Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 08:09
Static task
static1
Behavioral task
behavioral1
Sample
3ebb8c2a94a2ce51f752cd809fd3d697_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3ebb8c2a94a2ce51f752cd809fd3d697_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3ebb8c2a94a2ce51f752cd809fd3d697_JaffaCakes118.exe
-
Size
269KB
-
MD5
3ebb8c2a94a2ce51f752cd809fd3d697
-
SHA1
44f8da9685fa727dcd0546e3b75a86e06bc4a6ca
-
SHA256
88a6a4a7d032aa408de5f31093239c4955234af819322983673ba2c098d09318
-
SHA512
1130b6dfc6ea57692a16bef462308502c9369e9e7589eb7f8252b597088e81a3e6ba26cd9c28f469c623e7f6074146063223b9a28a035dc8c8844f6974cf6bbd
-
SSDEEP
3072:ZYUb5QoJ4g+Ri+Zj6Iz1ZdW4SrO7FSVpuJOJ:ZY7xh6SZI4z7FSVpuJg
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2760 cmd.exe -
Executes dropped EXE 64 IoCs
pid Process 2704 wppetwy.exe 2092 wrcysm.exe 2512 wydh.exe 1808 wldt.exe 3068 wgkdc.exe 1820 wuy.exe 1656 wedhnj.exe 2084 wit.exe 1492 wqtkndmxd.exe 2344 wdvydydvs.exe 1528 wryhn.exe 1924 wyaymvl.exe 2464 wifw.exe 2600 wpf.exe 1628 wxuvo.exe 1264 wlvkgfh.exe 952 wckynp.exe 1668 wlmqmufnw.exe 2872 whgos.exe 1736 wtieit.exe 1716 wcx.exe 2952 wcvd.exe 1000 wyjnys.exe 1804 wuiidu.exe 956 waytehf.exe 544 whyle.exe 2064 woptwru.exe 2776 wtu.exe 1532 wwlf.exe 1940 wolqa.exe 2352 wromir.exe 2128 wfxbcwvp.exe 1200 wvivp.exe 1092 wfntco.exe 848 wbcea.exe 2536 wwtwtuvy.exe 2168 wsg.exe 2224 wxlryriu.exe 792 wcqssevm.exe 1596 wlwdcysg.exe 2396 wunlueu.exe 1368 wlcydngjd.exe 2680 wfeedw.exe 2504 wwhxsuod.exe 2920 wsvjsvc.exe 2720 wxlutjbh.exe 2724 wuafsk.exe 1520 wtqtdf.exe 648 wcsmdlvg.exe 1040 wcestenqr.exe 2036 wdckpw.exe 2544 wuqyxgcb.exe 2492 wjcju.exe 2876 wtqus.exe 2168 wldjyav.exe 1752 wuhwsao.exe 2692 wvxldu.exe 1272 wrmvc.exe 2472 wybetba.exe 600 wbhauom.exe 2280 winwwoip.exe 2308 wvnkolan.exe 3004 waxerpwqj.exe 2648 wwwaxqvbv.exe -
Loads dropped DLL 64 IoCs
pid Process 2168 3ebb8c2a94a2ce51f752cd809fd3d697_JaffaCakes118.exe 2168 3ebb8c2a94a2ce51f752cd809fd3d697_JaffaCakes118.exe 2168 3ebb8c2a94a2ce51f752cd809fd3d697_JaffaCakes118.exe 2168 3ebb8c2a94a2ce51f752cd809fd3d697_JaffaCakes118.exe 2704 wppetwy.exe 2704 wppetwy.exe 2704 wppetwy.exe 2704 wppetwy.exe 2092 wrcysm.exe 2092 wrcysm.exe 2092 wrcysm.exe 2092 wrcysm.exe 2512 wydh.exe 2512 wydh.exe 2512 wydh.exe 2512 wydh.exe 1808 wldt.exe 1808 wldt.exe 1808 wldt.exe 1808 wldt.exe 3068 wgkdc.exe 3068 wgkdc.exe 3068 wgkdc.exe 3068 wgkdc.exe 1820 wuy.exe 1820 wuy.exe 1820 wuy.exe 1820 wuy.exe 1656 wedhnj.exe 1656 wedhnj.exe 1656 wedhnj.exe 1656 wedhnj.exe 2084 wit.exe 2084 wit.exe 2084 wit.exe 2084 wit.exe 1492 wqtkndmxd.exe 1492 wqtkndmxd.exe 1492 wqtkndmxd.exe 1492 wqtkndmxd.exe 2344 wdvydydvs.exe 2344 wdvydydvs.exe 2344 wdvydydvs.exe 2344 wdvydydvs.exe 2652 WerFault.exe 2652 WerFault.exe 2652 WerFault.exe 1528 wryhn.exe 1528 wryhn.exe 1528 wryhn.exe 1528 wryhn.exe 1924 wyaymvl.exe 1924 wyaymvl.exe 1924 wyaymvl.exe 1924 wyaymvl.exe 2464 wifw.exe 2464 wifw.exe 2464 wifw.exe 2464 wifw.exe 2600 wpf.exe 2600 wpf.exe 2600 wpf.exe 2600 wpf.exe 1628 wxuvo.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\wit.exe wedhnj.exe File opened for modification C:\Windows\SysWOW64\whgos.exe wlmqmufnw.exe File created C:\Windows\SysWOW64\wbhauom.exe wybetba.exe File opened for modification C:\Windows\SysWOW64\wewcra.exe wktmy.exe File opened for modification C:\Windows\SysWOW64\wsvjsvc.exe wwhxsuod.exe File opened for modification C:\Windows\SysWOW64\wdckpw.exe wcestenqr.exe File opened for modification C:\Windows\SysWOW64\wykkxy.exe wxkrag.exe File created C:\Windows\SysWOW64\wvoxngdos.exe wfhyarc.exe File opened for modification C:\Windows\SysWOW64\wxlutjbh.exe wsvjsvc.exe File created C:\Windows\SysWOW64\waxerpwqj.exe wvnkolan.exe File opened for modification C:\Windows\SysWOW64\wcestenqr.exe wcsmdlvg.exe File created C:\Windows\SysWOW64\wdvcnsggj.exe wmneacg.exe File opened for modification C:\Windows\SysWOW64\wchjfo.exe wykkxy.exe File opened for modification C:\Windows\SysWOW64\wtieit.exe whgos.exe File created C:\Windows\SysWOW64\wfntco.exe wvivp.exe File created C:\Windows\SysWOW64\wlcydngjd.exe wunlueu.exe File created C:\Windows\SysWOW64\wdvydydvs.exe wqtkndmxd.exe File opened for modification C:\Windows\SysWOW64\wpf.exe wifw.exe File opened for modification C:\Windows\SysWOW64\wgrdqi.exe wnoyp.exe File created C:\Windows\SysWOW64\wvioajad.exe wjtjq.exe File created C:\Windows\SysWOW64\wbcea.exe wfntco.exe File opened for modification C:\Windows\SysWOW64\wfeedw.exe wlcydngjd.exe File opened for modification C:\Windows\SysWOW64\wtqus.exe wwblto.exe File opened for modification C:\Windows\SysWOW64\wmodmsdt.exe wikbqgpd.exe File opened for modification C:\Windows\SysWOW64\wqqnu.exe wewcra.exe File opened for modification C:\Windows\SysWOW64\wfjvp.exe wqqnu.exe File opened for modification C:\Windows\SysWOW64\wckynp.exe wlvkgfh.exe File created C:\Windows\SysWOW64\wtieit.exe whgos.exe File opened for modification C:\Windows\SysWOW64\wtweoqy.exe wqotbcj.exe File created C:\Windows\SysWOW64\whgos.exe wlmqmufnw.exe File opened for modification C:\Windows\SysWOW64\wcx.exe wtieit.exe File created C:\Windows\SysWOW64\wfeedw.exe wlcydngjd.exe File created C:\Windows\SysWOW64\whnlmvq.exe wfjsbf.exe File opened for modification C:\Windows\SysWOW64\wjhqbde.exe wwaof.exe File created C:\Windows\SysWOW64\wqitsyr.exe wbpl.exe File created C:\Windows\SysWOW64\wqtkndmxd.exe wit.exe File opened for modification C:\Windows\SysWOW64\waytehf.exe wuiidu.exe File created C:\Windows\SysWOW64\wpcgya.exe wiela.exe File created C:\Windows\SysWOW64\wfjvp.exe wqqnu.exe File opened for modification C:\Windows\SysWOW64\wydh.exe wrcysm.exe File created C:\Windows\SysWOW64\wwwaxqvbv.exe waxerpwqj.exe File opened for modification C:\Windows\SysWOW64\wnoyp.exe wkneimc.exe File created C:\Windows\SysWOW64\wgrdqi.exe wnoyp.exe File created C:\Windows\SysWOW64\wmodmsdt.exe wikbqgpd.exe File created C:\Windows\SysWOW64\wktmy.exe wyabwsp.exe File created C:\Windows\SysWOW64\waytehf.exe wuiidu.exe File created C:\Windows\SysWOW64\wldjyav.exe wtqus.exe File created C:\Windows\SysWOW64\wchjfo.exe wykkxy.exe File opened for modification C:\Windows\SysWOW64\wiela.exe wxbnque.exe File created C:\Windows\SysWOW64\wuy.exe wgkdc.exe File opened for modification C:\Windows\SysWOW64\wdvcnsggj.exe wmneacg.exe File created C:\Windows\SysWOW64\wfdy.exe wnokhrl.exe File created C:\Windows\SysWOW64\wryahd.exe wmodmsdt.exe File created C:\Windows\SysWOW64\wqqnu.exe wewcra.exe File opened for modification C:\Windows\SysWOW64\waxerpwqj.exe wvnkolan.exe File opened for modification C:\Windows\SysWOW64\wfjsbf.exe wgrdqi.exe File opened for modification C:\Windows\SysWOW64\wuiidu.exe wyjnys.exe File created C:\Windows\SysWOW64\wdckpw.exe wcestenqr.exe File opened for modification C:\Windows\SysWOW64\wfxbcwvp.exe wromir.exe File opened for modification C:\Windows\SysWOW64\wjtjq.exe wfdy.exe File created C:\Windows\SysWOW64\wfyvh.exe wnjiyot.exe File created C:\Windows\SysWOW64\wtcvue.exe whijqfkd.exe File created C:\Windows\SysWOW64\woirnuavb.exe wfjvp.exe File opened for modification C:\Windows\SysWOW64\wppetwy.exe 3ebb8c2a94a2ce51f752cd809fd3d697_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 7 IoCs
pid pid_target Process procid_target 2652 2344 WerFault.exe 58 1816 2536 WerFault.exe 138 1780 1596 WerFault.exe 152 2324 2280 WerFault.exe 220 1608 1264 WerFault.exe 248 2988 952 WerFault.exe 345 2316 2140 WerFault.exe 376 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wjcju.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wkmrwrjk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wppetwy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wavm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlvkgfh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wvivp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wvxldu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlwdcysg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wfccmpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wolqa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wywnsyl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnjiyot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wktmy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wybetba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wtqus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsmdlvg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiela.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wxuvo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wykkxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wtcvue.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wsvjsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuhwsao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuiidu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wbfkndc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wrvopn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmodmsdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wajtjrd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wkqmjhk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wgkdc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wfdy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wjhqbde.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1596 wlwdcysg.exe 952 wqotbcj.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2704 2168 3ebb8c2a94a2ce51f752cd809fd3d697_JaffaCakes118.exe 31 PID 2168 wrote to memory of 2704 2168 3ebb8c2a94a2ce51f752cd809fd3d697_JaffaCakes118.exe 31 PID 2168 wrote to memory of 2704 2168 3ebb8c2a94a2ce51f752cd809fd3d697_JaffaCakes118.exe 31 PID 2168 wrote to memory of 2704 2168 3ebb8c2a94a2ce51f752cd809fd3d697_JaffaCakes118.exe 31 PID 2168 wrote to memory of 2760 2168 3ebb8c2a94a2ce51f752cd809fd3d697_JaffaCakes118.exe 32 PID 2168 wrote to memory of 2760 2168 3ebb8c2a94a2ce51f752cd809fd3d697_JaffaCakes118.exe 32 PID 2168 wrote to memory of 2760 2168 3ebb8c2a94a2ce51f752cd809fd3d697_JaffaCakes118.exe 32 PID 2168 wrote to memory of 2760 2168 3ebb8c2a94a2ce51f752cd809fd3d697_JaffaCakes118.exe 32 PID 2704 wrote to memory of 2092 2704 wppetwy.exe 34 PID 2704 wrote to memory of 2092 2704 wppetwy.exe 34 PID 2704 wrote to memory of 2092 2704 wppetwy.exe 34 PID 2704 wrote to memory of 2092 2704 wppetwy.exe 34 PID 2704 wrote to memory of 2784 2704 wppetwy.exe 35 PID 2704 wrote to memory of 2784 2704 wppetwy.exe 35 PID 2704 wrote to memory of 2784 2704 wppetwy.exe 35 PID 2704 wrote to memory of 2784 2704 wppetwy.exe 35 PID 2092 wrote to memory of 2512 2092 wrcysm.exe 37 PID 2092 wrote to memory of 2512 2092 wrcysm.exe 37 PID 2092 wrote to memory of 2512 2092 wrcysm.exe 37 PID 2092 wrote to memory of 2512 2092 wrcysm.exe 37 PID 2092 wrote to memory of 2352 2092 wrcysm.exe 38 PID 2092 wrote to memory of 2352 2092 wrcysm.exe 38 PID 2092 wrote to memory of 2352 2092 wrcysm.exe 38 PID 2092 wrote to memory of 2352 2092 wrcysm.exe 38 PID 2512 wrote to memory of 1808 2512 wydh.exe 40 PID 2512 wrote to memory of 1808 2512 wydh.exe 40 PID 2512 wrote to memory of 1808 2512 wydh.exe 40 PID 2512 wrote to memory of 1808 2512 wydh.exe 40 PID 2512 wrote to memory of 620 2512 wydh.exe 41 PID 2512 wrote to memory of 620 2512 wydh.exe 41 PID 2512 wrote to memory of 620 2512 wydh.exe 41 PID 2512 wrote to memory of 620 2512 wydh.exe 41 PID 1808 wrote to memory of 3068 1808 wldt.exe 43 PID 1808 wrote to memory of 3068 1808 wldt.exe 43 PID 1808 wrote to memory of 3068 1808 wldt.exe 43 PID 1808 wrote to memory of 3068 1808 wldt.exe 43 PID 1808 wrote to memory of 1648 1808 wldt.exe 44 PID 1808 wrote to memory of 1648 1808 wldt.exe 44 PID 1808 wrote to memory of 1648 1808 wldt.exe 44 PID 1808 wrote to memory of 1648 1808 wldt.exe 44 PID 3068 wrote to memory of 1820 3068 wgkdc.exe 46 PID 3068 wrote to memory of 1820 3068 wgkdc.exe 46 PID 3068 wrote to memory of 1820 3068 wgkdc.exe 46 PID 3068 wrote to memory of 1820 3068 wgkdc.exe 46 PID 3068 wrote to memory of 2584 3068 wgkdc.exe 47 PID 3068 wrote to memory of 2584 3068 wgkdc.exe 47 PID 3068 wrote to memory of 2584 3068 wgkdc.exe 47 PID 3068 wrote to memory of 2584 3068 wgkdc.exe 47 PID 1820 wrote to memory of 1656 1820 wuy.exe 49 PID 1820 wrote to memory of 1656 1820 wuy.exe 49 PID 1820 wrote to memory of 1656 1820 wuy.exe 49 PID 1820 wrote to memory of 1656 1820 wuy.exe 49 PID 1820 wrote to memory of 580 1820 wuy.exe 50 PID 1820 wrote to memory of 580 1820 wuy.exe 50 PID 1820 wrote to memory of 580 1820 wuy.exe 50 PID 1820 wrote to memory of 580 1820 wuy.exe 50 PID 1656 wrote to memory of 2084 1656 wedhnj.exe 52 PID 1656 wrote to memory of 2084 1656 wedhnj.exe 52 PID 1656 wrote to memory of 2084 1656 wedhnj.exe 52 PID 1656 wrote to memory of 2084 1656 wedhnj.exe 52 PID 1656 wrote to memory of 264 1656 wedhnj.exe 53 PID 1656 wrote to memory of 264 1656 wedhnj.exe 53 PID 1656 wrote to memory of 264 1656 wedhnj.exe 53 PID 1656 wrote to memory of 264 1656 wedhnj.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ebb8c2a94a2ce51f752cd809fd3d697_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3ebb8c2a94a2ce51f752cd809fd3d697_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\wppetwy.exe"C:\Windows\system32\wppetwy.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\wrcysm.exe"C:\Windows\system32\wrcysm.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\wydh.exe"C:\Windows\system32\wydh.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\wldt.exe"C:\Windows\system32\wldt.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\wgkdc.exe"C:\Windows\system32\wgkdc.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\wuy.exe"C:\Windows\system32\wuy.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\wedhnj.exe"C:\Windows\system32\wedhnj.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\wit.exe"C:\Windows\system32\wit.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2084 -
C:\Windows\SysWOW64\wqtkndmxd.exe"C:\Windows\system32\wqtkndmxd.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1492 -
C:\Windows\SysWOW64\wdvydydvs.exe"C:\Windows\system32\wdvydydvs.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2344 -
C:\Windows\SysWOW64\wryhn.exe"C:\Windows\system32\wryhn.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1528 -
C:\Windows\SysWOW64\wyaymvl.exe"C:\Windows\system32\wyaymvl.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1924 -
C:\Windows\SysWOW64\wifw.exe"C:\Windows\system32\wifw.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2464 -
C:\Windows\SysWOW64\wpf.exe"C:\Windows\system32\wpf.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2600 -
C:\Windows\SysWOW64\wxuvo.exe"C:\Windows\system32\wxuvo.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1628 -
C:\Windows\SysWOW64\wlvkgfh.exe"C:\Windows\system32\wlvkgfh.exe"17⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1264 -
C:\Windows\SysWOW64\wckynp.exe"C:\Windows\system32\wckynp.exe"18⤵
- Executes dropped EXE
PID:952 -
C:\Windows\SysWOW64\wlmqmufnw.exe"C:\Windows\system32\wlmqmufnw.exe"19⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1668 -
C:\Windows\SysWOW64\whgos.exe"C:\Windows\system32\whgos.exe"20⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2872 -
C:\Windows\SysWOW64\wtieit.exe"C:\Windows\system32\wtieit.exe"21⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1736 -
C:\Windows\SysWOW64\wcx.exe"C:\Windows\system32\wcx.exe"22⤵
- Executes dropped EXE
PID:1716 -
C:\Windows\SysWOW64\wcvd.exe"C:\Windows\system32\wcvd.exe"23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2952 -
C:\Windows\SysWOW64\wyjnys.exe"C:\Windows\system32\wyjnys.exe"24⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1000 -
C:\Windows\SysWOW64\wuiidu.exe"C:\Windows\system32\wuiidu.exe"25⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1804 -
C:\Windows\SysWOW64\waytehf.exe"C:\Windows\system32\waytehf.exe"26⤵
- Executes dropped EXE
PID:956 -
C:\Windows\SysWOW64\whyle.exe"C:\Windows\system32\whyle.exe"27⤵
- Executes dropped EXE
PID:544 -
C:\Windows\SysWOW64\woptwru.exe"C:\Windows\system32\woptwru.exe"28⤵
- Executes dropped EXE
PID:2064 -
C:\Windows\SysWOW64\wtu.exe"C:\Windows\system32\wtu.exe"29⤵
- Executes dropped EXE
PID:2776 -
C:\Windows\SysWOW64\wwlf.exe"C:\Windows\system32\wwlf.exe"30⤵
- Executes dropped EXE
PID:1532 -
C:\Windows\SysWOW64\wolqa.exe"C:\Windows\system32\wolqa.exe"31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1940 -
C:\Windows\SysWOW64\wromir.exe"C:\Windows\system32\wromir.exe"32⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2352 -
C:\Windows\SysWOW64\wfxbcwvp.exe"C:\Windows\system32\wfxbcwvp.exe"33⤵
- Executes dropped EXE
PID:2128 -
C:\Windows\SysWOW64\wvivp.exe"C:\Windows\system32\wvivp.exe"34⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1200 -
C:\Windows\SysWOW64\wfntco.exe"C:\Windows\system32\wfntco.exe"35⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1092 -
C:\Windows\SysWOW64\wbcea.exe"C:\Windows\system32\wbcea.exe"36⤵
- Executes dropped EXE
PID:848 -
C:\Windows\SysWOW64\wwtwtuvy.exe"C:\Windows\system32\wwtwtuvy.exe"37⤵
- Executes dropped EXE
PID:2536 -
C:\Windows\SysWOW64\wsg.exe"C:\Windows\system32\wsg.exe"38⤵
- Executes dropped EXE
PID:2168 -
C:\Windows\SysWOW64\wxlryriu.exe"C:\Windows\system32\wxlryriu.exe"39⤵
- Executes dropped EXE
PID:2224 -
C:\Windows\SysWOW64\wcqssevm.exe"C:\Windows\system32\wcqssevm.exe"40⤵
- Executes dropped EXE
PID:792 -
C:\Windows\SysWOW64\wlwdcysg.exe"C:\Windows\system32\wlwdcysg.exe"41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:1596 -
C:\Windows\SysWOW64\wunlueu.exe"C:\Windows\system32\wunlueu.exe"42⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2396 -
C:\Windows\SysWOW64\wlcydngjd.exe"C:\Windows\system32\wlcydngjd.exe"43⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1368 -
C:\Windows\SysWOW64\wfeedw.exe"C:\Windows\system32\wfeedw.exe"44⤵
- Executes dropped EXE
PID:2680 -
C:\Windows\SysWOW64\wwhxsuod.exe"C:\Windows\system32\wwhxsuod.exe"45⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2504 -
C:\Windows\SysWOW64\wsvjsvc.exe"C:\Windows\system32\wsvjsvc.exe"46⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2920 -
C:\Windows\SysWOW64\wxlutjbh.exe"C:\Windows\system32\wxlutjbh.exe"47⤵
- Executes dropped EXE
PID:2720 -
C:\Windows\SysWOW64\wuafsk.exe"C:\Windows\system32\wuafsk.exe"48⤵
- Executes dropped EXE
PID:2724 -
C:\Windows\SysWOW64\wtqtdf.exe"C:\Windows\system32\wtqtdf.exe"49⤵
- Executes dropped EXE
PID:1520 -
C:\Windows\SysWOW64\wcsmdlvg.exe"C:\Windows\system32\wcsmdlvg.exe"50⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:648 -
C:\Windows\SysWOW64\wcestenqr.exe"C:\Windows\system32\wcestenqr.exe"51⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1040 -
C:\Windows\SysWOW64\wdckpw.exe"C:\Windows\system32\wdckpw.exe"52⤵
- Executes dropped EXE
PID:2036 -
C:\Windows\SysWOW64\wuqyxgcb.exe"C:\Windows\system32\wuqyxgcb.exe"53⤵
- Executes dropped EXE
PID:2544 -
C:\Windows\SysWOW64\wjcju.exe"C:\Windows\system32\wjcju.exe"54⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2492 -
C:\Windows\SysWOW64\wwblto.exe"C:\Windows\system32\wwblto.exe"55⤵
- Drops file in System32 directory
PID:2880 -
C:\Windows\SysWOW64\wtqus.exe"C:\Windows\system32\wtqus.exe"56⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2876 -
C:\Windows\SysWOW64\wldjyav.exe"C:\Windows\system32\wldjyav.exe"57⤵
- Executes dropped EXE
PID:2168 -
C:\Windows\SysWOW64\wuhwsao.exe"C:\Windows\system32\wuhwsao.exe"58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1752 -
C:\Windows\SysWOW64\wvxldu.exe"C:\Windows\system32\wvxldu.exe"59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2692 -
C:\Windows\SysWOW64\wrmvc.exe"C:\Windows\system32\wrmvc.exe"60⤵
- Executes dropped EXE
PID:1272 -
C:\Windows\SysWOW64\wybetba.exe"C:\Windows\system32\wybetba.exe"61⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2472 -
C:\Windows\SysWOW64\wbhauom.exe"C:\Windows\system32\wbhauom.exe"62⤵
- Executes dropped EXE
PID:600 -
C:\Windows\SysWOW64\winwwoip.exe"C:\Windows\system32\winwwoip.exe"63⤵
- Executes dropped EXE
PID:2280 -
C:\Windows\SysWOW64\wvnkolan.exe"C:\Windows\system32\wvnkolan.exe"64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2308 -
C:\Windows\SysWOW64\waxerpwqj.exe"C:\Windows\system32\waxerpwqj.exe"65⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3004 -
C:\Windows\SysWOW64\wwwaxqvbv.exe"C:\Windows\system32\wwwaxqvbv.exe"66⤵
- Executes dropped EXE
PID:2648 -
C:\Windows\SysWOW64\wkneimc.exe"C:\Windows\system32\wkneimc.exe"67⤵
- Drops file in System32 directory
PID:2812 -
C:\Windows\SysWOW64\wnoyp.exe"C:\Windows\system32\wnoyp.exe"68⤵
- Drops file in System32 directory
PID:2272 -
C:\Windows\SysWOW64\wgrdqi.exe"C:\Windows\system32\wgrdqi.exe"69⤵
- Drops file in System32 directory
PID:2864 -
C:\Windows\SysWOW64\wfjsbf.exe"C:\Windows\system32\wfjsbf.exe"70⤵
- Drops file in System32 directory
PID:2356 -
C:\Windows\SysWOW64\whnlmvq.exe"C:\Windows\system32\whnlmvq.exe"71⤵PID:1044
-
C:\Windows\SysWOW64\wudecnxv.exe"C:\Windows\system32\wudecnxv.exe"72⤵PID:1264
-
C:\Windows\SysWOW64\wmfidxwop.exe"C:\Windows\system32\wmfidxwop.exe"73⤵PID:2572
-
C:\Windows\SysWOW64\wnokhrl.exe"C:\Windows\system32\wnokhrl.exe"74⤵
- Drops file in System32 directory
PID:2156 -
C:\Windows\SysWOW64\wfdy.exe"C:\Windows\system32\wfdy.exe"75⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2988 -
C:\Windows\SysWOW64\wjtjq.exe"C:\Windows\system32\wjtjq.exe"76⤵
- Drops file in System32 directory
PID:1160 -
C:\Windows\SysWOW64\wvioajad.exe"C:\Windows\system32\wvioajad.exe"77⤵PID:1948
-
C:\Windows\SysWOW64\wikbqgpd.exe"C:\Windows\system32\wikbqgpd.exe"78⤵
- Drops file in System32 directory
PID:2296 -
C:\Windows\SysWOW64\wmodmsdt.exe"C:\Windows\system32\wmodmsdt.exe"79⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:488 -
C:\Windows\SysWOW64\wryahd.exe"C:\Windows\system32\wryahd.exe"80⤵PID:2088
-
C:\Windows\SysWOW64\wdypw.exe"C:\Windows\system32\wdypw.exe"81⤵PID:2232
-
C:\Windows\SysWOW64\wvayeo.exe"C:\Windows\system32\wvayeo.exe"82⤵PID:2804
-
C:\Windows\SysWOW64\wywnsyl.exe"C:\Windows\system32\wywnsyl.exe"83⤵
- System Location Discovery: System Language Discovery
PID:2684 -
C:\Windows\SysWOW64\wajtjrd.exe"C:\Windows\system32\wajtjrd.exe"84⤵
- System Location Discovery: System Language Discovery
PID:2100 -
C:\Windows\SysWOW64\wnjiyot.exe"C:\Windows\system32\wnjiyot.exe"85⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2784 -
C:\Windows\SysWOW64\wfyvh.exe"C:\Windows\system32\wfyvh.exe"86⤵PID:1652
-
C:\Windows\SysWOW64\wmneacg.exe"C:\Windows\system32\wmneacg.exe"87⤵
- Drops file in System32 directory
PID:2840 -
C:\Windows\SysWOW64\wdvcnsggj.exe"C:\Windows\system32\wdvcnsggj.exe"88⤵PID:580
-
C:\Windows\SysWOW64\wvkqucq.exe"C:\Windows\system32\wvkqucq.exe"89⤵PID:596
-
C:\Windows\SysWOW64\wmdyqrc.exe"C:\Windows\system32\wmdyqrc.exe"90⤵PID:1204
-
C:\Windows\SysWOW64\whctut.exe"C:\Windows\system32\whctut.exe"91⤵PID:2448
-
C:\Windows\SysWOW64\wbfkndc.exe"C:\Windows\system32\wbfkndc.exe"92⤵
- System Location Discovery: System Language Discovery
PID:2408 -
C:\Windows\SysWOW64\wxkrag.exe"C:\Windows\system32\wxkrag.exe"93⤵
- Drops file in System32 directory
PID:2912 -
C:\Windows\SysWOW64\wykkxy.exe"C:\Windows\system32\wykkxy.exe"94⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2444 -
C:\Windows\SysWOW64\wchjfo.exe"C:\Windows\system32\wchjfo.exe"95⤵PID:2632
-
C:\Windows\SysWOW64\wxbnque.exe"C:\Windows\system32\wxbnque.exe"96⤵
- Drops file in System32 directory
PID:1160 -
C:\Windows\SysWOW64\wiela.exe"C:\Windows\system32\wiela.exe"97⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2616 -
C:\Windows\SysWOW64\wpcgya.exe"C:\Windows\system32\wpcgya.exe"98⤵PID:2840
-
C:\Windows\SysWOW64\wfhyarc.exe"C:\Windows\system32\wfhyarc.exe"99⤵
- Drops file in System32 directory
PID:1232 -
C:\Windows\SysWOW64\wvoxngdos.exe"C:\Windows\system32\wvoxngdos.exe"100⤵PID:2824
-
C:\Windows\SysWOW64\whijqfkd.exe"C:\Windows\system32\whijqfkd.exe"101⤵
- Drops file in System32 directory
PID:2756 -
C:\Windows\SysWOW64\wtcvue.exe"C:\Windows\system32\wtcvue.exe"102⤵
- System Location Discovery: System Language Discovery
PID:1508 -
C:\Windows\SysWOW64\wavm.exe"C:\Windows\system32\wavm.exe"103⤵
- System Location Discovery: System Language Discovery
PID:2804 -
C:\Windows\SysWOW64\wqotbcj.exe"C:\Windows\system32\wqotbcj.exe"104⤵
- Drops file in System32 directory
- Suspicious use of UnmapMainImage
PID:952 -
C:\Windows\SysWOW64\wtweoqy.exe"C:\Windows\system32\wtweoqy.exe"105⤵PID:2896
-
C:\Windows\SysWOW64\wkqmjhk.exe"C:\Windows\system32\wkqmjhk.exe"106⤵
- System Location Discovery: System Language Discovery
PID:640 -
C:\Windows\SysWOW64\wwaof.exe"C:\Windows\system32\wwaof.exe"107⤵
- Drops file in System32 directory
PID:2860 -
C:\Windows\SysWOW64\wjhqbde.exe"C:\Windows\system32\wjhqbde.exe"108⤵
- System Location Discovery: System Language Discovery
PID:2152 -
C:\Windows\SysWOW64\wyabwsp.exe"C:\Windows\system32\wyabwsp.exe"109⤵
- Drops file in System32 directory
PID:2136 -
C:\Windows\SysWOW64\wktmy.exe"C:\Windows\system32\wktmy.exe"110⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1104 -
C:\Windows\SysWOW64\wewcra.exe"C:\Windows\system32\wewcra.exe"111⤵
- Drops file in System32 directory
PID:1388 -
C:\Windows\SysWOW64\wqqnu.exe"C:\Windows\system32\wqqnu.exe"112⤵
- Drops file in System32 directory
PID:2884 -
C:\Windows\SysWOW64\wfjvp.exe"C:\Windows\system32\wfjvp.exe"113⤵
- Drops file in System32 directory
PID:928 -
C:\Windows\SysWOW64\woirnuavb.exe"C:\Windows\system32\woirnuavb.exe"114⤵PID:2140
-
C:\Windows\SysWOW64\wilhfd.exe"C:\Windows\system32\wilhfd.exe"115⤵PID:2732
-
C:\Windows\SysWOW64\wutjccwge.exe"C:\Windows\system32\wutjccwge.exe"116⤵PID:2556
-
C:\Windows\SysWOW64\wkmrwrjk.exe"C:\Windows\system32\wkmrwrjk.exe"117⤵
- System Location Discovery: System Language Discovery
PID:1124 -
C:\Windows\SysWOW64\wbpl.exe"C:\Windows\system32\wbpl.exe"118⤵
- Drops file in System32 directory
PID:1172 -
C:\Windows\SysWOW64\wqitsyr.exe"C:\Windows\system32\wqitsyr.exe"119⤵PID:2952
-
C:\Windows\SysWOW64\wfccmpd.exe"C:\Windows\system32\wfccmpd.exe"120⤵
- System Location Discovery: System Language Discovery
PID:2988 -
C:\Windows\SysWOW64\wrvopn.exe"C:\Windows\system32\wrvopn.exe"121⤵
- System Location Discovery: System Language Discovery
PID:1604 -
C:\Windows\SysWOW64\wiowke.exe"C:\Windows\system32\wiowke.exe"122⤵PID:2340
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-