Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
37s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 10:12
Behavioral task
behavioral1
Sample
39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe
-
Size
91KB
-
MD5
39771891331f0ec6459645875c89a1f1
-
SHA1
891f862a6972906e9d31b262c70435468d7b285e
-
SHA256
a037741500e627fb16d1a435cf0ea0e312c785065903028e03341cbb4f1f5f61
-
SHA512
07f96d42cf36b7adf3ae682ffde90eca7116b2f6b8264a32282a229c066e4b513b12952e852e5fdf85af7a5b89f65b45335e5faa19cd8f52fca43ba4be86b5b1
-
SSDEEP
1536:oy5vD03IfV4tM3z9mYzA8V9p39aag6tp38izscOIEALMu7HLrF/1o:o+7dwM3xmmjH3Txtp38XzIdLPfF
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" dmglcxiq.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" dmglcxiq.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" dmglcxiq.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dmglcxiq.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" dmglcxiq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" dmglcxiq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" dmglcxiq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" dmglcxiq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" dmglcxiq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" dmglcxiq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = "1" dmglcxiq.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = "1" 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe -
Disables Task Manager via registry modification
-
Deletes itself 1 IoCs
pid Process 704 dmglcxiq.exe -
Executes dropped EXE 64 IoCs
pid Process 1636 gspjqh.exe 2636 qjnipunf.exe 2632 bwpfl.exe 1300 yqrbud.exe 1484 ifgkapej.exe 1480 oofqmz.exe 2700 kbqrthx.exe 2600 bqcsyyta.exe 1588 gyioeh.exe 2344 cdfpcgvp.exe 2208 svrpv.exe 1644 khmvth.exe 1396 gkincvbb.exe 1616 tbnpap.exe 2112 jmjpbdus.exe 2488 uheqgmgg.exe 3000 szxqnhje.exe 2284 ogyws.exe 2044 rzszw.exe 2260 mqdqxxg.exe 1236 txiulnm.exe 2216 xjyjpofw.exe 2764 ovudxe.exe 2972 vgjeh.exe 2668 iyhlvo.exe 2656 ezyxzfdd.exe 1268 tifwv.exe 1148 mhcexdn.exe 2032 cncoc.exe 236 dcbqpq.exe 3140 wbezcnzy.exe 3216 kxlww.exe 3268 akzbxa.exe 3312 xclveije.exe 3364 ueoxduzx.exe 3400 tfqqwak.exe 3460 umrpllna.exe 3512 kzfyzddc.exe 3556 okrtykcf.exe 3600 wctjech.exe 3664 rnbvbjs.exe 3708 lgbtmrqe.exe 3760 zzaawm.exe 3804 kmbmxi.exe 3852 yuuaod.exe 3924 ocfspk.exe 3976 uucxa.exe 4024 oljgsmpo.exe 4072 ghndfay.exe 704 dmglcxiq.exe 1116 olqni.exe 824 ymyjvsiy.exe 2772 oflohet.exe 2352 tswtrbl.exe 2944 wemvujqu.exe 1348 jvgqyl.exe 1372 ljeudyn.exe 1036 btrlgg.exe 2376 uduiy.exe 3164 ubrqunic.exe 3244 lsuvsjkx.exe 3308 xgfth.exe 3416 qvdcti.exe 3488 whzxblj.exe -
Loads dropped DLL 64 IoCs
pid Process 3052 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe 3052 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe 1636 gspjqh.exe 1636 gspjqh.exe 2636 qjnipunf.exe 2636 qjnipunf.exe 2632 bwpfl.exe 2632 bwpfl.exe 1300 yqrbud.exe 1300 yqrbud.exe 1484 ifgkapej.exe 1484 ifgkapej.exe 1480 oofqmz.exe 1480 oofqmz.exe 2700 kbqrthx.exe 2700 kbqrthx.exe 2600 bqcsyyta.exe 2600 bqcsyyta.exe 1588 gyioeh.exe 1588 gyioeh.exe 2344 cdfpcgvp.exe 2344 cdfpcgvp.exe 2208 svrpv.exe 2208 svrpv.exe 1644 khmvth.exe 1644 khmvth.exe 1396 gkincvbb.exe 1396 gkincvbb.exe 1616 tbnpap.exe 1616 tbnpap.exe 2112 jmjpbdus.exe 2112 jmjpbdus.exe 2488 uheqgmgg.exe 2488 uheqgmgg.exe 3000 szxqnhje.exe 3000 szxqnhje.exe 2284 ogyws.exe 2284 ogyws.exe 2044 rzszw.exe 2044 rzszw.exe 2260 mqdqxxg.exe 2260 mqdqxxg.exe 1236 txiulnm.exe 1236 txiulnm.exe 2216 xjyjpofw.exe 2216 xjyjpofw.exe 2764 ovudxe.exe 2764 ovudxe.exe 2972 vgjeh.exe 2972 vgjeh.exe 2668 iyhlvo.exe 2668 iyhlvo.exe 2656 ezyxzfdd.exe 2656 ezyxzfdd.exe 1268 tifwv.exe 1268 tifwv.exe 1148 mhcexdn.exe 1148 mhcexdn.exe 2032 cncoc.exe 2032 cncoc.exe 236 dcbqpq.exe 236 dcbqpq.exe 3140 wbezcnzy.exe 3140 wbezcnzy.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" dmglcxiq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" dmglcxiq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" dmglcxiq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" dmglcxiq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" dmglcxiq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc dmglcxiq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" dmglcxiq.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\lgbtmrqe.exe" rnbvbjs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\wladb.exe" tzwzhcsz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\ihkcgnsp.exe" dkjdq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\leccnklr.exe" cbzhry.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\vtphuw.exe" zvstuepo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\uheqgmgg.exe" jmjpbdus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\kxlww.exe" wbezcnzy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\whzxblj.exe" qvdcti.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\ckixt.exe" jeeqt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\ifgkapej.exe" yqrbud.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\olqni.exe" dmglcxiq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\qhvsqem.exe" jfxzw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\hrhqmb.exe" nfdrlc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\qjaajc.exe" ckixt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\khmvth.exe" svrpv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\xgfth.exe" lsuvsjkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\nzxuw.exe" ttwfr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\stdvfckc.exe" qroaqijt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\wctjech.exe" okrtykcf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\palkpic.exe" vckns.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\qqsqhs.exe" vzvxkdy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\osvvza.exe" rxtzkjb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\tbnpap.exe" gkincvbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\ovudxe.exe" xjyjpofw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\nfdrlc.exe" cuitaio.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\uuqjdqh.exe" jifhwbib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\fjysr.exe" afavknv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\gspjqh.exe" 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\ogyws.exe" szxqnhje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\zlqjebi.exe" ajhyv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\nvfuen.exe" ujvkz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\vgjeh.exe" ovudxe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\nkypww.exe" ihkcgnsp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\akzbxa.exe" kxlww.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\wdcvzlvc.exe" nzxuw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\szxqnhje.exe" uheqgmgg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\xjyjpofw.exe" txiulnm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\gnbzkc.exe" vcevojka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\gyioeh.exe" bqcsyyta.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\tcomtmwi.exe" xynksxgg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\drinrt.exe" uuqjdqh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\qjnipunf.exe" gspjqh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\okrtykcf.exe" kzfyzddc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\yqrbud.exe" bwpfl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\xynksxgg.exe" qzzcqfh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\ajhyv.exe" jsvudkha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\zidbh.exe" gflft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\ooiikce.exe" tvndbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\yjtmegt.exe" wladb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\vyxtyffr.exe" vdqoqju.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\fhelasuk.exe" wdcvzlvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\emyqkism.exe" pckhcv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\vhsoi.exe" stdvfckc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\whakdtro.exe" nuwtrll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\uucxa.exe" ocfspk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\qzzcqfh.exe" iwmityu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\pckhcv.exe" qbyjpeyd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\zvstuepo.exe" anprvp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\kbqrthx.exe" oofqmz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\rnbvbjs.exe" wctjech.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\jvgqyl.exe" wemvujqu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\jeeqt.exe" okluimh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\ahvet.exe" qjaajc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\cncoc.exe" mhcexdn.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dmglcxiq.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe File opened (read-only) \??\O: 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe File opened (read-only) \??\R: 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe File opened (read-only) \??\S: 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe File opened (read-only) \??\U: 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe File opened (read-only) \??\X: 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe File opened (read-only) \??\I: 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe File opened (read-only) \??\J: 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe File opened (read-only) \??\W: 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe File opened (read-only) \??\Y: 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe File opened (read-only) \??\G: 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe File opened (read-only) \??\V: 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe File opened (read-only) \??\K: 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe File opened (read-only) \??\M: 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe File opened (read-only) \??\Q: 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe File opened (read-only) \??\T: 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe File opened (read-only) \??\E: 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe File opened (read-only) \??\H: 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe File opened (read-only) \??\E: dmglcxiq.exe File opened (read-only) \??\N: 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe File opened (read-only) \??\P: 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\mhcexdn.exe tifwv.exe File opened for modification C:\Windows\SysWOW64\ocfspk.exe yuuaod.exe File opened for modification C:\Windows\SysWOW64\tzwzhcsz.exe tafur.exe File created C:\Windows\SysWOW64\nzxuw.exe ttwfr.exe File opened for modification C:\Windows\SysWOW64\zvstuepo.exe anprvp.exe File created C:\Windows\SysWOW64\oofqmz.exe ifgkapej.exe File opened for modification C:\Windows\SysWOW64\mqdqxxg.exe rzszw.exe File created C:\Windows\SysWOW64\ovudxe.exe xjyjpofw.exe File opened for modification C:\Windows\SysWOW64\ujvkz.exe bmqto.exe File created C:\Windows\SysWOW64\okluimh.exe koacg.exe File opened for modification C:\Windows\SysWOW64\ogyws.exe szxqnhje.exe File opened for modification C:\Windows\SysWOW64\jsvudkha.exe emnqau.exe File created C:\Windows\SysWOW64\anprvp.exe fjysr.exe File opened for modification C:\Windows\SysWOW64\anprvp.exe fjysr.exe File created C:\Windows\SysWOW64\tifwv.exe ezyxzfdd.exe File opened for modification C:\Windows\SysWOW64\uduiy.exe btrlgg.exe File opened for modification C:\Windows\SysWOW64\tafur.exe qhvsqem.exe File created C:\Windows\SysWOW64\qqsqhs.exe vzvxkdy.exe File created C:\Windows\SysWOW64\rxtzkjb.exe fsskt.exe File created C:\Windows\SysWOW64\qroaqijt.exe xgfgfzk.exe File created C:\Windows\SysWOW64\qhjlim.exe dznje.exe File opened for modification C:\Windows\SysWOW64\gyioeh.exe bqcsyyta.exe File created C:\Windows\SysWOW64\uheqgmgg.exe jmjpbdus.exe File opened for modification C:\Windows\SysWOW64\lgbtmrqe.exe rnbvbjs.exe File opened for modification C:\Windows\SysWOW64\koacg.exe palkpic.exe File created C:\Windows\SysWOW64\pezhog.exe gnbzkc.exe File opened for modification C:\Windows\SysWOW64\wcvtpcqq.exe xozckfyo.exe File opened for modification C:\Windows\SysWOW64\qbyjpeyd.exe fhelasuk.exe File opened for modification C:\Windows\SysWOW64\stdvfckc.exe qroaqijt.exe File created C:\Windows\SysWOW64\txiulnm.exe mqdqxxg.exe File opened for modification C:\Windows\SysWOW64\kxlww.exe wbezcnzy.exe File created C:\Windows\SysWOW64\dmglcxiq.exe ghndfay.exe File created C:\Windows\SysWOW64\zkfes.exe nkypww.exe File created C:\Windows\SysWOW64\qzzcqfh.exe iwmityu.exe File created C:\Windows\SysWOW64\yuuaod.exe kmbmxi.exe File created C:\Windows\SysWOW64\uduiy.exe btrlgg.exe File opened for modification C:\Windows\SysWOW64\lsuvsjkx.exe ubrqunic.exe File created C:\Windows\SysWOW64\emyqkism.exe pckhcv.exe File opened for modification C:\Windows\SysWOW64\dznje.exe ngydmkoe.exe File opened for modification C:\Windows\SysWOW64\gkincvbb.exe khmvth.exe File created C:\Windows\SysWOW64\akzbxa.exe kxlww.exe File created C:\Windows\SysWOW64\bawctfk.exe osvvza.exe File created C:\Windows\SysWOW64\whzxblj.exe qvdcti.exe File opened for modification C:\Windows\SysWOW64\zidbh.exe gflft.exe File opened for modification C:\Windows\SysWOW64\qzzcqfh.exe iwmityu.exe File opened for modification C:\Windows\SysWOW64\nuwtrll.exe zgswj.exe File created C:\Windows\SysWOW64\uucxa.exe ocfspk.exe File opened for modification C:\Windows\SysWOW64\ymyjvsiy.exe olqni.exe File opened for modification C:\Windows\SysWOW64\uuqjdqh.exe jifhwbib.exe File opened for modification C:\Windows\SysWOW64\zwydidmh.exe zidbh.exe File opened for modification C:\Windows\SysWOW64\ezyxzfdd.exe iyhlvo.exe File opened for modification C:\Windows\SysWOW64\fsskt.exe nvfuen.exe File created C:\Windows\SysWOW64\ckixt.exe jeeqt.exe File opened for modification C:\Windows\SysWOW64\tcomtmwi.exe xynksxgg.exe File created C:\Windows\SysWOW64\bmqto.exe qqsqhs.exe File opened for modification C:\Windows\SysWOW64\leccnklr.exe cbzhry.exe File created C:\Windows\SysWOW64\tzwzhcsz.exe tafur.exe File opened for modification C:\Windows\SysWOW64\zkfes.exe nkypww.exe File created C:\Windows\SysWOW64\vzvxkdy.exe hrhqmb.exe File created C:\Windows\SysWOW64\jmjpbdus.exe tbnpap.exe File created C:\Windows\SysWOW64\yjtmegt.exe wladb.exe File created C:\Windows\SysWOW64\eyckjon.exe dkeprftk.exe File opened for modification C:\Windows\SysWOW64\gspjqh.exe 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe File created C:\Windows\SysWOW64\jeeqt.exe okluimh.exe -
resource yara_rule behavioral1/memory/3052-0-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/3052-1-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/files/0x000d0000000133b8-8.dat upx behavioral1/memory/3052-15-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/1636-16-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/3052-11-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/3052-13-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/3052-50-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/3052-18-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/3052-17-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/2632-63-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/3052-37-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/3052-38-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/2636-52-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/3052-12-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/3052-73-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/1300-76-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/3052-74-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/3052-78-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/3052-79-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/2636-106-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/1484-92-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/1480-104-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/1636-89-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/2700-116-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/2600-130-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/2284-240-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/2216-272-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/3000-271-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/2764-281-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/3052-278-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/2284-280-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/1236-264-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/2488-261-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/2260-255-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/2112-253-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/2044-247-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/1616-246-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/2044-284-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/1396-239-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/2972-289-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/2260-288-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/3000-233-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/1644-232-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/2488-224-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/2208-223-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/2112-212-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/2344-210-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/1616-200-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/1588-199-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/1396-189-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/2600-188-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/2668-298-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/1236-296-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/1644-178-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/2700-166-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/2208-164-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/2344-154-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/1480-153-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/3052-299-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/1588-142-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/1484-141-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/2656-307-0x0000000031420000-0x0000000031441000-memory.dmp upx behavioral1/memory/3052-300-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iyhlvo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cncoc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uduiy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cuitaio.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tifwv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvgqyl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bawctfk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language koacg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mhcexdn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rnbvbjs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dkjdq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bmqto.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gnbzkc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gspjqh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language umrpllna.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qjnipunf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hrhqmb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ahvet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tvndbo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wbezcnzy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btrlgg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iwmityu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language okluimh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stdvfckc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jecrkxa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yqrbud.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ifgkapej.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxtzkjb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language osvvza.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttwfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctthyy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language akzbxa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language okrtykcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsuvsjkx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uuqjdqh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oofqmz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svrpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language szxqnhje.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ueoxduzx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language emnqau.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stjqqvi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qjaajc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qbyjpeyd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zzaawm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xgfth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xynksxgg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fsskt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ogyws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kzfyzddc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tafur.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zwydidmh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ljeudyn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wladb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jmjpbdus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xozckfyo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qqsqhs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caxxo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhsoi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nuwtrll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gyioeh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ajhyv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jeeqt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language whakdtro.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dznje.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 3052 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe 3052 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe 3052 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe 3052 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe 3052 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe 704 dmglcxiq.exe 704 dmglcxiq.exe 704 dmglcxiq.exe 704 dmglcxiq.exe 704 dmglcxiq.exe 704 dmglcxiq.exe 704 dmglcxiq.exe 704 dmglcxiq.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3052 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe Token: SeDebugPrivilege 3052 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe Token: SeDebugPrivilege 1636 gspjqh.exe Token: SeDebugPrivilege 2636 qjnipunf.exe Token: SeDebugPrivilege 2632 bwpfl.exe Token: SeDebugPrivilege 1300 yqrbud.exe Token: SeDebugPrivilege 1484 ifgkapej.exe Token: SeDebugPrivilege 1480 oofqmz.exe Token: SeDebugPrivilege 2700 kbqrthx.exe Token: SeDebugPrivilege 2600 bqcsyyta.exe Token: SeDebugPrivilege 1588 gyioeh.exe Token: SeDebugPrivilege 2344 cdfpcgvp.exe Token: SeDebugPrivilege 2208 svrpv.exe Token: SeDebugPrivilege 1644 khmvth.exe Token: SeDebugPrivilege 1396 gkincvbb.exe Token: SeDebugPrivilege 1616 tbnpap.exe Token: SeDebugPrivilege 2112 jmjpbdus.exe Token: SeDebugPrivilege 2488 uheqgmgg.exe Token: SeDebugPrivilege 3000 szxqnhje.exe Token: SeDebugPrivilege 2284 ogyws.exe Token: SeDebugPrivilege 2044 rzszw.exe Token: SeDebugPrivilege 2260 mqdqxxg.exe Token: SeDebugPrivilege 1236 txiulnm.exe Token: SeDebugPrivilege 2216 xjyjpofw.exe Token: SeDebugPrivilege 2764 ovudxe.exe Token: SeDebugPrivilege 2972 vgjeh.exe Token: SeDebugPrivilege 2668 iyhlvo.exe Token: SeDebugPrivilege 2656 ezyxzfdd.exe Token: SeDebugPrivilege 1268 tifwv.exe Token: SeDebugPrivilege 1148 mhcexdn.exe Token: SeDebugPrivilege 2032 cncoc.exe Token: SeDebugPrivilege 236 dcbqpq.exe Token: SeDebugPrivilege 3052 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe Token: SeDebugPrivilege 3140 wbezcnzy.exe Token: SeDebugPrivilege 3216 kxlww.exe Token: SeDebugPrivilege 3268 akzbxa.exe Token: SeDebugPrivilege 3312 xclveije.exe Token: SeDebugPrivilege 3364 ueoxduzx.exe Token: SeDebugPrivilege 3400 tfqqwak.exe Token: SeDebugPrivilege 3460 umrpllna.exe Token: SeDebugPrivilege 3512 kzfyzddc.exe Token: SeDebugPrivilege 3556 okrtykcf.exe Token: SeDebugPrivilege 3600 wctjech.exe Token: SeDebugPrivilege 3664 rnbvbjs.exe Token: SeDebugPrivilege 3708 lgbtmrqe.exe Token: SeDebugPrivilege 3760 zzaawm.exe Token: SeDebugPrivilege 3804 kmbmxi.exe Token: SeDebugPrivilege 3852 yuuaod.exe Token: SeDebugPrivilege 3924 ocfspk.exe Token: SeDebugPrivilege 3976 uucxa.exe Token: SeDebugPrivilege 4024 oljgsmpo.exe Token: SeDebugPrivilege 4072 ghndfay.exe Token: SeDebugPrivilege 704 dmglcxiq.exe Token: SeDebugPrivilege 1116 olqni.exe Token: SeDebugPrivilege 824 ymyjvsiy.exe Token: SeDebugPrivilege 2772 oflohet.exe Token: SeDebugPrivilege 2352 tswtrbl.exe Token: SeDebugPrivilege 2944 wemvujqu.exe Token: SeDebugPrivilege 1348 jvgqyl.exe Token: SeDebugPrivilege 1372 ljeudyn.exe Token: SeDebugPrivilege 1036 btrlgg.exe Token: SeDebugPrivilege 2376 uduiy.exe Token: SeDebugPrivilege 3164 ubrqunic.exe Token: SeDebugPrivilege 3244 lsuvsjkx.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3052 wrote to memory of 1636 3052 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe 30 PID 3052 wrote to memory of 1636 3052 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe 30 PID 3052 wrote to memory of 1636 3052 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe 30 PID 3052 wrote to memory of 1636 3052 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe 30 PID 3052 wrote to memory of 1104 3052 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe 19 PID 3052 wrote to memory of 1176 3052 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe 20 PID 3052 wrote to memory of 1200 3052 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe 21 PID 3052 wrote to memory of 1632 3052 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe 25 PID 3052 wrote to memory of 1636 3052 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe 30 PID 3052 wrote to memory of 1636 3052 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe 30 PID 1636 wrote to memory of 2636 1636 gspjqh.exe 31 PID 1636 wrote to memory of 2636 1636 gspjqh.exe 31 PID 1636 wrote to memory of 2636 1636 gspjqh.exe 31 PID 1636 wrote to memory of 2636 1636 gspjqh.exe 31 PID 2636 wrote to memory of 2632 2636 qjnipunf.exe 32 PID 2636 wrote to memory of 2632 2636 qjnipunf.exe 32 PID 2636 wrote to memory of 2632 2636 qjnipunf.exe 32 PID 2636 wrote to memory of 2632 2636 qjnipunf.exe 32 PID 2632 wrote to memory of 1300 2632 bwpfl.exe 33 PID 2632 wrote to memory of 1300 2632 bwpfl.exe 33 PID 2632 wrote to memory of 1300 2632 bwpfl.exe 33 PID 2632 wrote to memory of 1300 2632 bwpfl.exe 33 PID 1300 wrote to memory of 1484 1300 yqrbud.exe 34 PID 1300 wrote to memory of 1484 1300 yqrbud.exe 34 PID 1300 wrote to memory of 1484 1300 yqrbud.exe 34 PID 1300 wrote to memory of 1484 1300 yqrbud.exe 34 PID 1484 wrote to memory of 1480 1484 ifgkapej.exe 35 PID 1484 wrote to memory of 1480 1484 ifgkapej.exe 35 PID 1484 wrote to memory of 1480 1484 ifgkapej.exe 35 PID 1484 wrote to memory of 1480 1484 ifgkapej.exe 35 PID 1480 wrote to memory of 2700 1480 oofqmz.exe 36 PID 1480 wrote to memory of 2700 1480 oofqmz.exe 36 PID 1480 wrote to memory of 2700 1480 oofqmz.exe 36 PID 1480 wrote to memory of 2700 1480 oofqmz.exe 36 PID 2700 wrote to memory of 2600 2700 kbqrthx.exe 37 PID 2700 wrote to memory of 2600 2700 kbqrthx.exe 37 PID 2700 wrote to memory of 2600 2700 kbqrthx.exe 37 PID 2700 wrote to memory of 2600 2700 kbqrthx.exe 37 PID 2600 wrote to memory of 1588 2600 bqcsyyta.exe 38 PID 2600 wrote to memory of 1588 2600 bqcsyyta.exe 38 PID 2600 wrote to memory of 1588 2600 bqcsyyta.exe 38 PID 2600 wrote to memory of 1588 2600 bqcsyyta.exe 38 PID 1588 wrote to memory of 2344 1588 gyioeh.exe 39 PID 1588 wrote to memory of 2344 1588 gyioeh.exe 39 PID 1588 wrote to memory of 2344 1588 gyioeh.exe 39 PID 1588 wrote to memory of 2344 1588 gyioeh.exe 39 PID 2344 wrote to memory of 2208 2344 cdfpcgvp.exe 40 PID 2344 wrote to memory of 2208 2344 cdfpcgvp.exe 40 PID 2344 wrote to memory of 2208 2344 cdfpcgvp.exe 40 PID 2344 wrote to memory of 2208 2344 cdfpcgvp.exe 40 PID 2208 wrote to memory of 1644 2208 svrpv.exe 41 PID 2208 wrote to memory of 1644 2208 svrpv.exe 41 PID 2208 wrote to memory of 1644 2208 svrpv.exe 41 PID 2208 wrote to memory of 1644 2208 svrpv.exe 41 PID 1644 wrote to memory of 1396 1644 khmvth.exe 42 PID 1644 wrote to memory of 1396 1644 khmvth.exe 42 PID 1644 wrote to memory of 1396 1644 khmvth.exe 42 PID 1644 wrote to memory of 1396 1644 khmvth.exe 42 PID 1396 wrote to memory of 1616 1396 gkincvbb.exe 43 PID 1396 wrote to memory of 1616 1396 gkincvbb.exe 43 PID 1396 wrote to memory of 1616 1396 gkincvbb.exe 43 PID 1396 wrote to memory of 1616 1396 gkincvbb.exe 43 PID 1616 wrote to memory of 2112 1616 tbnpap.exe 44 PID 1616 wrote to memory of 2112 1616 tbnpap.exe 44 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dmglcxiq.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1104
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\39771891331f0ec6459645875c89a1f1_JaffaCakes118.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3052 -
C:\Windows\SysWOW64\gspjqh.exeC:\Windows\system32\gspjqh.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\qjnipunf.exeC:\Windows\system32\qjnipunf.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\bwpfl.exeC:\Windows\system32\bwpfl.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\yqrbud.exeC:\Windows\system32\yqrbud.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\ifgkapej.exeC:\Windows\system32\ifgkapej.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\oofqmz.exeC:\Windows\system32\oofqmz.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\kbqrthx.exeC:\Windows\system32\kbqrthx.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\bqcsyyta.exeC:\Windows\system32\bqcsyyta.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\gyioeh.exeC:\Windows\system32\gyioeh.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\SysWOW64\cdfpcgvp.exeC:\Windows\system32\cdfpcgvp.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\svrpv.exeC:\Windows\system32\svrpv.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\khmvth.exeC:\Windows\system32\khmvth.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\gkincvbb.exeC:\Windows\system32\gkincvbb.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\tbnpap.exeC:\Windows\system32\tbnpap.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\jmjpbdus.exeC:\Windows\system32\jmjpbdus.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2112 -
C:\Windows\SysWOW64\uheqgmgg.exeC:\Windows\system32\uheqgmgg.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2488 -
C:\Windows\SysWOW64\szxqnhje.exeC:\Windows\system32\szxqnhje.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3000 -
C:\Windows\SysWOW64\ogyws.exeC:\Windows\system32\ogyws.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2284 -
C:\Windows\SysWOW64\rzszw.exeC:\Windows\system32\rzszw.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2044 -
C:\Windows\SysWOW64\mqdqxxg.exeC:\Windows\system32\mqdqxxg.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2260 -
C:\Windows\SysWOW64\txiulnm.exeC:\Windows\system32\txiulnm.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1236 -
C:\Windows\SysWOW64\xjyjpofw.exeC:\Windows\system32\xjyjpofw.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2216 -
C:\Windows\SysWOW64\ovudxe.exeC:\Windows\system32\ovudxe.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2764 -
C:\Windows\SysWOW64\vgjeh.exeC:\Windows\system32\vgjeh.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2972 -
C:\Windows\SysWOW64\iyhlvo.exeC:\Windows\system32\iyhlvo.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2668 -
C:\Windows\SysWOW64\ezyxzfdd.exeC:\Windows\system32\ezyxzfdd.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2656 -
C:\Windows\SysWOW64\tifwv.exeC:\Windows\system32\tifwv.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1268 -
C:\Windows\SysWOW64\mhcexdn.exeC:\Windows\system32\mhcexdn.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1148 -
C:\Windows\SysWOW64\cncoc.exeC:\Windows\system32\cncoc.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2032 -
C:\Windows\SysWOW64\dcbqpq.exeC:\Windows\system32\dcbqpq.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:236 -
C:\Windows\SysWOW64\wbezcnzy.exeC:\Windows\system32\wbezcnzy.exe33⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3140 -
C:\Windows\SysWOW64\kxlww.exeC:\Windows\system32\kxlww.exe34⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3216 -
C:\Windows\SysWOW64\akzbxa.exeC:\Windows\system32\akzbxa.exe35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3268 -
C:\Windows\SysWOW64\xclveije.exeC:\Windows\system32\xclveije.exe36⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3312 -
C:\Windows\SysWOW64\ueoxduzx.exeC:\Windows\system32\ueoxduzx.exe37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3364 -
C:\Windows\SysWOW64\tfqqwak.exeC:\Windows\system32\tfqqwak.exe38⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3400 -
C:\Windows\SysWOW64\umrpllna.exeC:\Windows\system32\umrpllna.exe39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3460 -
C:\Windows\SysWOW64\kzfyzddc.exeC:\Windows\system32\kzfyzddc.exe40⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3512 -
C:\Windows\SysWOW64\okrtykcf.exeC:\Windows\system32\okrtykcf.exe41⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3556 -
C:\Windows\SysWOW64\wctjech.exeC:\Windows\system32\wctjech.exe42⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:3600 -
C:\Windows\SysWOW64\rnbvbjs.exeC:\Windows\system32\rnbvbjs.exe43⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3664 -
C:\Windows\SysWOW64\lgbtmrqe.exeC:\Windows\system32\lgbtmrqe.exe44⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3708 -
C:\Windows\SysWOW64\zzaawm.exeC:\Windows\system32\zzaawm.exe45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3760 -
C:\Windows\SysWOW64\kmbmxi.exeC:\Windows\system32\kmbmxi.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3804 -
C:\Windows\SysWOW64\yuuaod.exeC:\Windows\system32\yuuaod.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3852 -
C:\Windows\SysWOW64\ocfspk.exeC:\Windows\system32\ocfspk.exe48⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3924 -
C:\Windows\SysWOW64\uucxa.exeC:\Windows\system32\uucxa.exe49⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3976 -
C:\Windows\SysWOW64\oljgsmpo.exeC:\Windows\system32\oljgsmpo.exe50⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4024 -
C:\Windows\SysWOW64\ghndfay.exeC:\Windows\system32\ghndfay.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4072 -
C:\Windows\SysWOW64\dmglcxiq.exeC:\Windows\system32\dmglcxiq.exe52⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Deletes itself
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:704 -
C:\Windows\SysWOW64\olqni.exeC:\Windows\system32\olqni.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1116 -
C:\Windows\SysWOW64\ymyjvsiy.exeC:\Windows\system32\ymyjvsiy.exe54⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:824 -
C:\Windows\SysWOW64\oflohet.exeC:\Windows\system32\oflohet.exe55⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2772 -
C:\Windows\SysWOW64\tswtrbl.exeC:\Windows\system32\tswtrbl.exe56⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2352 -
C:\Windows\SysWOW64\wemvujqu.exeC:\Windows\system32\wemvujqu.exe57⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2944 -
C:\Windows\SysWOW64\jvgqyl.exeC:\Windows\system32\jvgqyl.exe58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1348 -
C:\Windows\SysWOW64\ljeudyn.exeC:\Windows\system32\ljeudyn.exe59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1372 -
C:\Windows\SysWOW64\btrlgg.exeC:\Windows\system32\btrlgg.exe60⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1036 -
C:\Windows\SysWOW64\uduiy.exeC:\Windows\system32\uduiy.exe61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2376 -
C:\Windows\SysWOW64\ubrqunic.exeC:\Windows\system32\ubrqunic.exe62⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3164 -
C:\Windows\SysWOW64\lsuvsjkx.exeC:\Windows\system32\lsuvsjkx.exe63⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3244 -
C:\Windows\SysWOW64\xgfth.exeC:\Windows\system32\xgfth.exe64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3308 -
C:\Windows\SysWOW64\qvdcti.exeC:\Windows\system32\qvdcti.exe65⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:3416 -
C:\Windows\SysWOW64\whzxblj.exeC:\Windows\system32\whzxblj.exe66⤵
- Executes dropped EXE
PID:3488 -
C:\Windows\SysWOW64\jfxzw.exeC:\Windows\system32\jfxzw.exe67⤵
- Adds Run key to start application
PID:3572 -
C:\Windows\SysWOW64\qhvsqem.exeC:\Windows\system32\qhvsqem.exe68⤵
- Drops file in System32 directory
PID:3676 -
C:\Windows\SysWOW64\tafur.exeC:\Windows\system32\tafur.exe69⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3736 -
C:\Windows\SysWOW64\tzwzhcsz.exeC:\Windows\system32\tzwzhcsz.exe70⤵
- Adds Run key to start application
PID:3788 -
C:\Windows\SysWOW64\wladb.exeC:\Windows\system32\wladb.exe71⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3860 -
C:\Windows\SysWOW64\yjtmegt.exeC:\Windows\system32\yjtmegt.exe72⤵PID:3872
-
C:\Windows\SysWOW64\vdqoqju.exeC:\Windows\system32\vdqoqju.exe73⤵
- Adds Run key to start application
PID:4580 -
C:\Windows\SysWOW64\vyxtyffr.exeC:\Windows\system32\vyxtyffr.exe74⤵PID:4632
-
C:\Windows\SysWOW64\tzxyl.exeC:\Windows\system32\tzxyl.exe75⤵PID:4680
-
C:\Windows\SysWOW64\unrjwjt.exeC:\Windows\system32\unrjwjt.exe76⤵PID:4724
-
C:\Windows\SysWOW64\dkjdq.exeC:\Windows\system32\dkjdq.exe77⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4768 -
C:\Windows\SysWOW64\ihkcgnsp.exeC:\Windows\system32\ihkcgnsp.exe78⤵
- Adds Run key to start application
PID:4808 -
C:\Windows\SysWOW64\nkypww.exeC:\Windows\system32\nkypww.exe79⤵
- Drops file in System32 directory
PID:4848 -
C:\Windows\SysWOW64\zkfes.exeC:\Windows\system32\zkfes.exe80⤵PID:4892
-
C:\Windows\SysWOW64\iwmityu.exeC:\Windows\system32\iwmityu.exe81⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4948 -
C:\Windows\SysWOW64\qzzcqfh.exeC:\Windows\system32\qzzcqfh.exe82⤵
- Adds Run key to start application
PID:5000 -
C:\Windows\SysWOW64\xynksxgg.exeC:\Windows\system32\xynksxgg.exe83⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5036 -
C:\Windows\SysWOW64\tcomtmwi.exeC:\Windows\system32\tcomtmwi.exe84⤵PID:5080
-
C:\Windows\SysWOW64\emnqau.exeC:\Windows\system32\emnqau.exe85⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2884 -
C:\Windows\SysWOW64\jsvudkha.exeC:\Windows\system32\jsvudkha.exe86⤵
- Adds Run key to start application
PID:1784 -
C:\Windows\SysWOW64\ajhyv.exeC:\Windows\system32\ajhyv.exe87⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:980 -
C:\Windows\SysWOW64\zlqjebi.exeC:\Windows\system32\zlqjebi.exe88⤵PID:1060
-
C:\Windows\SysWOW64\xozckfyo.exeC:\Windows\system32\xozckfyo.exe89⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3104 -
C:\Windows\SysWOW64\wcvtpcqq.exeC:\Windows\system32\wcvtpcqq.exe90⤵PID:3288
-
C:\Windows\SysWOW64\rcfdsysg.exeC:\Windows\system32\rcfdsysg.exe91⤵PID:3632
-
C:\Windows\SysWOW64\cuitaio.exeC:\Windows\system32\cuitaio.exe92⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1964 -
C:\Windows\SysWOW64\nfdrlc.exeC:\Windows\system32\nfdrlc.exe93⤵
- Adds Run key to start application
PID:3552 -
C:\Windows\SysWOW64\hrhqmb.exeC:\Windows\system32\hrhqmb.exe94⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3940 -
C:\Windows\SysWOW64\vzvxkdy.exeC:\Windows\system32\vzvxkdy.exe95⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:3744 -
C:\Windows\SysWOW64\qqsqhs.exeC:\Windows\system32\qqsqhs.exe96⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3196 -
C:\Windows\SysWOW64\bmqto.exeC:\Windows\system32\bmqto.exe97⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2404 -
C:\Windows\SysWOW64\ujvkz.exeC:\Windows\system32\ujvkz.exe98⤵
- Adds Run key to start application
PID:4128 -
C:\Windows\SysWOW64\nvfuen.exeC:\Windows\system32\nvfuen.exe99⤵
- Drops file in System32 directory
PID:4200 -
C:\Windows\SysWOW64\fsskt.exeC:\Windows\system32\fsskt.exe100⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4272 -
C:\Windows\SysWOW64\rxtzkjb.exeC:\Windows\system32\rxtzkjb.exe101⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4328 -
C:\Windows\SysWOW64\osvvza.exeC:\Windows\system32\osvvza.exe102⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4388 -
C:\Windows\SysWOW64\bawctfk.exeC:\Windows\system32\bawctfk.exe103⤵
- System Location Discovery: System Language Discovery
PID:4468 -
C:\Windows\SysWOW64\jifhwbib.exeC:\Windows\system32\jifhwbib.exe104⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2116 -
C:\Windows\SysWOW64\uuqjdqh.exeC:\Windows\system32\uuqjdqh.exe105⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4648 -
C:\Windows\SysWOW64\drinrt.exeC:\Windows\system32\drinrt.exe106⤵PID:4736
-
C:\Windows\SysWOW64\stjqqvi.exeC:\Windows\system32\stjqqvi.exe107⤵
- System Location Discovery: System Language Discovery
PID:4780 -
C:\Windows\SysWOW64\vckns.exeC:\Windows\system32\vckns.exe108⤵
- Adds Run key to start application
PID:4872 -
C:\Windows\SysWOW64\palkpic.exeC:\Windows\system32\palkpic.exe109⤵
- Drops file in System32 directory
PID:4932 -
C:\Windows\SysWOW64\koacg.exeC:\Windows\system32\koacg.exe110⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4980 -
C:\Windows\SysWOW64\okluimh.exeC:\Windows\system32\okluimh.exe111⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5052 -
C:\Windows\SysWOW64\jeeqt.exeC:\Windows\system32\jeeqt.exe112⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5116 -
C:\Windows\SysWOW64\ckixt.exeC:\Windows\system32\ckixt.exe113⤵
- Adds Run key to start application
PID:4992 -
C:\Windows\SysWOW64\qjaajc.exeC:\Windows\system32\qjaajc.exe114⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1812 -
C:\Windows\SysWOW64\ahvet.exeC:\Windows\system32\ahvet.exe115⤵
- System Location Discovery: System Language Discovery
PID:3340 -
C:\Windows\SysWOW64\caxxo.exeC:\Windows\system32\caxxo.exe116⤵
- System Location Discovery: System Language Discovery
PID:3772 -
C:\Windows\SysWOW64\ttwfr.exeC:\Windows\system32\ttwfr.exe117⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3236 -
C:\Windows\SysWOW64\nzxuw.exeC:\Windows\system32\nzxuw.exe118⤵
- Adds Run key to start application
PID:2864 -
C:\Windows\SysWOW64\wdcvzlvc.exeC:\Windows\system32\wdcvzlvc.exe119⤵
- Adds Run key to start application
PID:3956 -
C:\Windows\SysWOW64\fhelasuk.exeC:\Windows\system32\fhelasuk.exe120⤵
- Drops file in System32 directory
PID:4068 -
C:\Windows\SysWOW64\qbyjpeyd.exeC:\Windows\system32\qbyjpeyd.exe121⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1948 -
C:\Windows\SysWOW64\pckhcv.exeC:\Windows\system32\pckhcv.exe122⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:4164
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-