\izqazz.exe"27⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3408 -
C:\Windows\SysWOW64\fppasy.exeC:\Windows\system32\fppasy.exe 1244 "C:\Windows\SysWOW64\tvjkhu.exe"28⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3544 -
C:\Windows\SysWOW64\vfiizq.exeC:\Windows\system32\vfiizq.exe 1260 "C:\Windows\SysWOW64\fppasy.exe"29⤵
- Executes dropped EXE
PID:1840 -
C:\Windows\SysWOW64\fenfjo.exeC:\Windows\system32\fenfjo.exe 1264 "C:\Windows\SysWOW64\vfiizq.exe"30⤵
- Executes dropped EXE
PID:2232 -
C:\Windows\SysWOW64\vivanu.exeC:\Windows\system32\vivanu.exe 1252 "C:\Windows\SysWOW64\fenfjo.exe"31⤵
- Executes dropped EXE
PID:1864 -
C:\Windows\SysWOW64\iveqtx.exeC:\Windows\system32\iveqtx.exe 1048 "C:\Windows\SysWOW64\vivanu.exe"32⤵
- Executes dropped EXE
PID:2492 -
C:\Windows\SysWOW64\scrndw.exeC:\Windows\system32\scrndw.exe 1268 "C:\Windows\SysWOW64\iveqtx.exe"33⤵
- Executes dropped EXE
PID:1732 -
C:\Windows\SysWOW64\dmgtqm.exeC:\Windows\system32\dmgtqm.exe 1280 "C:\Windows\SysWOW64\scrndw.exe"34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3184 -
C:\Windows\SysWOW64\qomicz.exeC:\Windows\system32\qomicz.exe 1284 "C:\Windows\SysWOW64\dmgtqm.exe"35⤵
- Executes dropped EXE
PID:4272 -
C:\Windows\SysWOW64\dnhdkz.exeC:\Windows\system32\dnhdkz.exe 1288 "C:\Windows\SysWOW64\qomicz.exe"36⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4440 -
C:\Windows\SysWOW64\nxxipp.exeC:\Windows\system32\nxxipp.exe 1276 "C:\Windows\SysWOW64\dnhdkz.exe"37⤵
- Executes dropped EXE
PID:2608 -
C:\Windows\SysWOW64\dniqwh.exeC:\Windows\system32\dniqwh.exe 1296 "C:\Windows\SysWOW64\nxxipp.exe"38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4444 -
C:\Windows\SysWOW64\qddteh.exeC:\Windows\system32\qddteh.exe 1292 "C:\Windows\SysWOW64\dniqwh.exe"39⤵
- Executes dropped EXE
PID:1592 -
C:\Windows\SysWOW64\dqujkl.exeC:\Windows\system32\dqujkl.exe 1304 "C:\Windows\SysWOW64\qddteh.exe"40⤵
- Executes dropped EXE
PID:4608 -
C:\Windows\SysWOW64\nbktfo.exeC:\Windows\system32\nbktfo.exe 1308 "C:\Windows\SysWOW64\dqujkl.exe"41⤵
- Executes dropped EXE
PID:2984 -
C:\Windows\SysWOW64\aobjls.exeC:\Windows\system32\aobjls.exe 1312 "C:\Windows\SysWOW64\nbktfo.exe"42⤵
- Executes dropped EXE
PID:2496 -
C:\Windows\SysWOW64\oximor.exeC:\Windows\system32\oximor.exe 1148 "C:\Windows\SysWOW64\aobjls.exe"43⤵
- Executes dropped EXE
PID:1888 -
C:\Windows\SysWOW64\xixwbu.exeC:\Windows\system32\xixwbu.exe 1272 "C:\Windows\SysWOW64\oximor.exe"44⤵
- Executes dropped EXE
PID:892 -
C:\Windows\SysWOW64\lvhuhq.exeC:\Windows\system32\lvhuhq.exe 1320 "C:\Windows\SysWOW64\xixwbu.exe"45⤵
- Executes dropped EXE
PID:3760 -
C:\Windows\SysWOW64\yiyjnu.exeC:\Windows\system32\yiyjnu.exe 1324 "C:\Windows\SysWOW64\lvhuhq.exe"46⤵
- Executes dropped EXE
PID:3132 -
C:\Windows\SysWOW64\lytmwc.exeC:\Windows\system32\lytmwc.exe 1336 "C:\Windows\SysWOW64\yiyjnu.exe"47⤵
- Executes dropped EXE
PID:3976 -
C:\Windows\SysWOW64\vqjkis.exeC:\Windows\system32\vqjkis.exe 1300 "C:\Windows\SysWOW64\lytmwc.exe"48⤵
- Executes dropped EXE
PID:2612 -
C:\Windows\SysWOW64\ispzux.exeC:\Windows\system32\ispzux.exe 1340 "C:\Windows\SysWOW64\vqjkis.exe"49⤵
- Executes dropped EXE
PID:1600 -
C:\Windows\SysWOW64\vjrccf.exeC:\Windows\system32\vjrccf.exe 1344 "C:\Windows\SysWOW64\ispzux.exe"50⤵
- Executes dropped EXE
PID:4348 -
C:\Windows\SysWOW64\iwbsij.exeC:\Windows\system32\iwbsij.exe 1348 "C:\Windows\SysWOW64\vjrccf.exe"51⤵
- Executes dropped EXE
PID:824 -
C:\Windows\SysWOW64\vjthon.exeC:\Windows\system32\vjthon.exe 1356 "C:\Windows\SysWOW64\iwbsij.exe"52⤵
- Executes dropped EXE
PID:4028 -
C:\Windows\SysWOW64\dzoiac.exeC:\Windows\system32\dzoiac.exe 1332 "C:\Windows\SysWOW64\vjthon.exe"53⤵
- Executes dropped EXE
PID:4160 -
C:\Windows\SysWOW64\shzihm.exeC:\Windows\system32\shzihm.exe 1352 "C:\Windows\SysWOW64\dzoiac.exe"54⤵
- Executes dropped EXE
PID:4324 -
C:\Windows\SysWOW64\gqgskl.exeC:\Windows\system32\gqgskl.exe 1368 "C:\Windows\SysWOW64\shzihm.exe"55⤵
- Executes dropped EXE
PID:2212 -
C:\Windows\SysWOW64\thbvtt.exeC:\Windows\system32\thbvtt.exe 1372 "C:\Windows\SysWOW64\gqgskl.exe"56⤵
- Executes dropped EXE
PID:1100 -
C:\Windows\SysWOW64\allake.exeC:\Windows\system32\allake.exe 1360 "C:\Windows\SysWOW64\thbvtt.exe"57⤵
- Executes dropped EXE
PID:4400 -
C:\Windows\SysWOW64\qeivus.exeC:\Windows\system32\qeivus.exe 1376 "C:\Windows\SysWOW64\allake.exe"58⤵
- Executes dropped EXE
PID:4224 -
C:\Windows\SysWOW64\awxsyq.exeC:\Windows\system32\awxsyq.exe 1380 "C:\Windows\SysWOW64\qeivus.exe"59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4132 -
C:\Windows\SysWOW64\qejafa.exeC:\Windows\system32\qejafa.exe 1384 "C:\Windows\SysWOW64\awxsyq.exe"60⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4556 -
C:\Windows\SysWOW64\yfibuh.exeC:\Windows\system32\yfibuh.exe 1388 "C:\Windows\SysWOW64\qejafa.exe"61⤵
- Executes dropped EXE
PID:1924 -
C:\Windows\SysWOW64\nyeovd.exeC:\Windows\system32\nyeovd.exe 1392 "C:\Windows\SysWOW64\yfibuh.exe"62⤵
- Executes dropped EXE
PID:3284 -
C:\Windows\SysWOW64\alwljy.exeC:\Windows\system32\alwljy.exe 1396 "C:\Windows\SysWOW64\nyeovd.exe"63⤵
- Executes dropped EXE
PID:3148 -
C:\Windows\SysWOW64\ncrosh.exeC:\Windows\system32\ncrosh.exe 1364 "C:\Windows\SysWOW64\alwljy.exe"64⤵
- Executes dropped EXE
PID:1404 -
C:\Windows\SysWOW64\vjegew.exeC:\Windows\system32\vjegew.exe 1404 "C:\Windows\SysWOW64\ncrosh.exe"65⤵
- Executes dropped EXE
PID:1400 -
C:\Windows\SysWOW64\itkjhw.exeC:\Windows\system32\itkjhw.exe 1412 "C:\Windows\SysWOW64\vjegew.exe"66⤵PID:4704
-
C:\Windows\SysWOW64\yjeron.exeC:\Windows\system32\yjeron.exe 1408 "C:\Windows\SysWOW64\itkjhw.exe"67⤵PID:3488
-
C:\Windows\SysWOW64\lzztwn.exeC:\Windows\system32\lzztwn.exe 1400 "C:\Windows\SysWOW64\yjeron.exe"68⤵PID:1004
-
C:\Windows\SysWOW64\shmmrd.exeC:\Windows\system32\shmmrd.exe 1416 "C:\Windows\SysWOW64\lzztwn.exe"69⤵PID:1524
-
C:\Windows\SysWOW64\ituhvq.exeC:\Windows\system32\ituhvq.exe 1424 "C:\Windows\SysWOW64\shmmrd.exe"70⤵PID:1740
-
C:\Windows\SysWOW64\ngmeau.exeC:\Windows\system32\ngmeau.exe 1432 "C:\Windows\SysWOW64\ituhvq.exe"71⤵PID:3452
-
C:\Windows\SysWOW64\axhzju.exeC:\Windows\system32\axhzju.exe 1420 "C:\Windows\SysWOW64\ngmeau.exe"72⤵PID:3712
-
C:\Windows\SysWOW64\ifuzvr.exeC:\Windows\system32\ifuzvr.exe 1316 "C:\Windows\SysWOW64\axhzju.exe"73⤵PID:4968
-
C:\Windows\SysWOW64\xrcuzw.exeC:\Windows\system32\xrcuzw.exe 1108 "C:\Windows\SysWOW64\ifuzvr.exe"74⤵PID:4752
-
C:\Windows\SysWOW64\khxxif.exeC:\Windows\system32\khxxif.exe 1444 "C:\Windows\SysWOW64\xrcuzw.exe"75⤵PID:4204
-
C:\Windows\SysWOW64\yupnob.exeC:\Windows\system32\yupnob.exe 1448 "C:\Windows\SysWOW64\khxxif.exe"76⤵PID:2692
-
C:\Windows\SysWOW64\ictkgz.exeC:\Windows\system32\ictkgz.exe 1452 "C:\Windows\SysWOW64\yupnob.exe"77⤵PID:3844
-
C:\Windows\SysWOW64\vswnph.exeC:\Windows\system32\vswnph.exe 1456 "C:\Windows\SysWOW64\ictkgz.exe"78⤵PID:2908
-
C:\Windows\SysWOW64\iccpsh.exeC:\Windows\system32\iccpsh.exe 1460 "C:\Windows\SysWOW64\vswnph.exe"79⤵PID:2148
-
C:\Windows\SysWOW64\serafk.exeC:\Windows\system32\serafk.exe 1440 "C:\Windows\SysWOW64\iccpsh.exe"80⤵PID:708
-
C:\Windows\SysWOW64\fdmcok.exeC:\Windows\system32\fdmcok.exe 1464 "C:\Windows\SysWOW64\serafk.exe"81⤵PID:636
-
C:\Windows\SysWOW64\smsnrk.exeC:\Windows\system32\smsnrk.exe 1140 "C:\Windows\SysWOW64\fdmcok.exe"82⤵PID:4052
-
C:\Windows\SysWOW64\fzcdwo.exeC:\Windows\system32\fzcdwo.exe 1472 "C:\Windows\SysWOW64\smsnrk.exe"83⤵
- System Location Discovery: System Language Discovery
PID:1144 -
C:\Windows\SysWOW64\sqfgfw.exeC:\Windows\system32\sqfgfw.exe 1480 "C:\Windows\SysWOW64\fzcdwo.exe"84⤵PID:3744
-
C:\Windows\SysWOW64\cauqaz.exeC:\Windows\system32\cauqaz.exe 1484 "C:\Windows\SysWOW64\sqfgfw.exe"85⤵PID:3264
-
C:\Windows\SysWOW64\pnmggv.exeC:\Windows\system32\pnmggv.exe 1488 "C:\Windows\SysWOW64\cauqaz.exe"86⤵
- System Location Discovery: System Language Discovery
PID:1688 -
C:\Windows\SysWOW64\cavvmz.exeC:\Windows\system32\cavvmz.exe 1492 "C:\Windows\SysWOW64\pnmggv.exe"87⤵PID:1504
-
C:\Windows\SysWOW64\qnnlsc.exeC:\Windows\system32\qnnlsc.exe 1476 "C:\Windows\SysWOW64\cavvmz.exe"88⤵PID:1140
-
C:\Windows\SysWOW64\aycvfg.exeC:\Windows\system32\aycvfg.exe 1500 "C:\Windows\SysWOW64\qnnlsc.exe"89⤵PID:4804
-
C:\Windows\SysWOW64\nhigif.exeC:\Windows\system32\nhigif.exe 1508 "C:\Windows\SysWOW64\aycvfg.exe"90⤵
- Drops file in System32 directory
PID:2264 -
C:\Windows\SysWOW64\aydbyf.exeC:\Windows\system32\aydbyf.exe 1504 "C:\Windows\SysWOW64\nhigif.exe"91⤵PID:4352
-
C:\Windows\SysWOW64\kxpgje.exeC:\Windows\system32\kxpgje.exe 1496 "C:\Windows\SysWOW64\aydbyf.exe"92⤵PID:5060
-
C:\Windows\SysWOW64\xvkjrm.exeC:\Windows\system32\xvkjrm.exe 1516 "C:\Windows\SysWOW64\kxpgje.exe"93⤵PID:5048
-
C:\Windows\SysWOW64\kiczxq.exeC:\Windows\system32\kiczxq.exe 1520 "C:\Windows\SysWOW64\xvkjrm.exe"94⤵PID:1456
-
C:\Windows\SysWOW64\ysabaq.exeC:\Windows\system32\ysabaq.exe 1528 "C:\Windows\SysWOW64\kiczxq.exe"95⤵PID:1648
-
C:\Windows\SysWOW64\kidejq.exeC:\Windows\system32\kidejq.exe 1524 "C:\Windows\SysWOW64\ysabaq.exe"96⤵
- System Location Discovery: System Language Discovery
PID:1904 -
C:\Windows\SysWOW64\utspet.exeC:\Windows\system32\utspet.exe 1532 "C:\Windows\SysWOW64\kidejq.exe"97⤵PID:4720
-
C:\Windows\SysWOW64\idzrhs.exeC:\Windows\system32\idzrhs.exe 1536 "C:\Windows\SysWOW64\utspet.exe"98⤵PID:560
-
C:\Windows\SysWOW64\vqipnw.exeC:\Windows\system32\vqipnw.exe 1436 "C:\Windows\SysWOW64\idzrhs.exe"99⤵PID:768
-
C:\Windows\SysWOW64\fsfraz.exeC:\Windows\system32\fsfraz.exe 1584 "C:\Windows\SysWOW64\vqipnw.exe"100⤵PID:4288
-
C:\Windows\SysWOW64\sraujz.exeC:\Windows\system32\sraujz.exe 1544 "C:\Windows\SysWOW64\fsfraz.exe"101⤵PID:2132
-
C:\Windows\SysWOW64\feksod.exeC:\Windows\system32\feksod.exe 1548 "C:\Windows\SysWOW64\sraujz.exe"102⤵
- Drops file in System32 directory
PID:756 -
C:\Windows\SysWOW64\srbhuh.exeC:\Windows\system32\srbhuh.exe 1552 "C:\Windows\SysWOW64\feksod.exe"103⤵PID:4228
-
C:\Windows\SysWOW64\fetxad.exeC:\Windows\system32\fetxad.exe 1540 "C:\Windows\SysWOW64\srbhuh.exe"104⤵
- System Location Discovery: System Language Discovery
PID:4484 -
C:\Windows\SysWOW64\poiivg.exeC:\Windows\system32\poiivg.exe 1556 "C:\Windows\SysWOW64\fetxad.exe"105⤵PID:1308
-
C:\Windows\SysWOW64\cbsxbk.exeC:\Windows\system32\cbsxbk.exe 1560 "C:\Windows\SysWOW64\poiivg.exe"106⤵
- System Location Discovery: System Language Discovery
PID:1236 -
C:\Windows\SysWOW64\pojnho.exeC:\Windows\system32\pojnho.exe 1564 "C:\Windows\SysWOW64\cbsxbk.exe"107⤵PID:4140
-
C:\Windows\SysWOW64\anokrn.exeC:\Windows\system32\anokrn.exe 1572 "C:\Windows\SysWOW64\pojnho.exe"108⤵PID:3084
-
C:\Windows\SysWOW64\nafixq.exeC:\Windows\system32\nafixq.exe 1576 "C:\Windows\SysWOW64\anokrn.exe"109⤵PID:1788
-
C:\Windows\SysWOW64\azadgr.exeC:\Windows\system32\azadgr.exe 1568 "C:\Windows\SysWOW64\nafixq.exe"110⤵PID:2408
-
C:\Windows\SysWOW64\nmralu.exeC:\Windows\system32\nmralu.exe 1588 "C:\Windows\SysWOW64\azadgr.exe"111⤵PID:2568
-
C:\Windows\SysWOW64\azjqry.exeC:\Windows\system32\azjqry.exe 1592 "C:\Windows\SysWOW64\nmralu.exe"112⤵PID:2536
-
C:\Windows\SysWOW64\kynokx.exeC:\Windows\system32\kynokx.exe 1596 "C:\Windows\SysWOW64\azjqry.exe"113⤵PID:1728
-
C:\Windows\SysWOW64\xwiqsx.exeC:\Windows\system32\xwiqsx.exe 1600 "C:\Windows\SysWOW64\kynokx.exe"114⤵PID:4384
-
C:\Windows\SysWOW64\kgotvx.exeC:\Windows\system32\kgotvx.exe 1604 "C:\Windows\SysWOW64\xwiqsx.exe"115⤵PID:3600
-
C:\Windows\SysWOW64\uiedia.exeC:\Windows\system32\uiedia.exe 1608 "C:\Windows\SysWOW64\kgotvx.exe"116⤵PID:640
-
C:\Windows\SysWOW64\zhggri.exeC:\Windows\system32\zhggri.exe 1580 "C:\Windows\SysWOW64\uiedia.exe"117⤵PID:3748
-
C:\Windows\SysWOW64\muqwxm.exeC:\Windows\system32\muqwxm.exe 1612 "C:\Windows\SysWOW64\zhggri.exe"118⤵
- Drops file in System32 directory
PID:4316 -
C:\Windows\SysWOW64\ahiuli.exeC:\Windows\system32\ahiuli.exe 1620 "C:\Windows\SysWOW64\muqwxm.exe"119⤵PID:4524
-
C:\Windows\SysWOW64\nuzjqm.exeC:\Windows\system32\nuzjqm.exe 1624 "C:\Windows\SysWOW64\ahiuli.exe"120⤵PID:3908
-
C:\Windows\SysWOW64\xfouep.exeC:\Windows\system32\xfouep.exe 1628 "C:\Windows\SysWOW64\nuzjqm.exe"121⤵PID:4792
-
C:\Windows\SysWOW64\ksyjjs.exeC:\Windows\system32\ksyjjs.exe 1616 "C:\Windows\SysWOW64\xfouep.exe"122⤵PID:3628
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-