Analysis
-
max time kernel
140s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 08:09
Static task
static1
Behavioral task
behavioral1
Sample
3ebb8c2a94a2ce51f752cd809fd3d697_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3ebb8c2a94a2ce51f752cd809fd3d697_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3ebb8c2a94a2ce51f752cd809fd3d697_JaffaCakes118.exe
-
Size
269KB
-
MD5
3ebb8c2a94a2ce51f752cd809fd3d697
-
SHA1
44f8da9685fa727dcd0546e3b75a86e06bc4a6ca
-
SHA256
88a6a4a7d032aa408de5f31093239c4955234af819322983673ba2c098d09318
-
SHA512
1130b6dfc6ea57692a16bef462308502c9369e9e7589eb7f8252b597088e81a3e6ba26cd9c28f469c623e7f6074146063223b9a28a035dc8c8844f6974cf6bbd
-
SSDEEP
3072:ZYUb5QoJ4g+Ri+Zj6Iz1ZdW4SrO7FSVpuJOJ:ZY7xh6SZI4z7FSVpuJg
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wtrxk.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wvqx.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wvcwr.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wmlfs.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wodiccno.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wuvm.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation woedgc.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wokgj.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wwtrnxpgw.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wdusd.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wnmltl.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation waknyo.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wkeouhl.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wlwem.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wwpc.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wcms.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wqqmg.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wlnnkc.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wpw.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wctgg.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wwsjtk.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wkhcoc.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wqkxb.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wnqflbff.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wwupxt.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wtgko.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wbp.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wysuqk.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wxiiijxm.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wbdssrl.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wxioue.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wplgod.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wylsure.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation whveuvla.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wrynwj.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wwtvya.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wtemvn.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation webiw.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wxqfmk.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wsjhrb.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wnrlujgm.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wwgbomj.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wlio.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wxulwx.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wcuoswfpv.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wlwhet.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wnurqhd.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wuelycf.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wqblfes.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wms.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wmti.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wnocqunoo.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wbditsgql.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wat.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wyqdyh.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wrllf.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wuygv.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wtfcrjjp.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wvnutwmq.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wydyemmvl.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wgwhfmt.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wgxa.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wbrdnje.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wxreen.exe -
Executes dropped EXE 64 IoCs
pid Process 4496 wwlssw.exe 1192 wscy.exe 3464 wmk.exe 4920 wsx.exe 4300 wpx.exe 2364 wdxgwggmv.exe 888 wwsjtk.exe 4452 wgwhfmt.exe 1252 wjaci.exe 184 wnrlujgm.exe 636 wvantlc.exe 4964 wkhcoc.exe 4780 whffgd.exe 4992 wrkdsgs.exe 4084 wnurqhd.exe 1936 woedgc.exe 2192 wwpc.exe 1272 wuelycf.exe 456 wuygv.exe 3304 wrxkn.exe 4172 wkmjo.exe 4216 wcms.exe 2764 wvrb.exe 452 whbdtosk.exe 3100 wokgj.exe 2400 wpv.exe 2940 wwu.exe 2108 wlio.exe 4340 webiw.exe 3900 wplgod.exe 2556 wyqdyh.exe 184 wgdeam.exe 5080 wgxa.exe 3760 wmg.exe 4644 whveuvla.exe 4992 wxqfmk.exe 3668 wuqjdl.exe 4568 wxulwx.exe 3964 wxreen.exe 1916 wqqmg.exe 3652 wddwfqq.exe 3840 wnmltl.exe 4736 wdipkaime.exe 3248 wdelhtg.exe 2972 wrynwj.exe 1980 waknyo.exe 3052 wtrxk.exe 4588 wum.exe 2492 wwywrd.exe 448 wwtrnxpgw.exe 4740 wwupxt.exe 4880 wwgbomj.exe 1620 wlnnkc.exe 5100 wwjukawh.exe 3612 wylsure.exe 4876 wvqx.exe 680 wpw.exe 1788 wmhvkybk.exe 3744 wjgacbyh.exe 3212 wms.exe 5104 wywyo.exe 1964 wkeouhl.exe 4584 wvcwr.exe 2960 wmonk.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\wtfcrjjp.exe wqgd.exe File opened for modification C:\Windows\SysWOW64\wquhmjcux.exe wlwhet.exe File created C:\Windows\SysWOW64\wat.exe wqxpoe.exe File opened for modification C:\Windows\SysWOW64\wxreen.exe wxulwx.exe File created C:\Windows\SysWOW64\wkeouhl.exe wywyo.exe File created C:\Windows\SysWOW64\wmlfs.exe wbp.exe File created C:\Windows\SysWOW64\wwtvya.exe wmlfs.exe File opened for modification C:\Windows\SysWOW64\wtemvn.exe wodiccno.exe File created C:\Windows\SysWOW64\wlio.exe wwu.exe File created C:\Windows\SysWOW64\wvvhpni.exe wpkgpil.exe File created C:\Windows\SysWOW64\wuelycf.exe wwpc.exe File created C:\Windows\SysWOW64\wdelhtg.exe wdipkaime.exe File opened for modification C:\Windows\SysWOW64\wbp.exe wmonk.exe File created C:\Windows\SysWOW64\wbditsgql.exe wtemvn.exe File created C:\Windows\SysWOW64\wscy.exe wwlssw.exe File created C:\Windows\SysWOW64\wwjukawh.exe wlnnkc.exe File created C:\Windows\SysWOW64\wylsure.exe wwjukawh.exe File opened for modification C:\Windows\SysWOW64\wrllf.exe wypnyy.exe File opened for modification C:\Windows\SysWOW64\wnlweo.exe whc.exe File opened for modification C:\Windows\SysWOW64\wctgg.exe wfuco.exe File created C:\Windows\SysWOW64\wtmona.exe wqyynmm.exe File opened for modification C:\Windows\SysWOW64\wwsdgub.exe wnqflbff.exe File opened for modification C:\Windows\SysWOW64\wmk.exe wscy.exe File opened for modification C:\Windows\SysWOW64\wwupxt.exe wwtrnxpgw.exe File opened for modification C:\Windows\SysWOW64\wwgbomj.exe wwupxt.exe File opened for modification C:\Windows\SysWOW64\wboo.exe wvnutwmq.exe File created C:\Windows\SysWOW64\wqxlddnbs.exe wnlweo.exe File created C:\Windows\SysWOW64\wispd.exe wnocqunoo.exe File opened for modification C:\Windows\SysWOW64\wpx.exe wsx.exe File created C:\Windows\SysWOW64\wxulwx.exe wuqjdl.exe File opened for modification C:\Windows\SysWOW64\wmti.exe wtox.exe File opened for modification C:\Windows\SysWOW64\wxioue.exe wdusd.exe File opened for modification C:\Windows\SysWOW64\wydyemmvl.exe wsjhrb.exe File opened for modification C:\Windows\SysWOW64\wnqflbff.exe wqmsa.exe File created C:\Windows\SysWOW64\wdxgwggmv.exe wpx.exe File created C:\Windows\SysWOW64\wadrihan.exe wlwem.exe File created C:\Windows\SysWOW64\wtemvn.exe wodiccno.exe File created C:\Windows\SysWOW64\wkhcoc.exe wvantlc.exe File created C:\Windows\SysWOW64\wnqflbff.exe wqmsa.exe File created C:\Windows\SysWOW64\wtajmno.exe wxiiijxm.exe File created C:\Windows\SysWOW64\wgxa.exe wgdeam.exe File created C:\Windows\SysWOW64\wbrdnje.exe wwsdgub.exe File created C:\Windows\SysWOW64\wokgj.exe whbdtosk.exe File opened for modification C:\Windows\SysWOW64\wqqmg.exe wxreen.exe File opened for modification C:\Windows\SysWOW64\wqkxb.exe wtgko.exe File created C:\Windows\SysWOW64\wmg.exe wgxa.exe File created C:\Windows\SysWOW64\woo.exe wtajmno.exe File created C:\Windows\SysWOW64\wqmsa.exe wat.exe File opened for modification C:\Windows\SysWOW64\woedgc.exe wnurqhd.exe File opened for modification C:\Windows\SysWOW64\wbbrrydx.exe wadrihan.exe File opened for modification C:\Windows\SysWOW64\wsx.exe wmk.exe File opened for modification C:\Windows\SysWOW64\wbrdnje.exe wwsdgub.exe File opened for modification C:\Windows\SysWOW64\wat.exe wqxpoe.exe File opened for modification C:\Windows\SysWOW64\wvvhpni.exe wpkgpil.exe File created C:\Windows\SysWOW64\wqetiayq.exe wqblfes.exe File opened for modification C:\Windows\SysWOW64\wrxkn.exe wuygv.exe File opened for modification C:\Windows\SysWOW64\wlnnkc.exe wwgbomj.exe File created C:\Windows\SysWOW64\wplgod.exe webiw.exe File opened for modification C:\Windows\SysWOW64\wms.exe wjgacbyh.exe File created C:\Windows\SysWOW64\wywyo.exe wms.exe File created C:\Windows\SysWOW64\wlwem.exe wrllf.exe File opened for modification C:\Windows\SysWOW64\wbdssrl.exe wpup.exe File created C:\Windows\SysWOW64\wnocqunoo.exe wxioue.exe File created C:\Windows\SysWOW64\wwywrd.exe wum.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Program crash 10 IoCs
pid pid_target Process procid_target 1820 4876 WerFault.exe 255 3564 5104 WerFault.exe 273 1976 1712 WerFault.exe 290 2172 1844 WerFault.exe 349 2264 4632 WerFault.exe 366 3252 4820 WerFault.exe 395 368 2284 WerFault.exe 409 3140 4920 WerFault.exe 417 3464 4860 WerFault.exe 437 4788 4860 WerFault.exe 437 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wgxa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wfkdu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wgdeam.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wwupxt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wkeouhl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnlweo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wqqmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wdelhtg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wjgacbyh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wbdssrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuqjdl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language whffgd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language whveuvla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wywyo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wxreen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wbbrrydx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wxiiijxm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wyqdyh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wtmona.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wdipkaime.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wtemvn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wgwhfmt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wqmsa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wfuco.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wrxkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnurqhd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmonk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wydyemmvl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 512 wrote to memory of 4496 512 3ebb8c2a94a2ce51f752cd809fd3d697_JaffaCakes118.exe 86 PID 512 wrote to memory of 4496 512 3ebb8c2a94a2ce51f752cd809fd3d697_JaffaCakes118.exe 86 PID 512 wrote to memory of 4496 512 3ebb8c2a94a2ce51f752cd809fd3d697_JaffaCakes118.exe 86 PID 512 wrote to memory of 1408 512 3ebb8c2a94a2ce51f752cd809fd3d697_JaffaCakes118.exe 88 PID 512 wrote to memory of 1408 512 3ebb8c2a94a2ce51f752cd809fd3d697_JaffaCakes118.exe 88 PID 512 wrote to memory of 1408 512 3ebb8c2a94a2ce51f752cd809fd3d697_JaffaCakes118.exe 88 PID 4496 wrote to memory of 1192 4496 wwlssw.exe 90 PID 4496 wrote to memory of 1192 4496 wwlssw.exe 90 PID 4496 wrote to memory of 1192 4496 wwlssw.exe 90 PID 4496 wrote to memory of 2464 4496 wwlssw.exe 91 PID 4496 wrote to memory of 2464 4496 wwlssw.exe 91 PID 4496 wrote to memory of 2464 4496 wwlssw.exe 91 PID 1192 wrote to memory of 3464 1192 wscy.exe 93 PID 1192 wrote to memory of 3464 1192 wscy.exe 93 PID 1192 wrote to memory of 3464 1192 wscy.exe 93 PID 1192 wrote to memory of 892 1192 wscy.exe 94 PID 1192 wrote to memory of 892 1192 wscy.exe 94 PID 1192 wrote to memory of 892 1192 wscy.exe 94 PID 3464 wrote to memory of 4920 3464 wmk.exe 96 PID 3464 wrote to memory of 4920 3464 wmk.exe 96 PID 3464 wrote to memory of 4920 3464 wmk.exe 96 PID 3464 wrote to memory of 1784 3464 wmk.exe 97 PID 3464 wrote to memory of 1784 3464 wmk.exe 97 PID 3464 wrote to memory of 1784 3464 wmk.exe 97 PID 4920 wrote to memory of 4300 4920 wsx.exe 99 PID 4920 wrote to memory of 4300 4920 wsx.exe 99 PID 4920 wrote to memory of 4300 4920 wsx.exe 99 PID 4920 wrote to memory of 3572 4920 wsx.exe 100 PID 4920 wrote to memory of 3572 4920 wsx.exe 100 PID 4920 wrote to memory of 3572 4920 wsx.exe 100 PID 4300 wrote to memory of 2364 4300 wpx.exe 102 PID 4300 wrote to memory of 2364 4300 wpx.exe 102 PID 4300 wrote to memory of 2364 4300 wpx.exe 102 PID 4300 wrote to memory of 2804 4300 wpx.exe 103 PID 4300 wrote to memory of 2804 4300 wpx.exe 103 PID 4300 wrote to memory of 2804 4300 wpx.exe 103 PID 2364 wrote to memory of 888 2364 wdxgwggmv.exe 105 PID 2364 wrote to memory of 888 2364 wdxgwggmv.exe 105 PID 2364 wrote to memory of 888 2364 wdxgwggmv.exe 105 PID 2364 wrote to memory of 4640 2364 wdxgwggmv.exe 106 PID 2364 wrote to memory of 4640 2364 wdxgwggmv.exe 106 PID 2364 wrote to memory of 4640 2364 wdxgwggmv.exe 106 PID 888 wrote to memory of 4452 888 wwsjtk.exe 108 PID 888 wrote to memory of 4452 888 wwsjtk.exe 108 PID 888 wrote to memory of 4452 888 wwsjtk.exe 108 PID 888 wrote to memory of 736 888 wwsjtk.exe 109 PID 888 wrote to memory of 736 888 wwsjtk.exe 109 PID 888 wrote to memory of 736 888 wwsjtk.exe 109 PID 4452 wrote to memory of 1252 4452 wgwhfmt.exe 111 PID 4452 wrote to memory of 1252 4452 wgwhfmt.exe 111 PID 4452 wrote to memory of 1252 4452 wgwhfmt.exe 111 PID 4452 wrote to memory of 4060 4452 wgwhfmt.exe 112 PID 4452 wrote to memory of 4060 4452 wgwhfmt.exe 112 PID 4452 wrote to memory of 4060 4452 wgwhfmt.exe 112 PID 1252 wrote to memory of 184 1252 wjaci.exe 114 PID 1252 wrote to memory of 184 1252 wjaci.exe 114 PID 1252 wrote to memory of 184 1252 wjaci.exe 114 PID 1252 wrote to memory of 1052 1252 wjaci.exe 115 PID 1252 wrote to memory of 1052 1252 wjaci.exe 115 PID 1252 wrote to memory of 1052 1252 wjaci.exe 115 PID 184 wrote to memory of 636 184 wnrlujgm.exe 117 PID 184 wrote to memory of 636 184 wnrlujgm.exe 117 PID 184 wrote to memory of 636 184 wnrlujgm.exe 117 PID 184 wrote to memory of 3244 184 wnrlujgm.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ebb8c2a94a2ce51f752cd809fd3d697_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3ebb8c2a94a2ce51f752cd809fd3d697_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Windows\SysWOW64\wwlssw.exe"C:\Windows\system32\wwlssw.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\SysWOW64\wscy.exe"C:\Windows\system32\wscy.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\wmk.exe"C:\Windows\system32\wmk.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Windows\SysWOW64\wsx.exe"C:\Windows\system32\wsx.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\wpx.exe"C:\Windows\system32\wpx.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Windows\SysWOW64\wdxgwggmv.exe"C:\Windows\system32\wdxgwggmv.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\wwsjtk.exe"C:\Windows\system32\wwsjtk.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\SysWOW64\wgwhfmt.exe"C:\Windows\system32\wgwhfmt.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Windows\SysWOW64\wjaci.exe"C:\Windows\system32\wjaci.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\wnrlujgm.exe"C:\Windows\system32\wnrlujgm.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:184 -
C:\Windows\SysWOW64\wvantlc.exe"C:\Windows\system32\wvantlc.exe"12⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:636 -
C:\Windows\SysWOW64\wkhcoc.exe"C:\Windows\system32\wkhcoc.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
PID:4964 -
C:\Windows\SysWOW64\whffgd.exe"C:\Windows\system32\whffgd.exe"14⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4780 -
C:\Windows\SysWOW64\wrkdsgs.exe"C:\Windows\system32\wrkdsgs.exe"15⤵
- Executes dropped EXE
PID:4992 -
C:\Windows\SysWOW64\wnurqhd.exe"C:\Windows\system32\wnurqhd.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4084 -
C:\Windows\SysWOW64\woedgc.exe"C:\Windows\system32\woedgc.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
PID:1936 -
C:\Windows\SysWOW64\wwpc.exe"C:\Windows\system32\wwpc.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:2192 -
C:\Windows\SysWOW64\wuelycf.exe"C:\Windows\system32\wuelycf.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
PID:1272 -
C:\Windows\SysWOW64\wuygv.exe"C:\Windows\system32\wuygv.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:456 -
C:\Windows\SysWOW64\wrxkn.exe"C:\Windows\system32\wrxkn.exe"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3304 -
C:\Windows\SysWOW64\wkmjo.exe"C:\Windows\system32\wkmjo.exe"22⤵
- Executes dropped EXE
PID:4172 -
C:\Windows\SysWOW64\wcms.exe"C:\Windows\system32\wcms.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
PID:4216 -
C:\Windows\SysWOW64\wvrb.exe"C:\Windows\system32\wvrb.exe"24⤵
- Executes dropped EXE
PID:2764 -
C:\Windows\SysWOW64\whbdtosk.exe"C:\Windows\system32\whbdtosk.exe"25⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:452 -
C:\Windows\SysWOW64\wokgj.exe"C:\Windows\system32\wokgj.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
PID:3100 -
C:\Windows\SysWOW64\wpv.exe"C:\Windows\system32\wpv.exe"27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2400 -
C:\Windows\SysWOW64\wwu.exe"C:\Windows\system32\wwu.exe"28⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2940 -
C:\Windows\SysWOW64\wlio.exe"C:\Windows\system32\wlio.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
PID:2108 -
C:\Windows\SysWOW64\webiw.exe"C:\Windows\system32\webiw.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4340 -
C:\Windows\SysWOW64\wplgod.exe"C:\Windows\system32\wplgod.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
PID:3900 -
C:\Windows\SysWOW64\wyqdyh.exe"C:\Windows\system32\wyqdyh.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2556 -
C:\Windows\SysWOW64\wgdeam.exe"C:\Windows\system32\wgdeam.exe"33⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:184 -
C:\Windows\SysWOW64\wgxa.exe"C:\Windows\system32\wgxa.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5080 -
C:\Windows\SysWOW64\wmg.exe"C:\Windows\system32\wmg.exe"35⤵
- Executes dropped EXE
PID:3760 -
C:\Windows\SysWOW64\whveuvla.exe"C:\Windows\system32\whveuvla.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4644 -
C:\Windows\SysWOW64\wxqfmk.exe"C:\Windows\system32\wxqfmk.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
PID:4992 -
C:\Windows\SysWOW64\wuqjdl.exe"C:\Windows\system32\wuqjdl.exe"38⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3668 -
C:\Windows\SysWOW64\wxulwx.exe"C:\Windows\system32\wxulwx.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4568 -
C:\Windows\SysWOW64\wxreen.exe"C:\Windows\system32\wxreen.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3964 -
C:\Windows\SysWOW64\wqqmg.exe"C:\Windows\system32\wqqmg.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1916 -
C:\Windows\SysWOW64\wddwfqq.exe"C:\Windows\system32\wddwfqq.exe"42⤵
- Executes dropped EXE
PID:3652 -
C:\Windows\SysWOW64\wnmltl.exe"C:\Windows\system32\wnmltl.exe"43⤵
- Checks computer location settings
- Executes dropped EXE
PID:3840 -
C:\Windows\SysWOW64\wdipkaime.exe"C:\Windows\system32\wdipkaime.exe"44⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4736 -
C:\Windows\SysWOW64\wdelhtg.exe"C:\Windows\system32\wdelhtg.exe"45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3248 -
C:\Windows\SysWOW64\wrynwj.exe"C:\Windows\system32\wrynwj.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
PID:2972 -
C:\Windows\SysWOW64\waknyo.exe"C:\Windows\system32\waknyo.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
PID:1980 -
C:\Windows\SysWOW64\wtrxk.exe"C:\Windows\system32\wtrxk.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
PID:3052 -
C:\Windows\SysWOW64\wum.exe"C:\Windows\system32\wum.exe"49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4588 -
C:\Windows\SysWOW64\wwywrd.exe"C:\Windows\system32\wwywrd.exe"50⤵
- Executes dropped EXE
PID:2492 -
C:\Windows\SysWOW64\wwtrnxpgw.exe"C:\Windows\system32\wwtrnxpgw.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:448 -
C:\Windows\SysWOW64\wwupxt.exe"C:\Windows\system32\wwupxt.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4740 -
C:\Windows\SysWOW64\wwgbomj.exe"C:\Windows\system32\wwgbomj.exe"53⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4880 -
C:\Windows\SysWOW64\wlnnkc.exe"C:\Windows\system32\wlnnkc.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:1620 -
C:\Windows\SysWOW64\wwjukawh.exe"C:\Windows\system32\wwjukawh.exe"55⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5100 -
C:\Windows\SysWOW64\wylsure.exe"C:\Windows\system32\wylsure.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
PID:3612 -
C:\Windows\SysWOW64\wvqx.exe"C:\Windows\system32\wvqx.exe"57⤵
- Checks computer location settings
- Executes dropped EXE
PID:4876 -
C:\Windows\SysWOW64\wpw.exe"C:\Windows\system32\wpw.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
PID:680 -
C:\Windows\SysWOW64\wmhvkybk.exe"C:\Windows\system32\wmhvkybk.exe"59⤵
- Executes dropped EXE
PID:1788 -
C:\Windows\SysWOW64\wjgacbyh.exe"C:\Windows\system32\wjgacbyh.exe"60⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3744 -
C:\Windows\SysWOW64\wms.exe"C:\Windows\system32\wms.exe"61⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:3212 -
C:\Windows\SysWOW64\wywyo.exe"C:\Windows\system32\wywyo.exe"62⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5104 -
C:\Windows\SysWOW64\wkeouhl.exe"C:\Windows\system32\wkeouhl.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1964 -
C:\Windows\SysWOW64\wvcwr.exe"C:\Windows\system32\wvcwr.exe"64⤵
- Checks computer location settings
- Executes dropped EXE
PID:4584 -
C:\Windows\SysWOW64\wmonk.exe"C:\Windows\system32\wmonk.exe"65⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2960 -
C:\Windows\SysWOW64\wbp.exe"C:\Windows\system32\wbp.exe"66⤵
- Checks computer location settings
- Drops file in System32 directory
PID:3840 -
C:\Windows\SysWOW64\wmlfs.exe"C:\Windows\system32\wmlfs.exe"67⤵
- Checks computer location settings
- Drops file in System32 directory
PID:1712 -
C:\Windows\SysWOW64\wwtvya.exe"C:\Windows\system32\wwtvya.exe"68⤵
- Checks computer location settings
PID:4496 -
C:\Windows\SysWOW64\wjf.exe"C:\Windows\system32\wjf.exe"69⤵PID:3780
-
C:\Windows\SysWOW64\wysuqk.exe"C:\Windows\system32\wysuqk.exe"70⤵
- Checks computer location settings
PID:3716 -
C:\Windows\SysWOW64\wcuoswfpv.exe"C:\Windows\system32\wcuoswfpv.exe"71⤵
- Checks computer location settings
PID:3572 -
C:\Windows\SysWOW64\wypnyy.exe"C:\Windows\system32\wypnyy.exe"72⤵
- Drops file in System32 directory
PID:4992 -
C:\Windows\SysWOW64\wrllf.exe"C:\Windows\system32\wrllf.exe"73⤵
- Checks computer location settings
- Drops file in System32 directory
PID:4232 -
C:\Windows\SysWOW64\wlwem.exe"C:\Windows\system32\wlwem.exe"74⤵
- Checks computer location settings
- Drops file in System32 directory
PID:4888 -
C:\Windows\SysWOW64\wadrihan.exe"C:\Windows\system32\wadrihan.exe"75⤵
- Drops file in System32 directory
PID:840 -
C:\Windows\SysWOW64\wbbrrydx.exe"C:\Windows\system32\wbbrrydx.exe"76⤵
- System Location Discovery: System Language Discovery
PID:5076 -
C:\Windows\SysWOW64\wpup.exe"C:\Windows\system32\wpup.exe"77⤵
- Drops file in System32 directory
PID:4492 -
C:\Windows\SysWOW64\wbdssrl.exe"C:\Windows\system32\wbdssrl.exe"78⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3240 -
C:\Windows\SysWOW64\wpkgpil.exe"C:\Windows\system32\wpkgpil.exe"79⤵
- Drops file in System32 directory
PID:1952 -
C:\Windows\SysWOW64\wvvhpni.exe"C:\Windows\system32\wvvhpni.exe"80⤵PID:2320
-
C:\Windows\SysWOW64\wtox.exe"C:\Windows\system32\wtox.exe"81⤵
- Drops file in System32 directory
PID:2420 -
C:\Windows\SysWOW64\wmti.exe"C:\Windows\system32\wmti.exe"82⤵
- Checks computer location settings
PID:3648 -
C:\Windows\SysWOW64\wvnutwmq.exe"C:\Windows\system32\wvnutwmq.exe"83⤵
- Checks computer location settings
- Drops file in System32 directory
PID:4720 -
C:\Windows\SysWOW64\wboo.exe"C:\Windows\system32\wboo.exe"84⤵PID:1912
-
C:\Windows\SysWOW64\wynr.exe"C:\Windows\system32\wynr.exe"85⤵PID:2568
-
C:\Windows\SysWOW64\wfkdu.exe"C:\Windows\system32\wfkdu.exe"86⤵
- System Location Discovery: System Language Discovery
PID:1844 -
C:\Windows\SysWOW64\whc.exe"C:\Windows\system32\whc.exe"87⤵
- Drops file in System32 directory
PID:988 -
C:\Windows\SysWOW64\wnlweo.exe"C:\Windows\system32\wnlweo.exe"88⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4880 -
C:\Windows\SysWOW64\wqxlddnbs.exe"C:\Windows\system32\wqxlddnbs.exe"89⤵PID:3900
-
C:\Windows\SysWOW64\wdusd.exe"C:\Windows\system32\wdusd.exe"90⤵
- Checks computer location settings
- Drops file in System32 directory
PID:1396 -
C:\Windows\SysWOW64\wxioue.exe"C:\Windows\system32\wxioue.exe"91⤵
- Checks computer location settings
- Drops file in System32 directory
PID:4632 -
C:\Windows\SysWOW64\wnocqunoo.exe"C:\Windows\system32\wnocqunoo.exe"92⤵
- Checks computer location settings
- Drops file in System32 directory
PID:2928 -
C:\Windows\SysWOW64\wispd.exe"C:\Windows\system32\wispd.exe"93⤵PID:1532
-
C:\Windows\SysWOW64\wfuco.exe"C:\Windows\system32\wfuco.exe"94⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4536 -
C:\Windows\SysWOW64\wctgg.exe"C:\Windows\system32\wctgg.exe"95⤵
- Checks computer location settings
PID:4668 -
C:\Windows\SysWOW64\wodiccno.exe"C:\Windows\system32\wodiccno.exe"96⤵
- Checks computer location settings
- Drops file in System32 directory
PID:4144 -
C:\Windows\SysWOW64\wtemvn.exe"C:\Windows\system32\wtemvn.exe"97⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3476 -
C:\Windows\SysWOW64\wbditsgql.exe"C:\Windows\system32\wbditsgql.exe"98⤵
- Checks computer location settings
PID:1560 -
C:\Windows\SysWOW64\wtuohfso.exe"C:\Windows\system32\wtuohfso.exe"99⤵PID:1296
-
C:\Windows\SysWOW64\wsjhrb.exe"C:\Windows\system32\wsjhrb.exe"100⤵
- Checks computer location settings
- Drops file in System32 directory
PID:4820 -
C:\Windows\SysWOW64\wydyemmvl.exe"C:\Windows\system32\wydyemmvl.exe"101⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2164 -
C:\Windows\SysWOW64\wtgko.exe"C:\Windows\system32\wtgko.exe"102⤵
- Checks computer location settings
- Drops file in System32 directory
PID:1940 -
C:\Windows\SysWOW64\wqkxb.exe"C:\Windows\system32\wqkxb.exe"103⤵
- Checks computer location settings
PID:4444 -
C:\Windows\SysWOW64\wuvm.exe"C:\Windows\system32\wuvm.exe"104⤵
- Checks computer location settings
PID:2284 -
C:\Windows\SysWOW64\wqyynmm.exe"C:\Windows\system32\wqyynmm.exe"105⤵
- Drops file in System32 directory
PID:4296 -
C:\Windows\SysWOW64\wtmona.exe"C:\Windows\system32\wtmona.exe"106⤵
- System Location Discovery: System Language Discovery
PID:4920 -
C:\Windows\SysWOW64\wqblfes.exe"C:\Windows\system32\wqblfes.exe"107⤵
- Checks computer location settings
- Drops file in System32 directory
PID:2192 -
C:\Windows\SysWOW64\wqetiayq.exe"C:\Windows\system32\wqetiayq.exe"108⤵PID:3112
-
C:\Windows\SysWOW64\wqgd.exe"C:\Windows\system32\wqgd.exe"109⤵
- Drops file in System32 directory
PID:3476 -
C:\Windows\SysWOW64\wtfcrjjp.exe"C:\Windows\system32\wtfcrjjp.exe"110⤵
- Checks computer location settings
PID:1560 -
C:\Windows\SysWOW64\wlwhet.exe"C:\Windows\system32\wlwhet.exe"111⤵
- Checks computer location settings
- Drops file in System32 directory
PID:3600 -
C:\Windows\SysWOW64\wquhmjcux.exe"C:\Windows\system32\wquhmjcux.exe"112⤵PID:4860
-
C:\Windows\SysWOW64\wqxpoe.exe"C:\Windows\system32\wqxpoe.exe"113⤵
- Drops file in System32 directory
PID:1784 -
C:\Windows\SysWOW64\wat.exe"C:\Windows\system32\wat.exe"114⤵
- Checks computer location settings
- Drops file in System32 directory
PID:1644 -
C:\Windows\SysWOW64\wqmsa.exe"C:\Windows\system32\wqmsa.exe"115⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2420 -
C:\Windows\SysWOW64\wnqflbff.exe"C:\Windows\system32\wnqflbff.exe"116⤵
- Checks computer location settings
- Drops file in System32 directory
PID:1448 -
C:\Windows\SysWOW64\wwsdgub.exe"C:\Windows\system32\wwsdgub.exe"117⤵
- Drops file in System32 directory
PID:944 -
C:\Windows\SysWOW64\wbrdnje.exe"C:\Windows\system32\wbrdnje.exe"118⤵
- Checks computer location settings
PID:3032 -
C:\Windows\SysWOW64\wctkqek.exe"C:\Windows\system32\wctkqek.exe"119⤵PID:3756
-
C:\Windows\SysWOW64\wxiiijxm.exe"C:\Windows\system32\wxiiijxm.exe"120⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1180 -
C:\Windows\SysWOW64\wtajmno.exe"C:\Windows\system32\wtajmno.exe"121⤵
- Drops file in System32 directory
PID:3224 -
C:\Windows\SysWOW64\woo.exe"C:\Windows\system32\woo.exe"122⤵
- System Location Discovery: System Language Discovery
PID:1592
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-