Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/11/2024, 01:44
Static task
static1
Behavioral task
behavioral1
Sample
8e88af0135a490ce9edb4a2e2dbe0036_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
8e88af0135a490ce9edb4a2e2dbe0036_JaffaCakes118.exe
-
Size
522KB
-
MD5
8e88af0135a490ce9edb4a2e2dbe0036
-
SHA1
329ae237b097dbac5f29bf233db8d2aaf2b0aaa4
-
SHA256
d9af634353937ca452cd1c9347a59bfb3911ff6a3136cd86c365d40c748641e4
-
SHA512
5dfd3ed34d9f581b0ab34c8dd675a92add7a55a5b9ac7f3ed58aadd1257ba87e8782abf147fedd01723cf90a506c90f05d71edbd856270b3a0301ad0b35bf608
-
SSDEEP
12288:BTIIYMqm3m4XR1oKBm4pQLfN+uqMTiVB/z0d+lGG:BToMF3jh1ocGV+lMT29G
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 64 IoCs
pid Process 2688 mszse.exe 3060 qeqkx.exe 1756 frnph.exe 376 udkul.exe 1680 dyjxa.exe 816 yezsd.exe 996 syeiv.exe 1512 uuhlq.exe 2692 wwhtk.exe 2856 gzwdx.exe 2028 gzxns.exe 552 ijplk.exe 2220 icyvm.exe 1928 kmpte.exe 2428 mvhjw.exe 2648 moqbq.exe 2820 twdtc.exe 1396 gugwl.exe 2040 qiztj.exe 2552 dzbws.exe 788 qmllx.exe 444 xtges.exe 1028 hewof.exe 1044 rdilp.exe 1776 fqrbv.exe 640 ppeho.exe 2504 zatjb.exe 2880 gigjv.exe 536 tyjme.exe 1844 dfnjo.exe 1148 niduj.exe 1064 xhpru.exe 2544 ccyhz.exe 1544 meorn.exe 2712 zrfhs.exe 1784 glemp.exe 2908 uywkv.exe 2744 dewzl.exe 2756 nlawe.exe 680 ykmco.exe 3016 icczt.exe 1312 sivxr.exe 2964 fdmmx.exe 2008 pgcxk.exe 696 cttmq.exe 2420 mhuko.exe 1436 zxpnw.exe 2280 jtpxe.exe 2632 tauuo.exe 2160 ddjfk.exe 2512 ncvcu.exe 1596 xjzin.exe 1800 kwrxs.exe 352 pmokg.exe 2076 zplvc.exe 2896 mngxk.exe 1688 zebat.exe 2336 jzbka.exe 976 tygqt.exe 876 gamxe.exe 372 qzyvp.exe 2736 xlwim.exe 572 kjrlu.exe 2064 snbqe.exe -
Identifies Wine through registry keys 2 TTPs 64 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine naoib.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine xpbbo.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine kpbfw.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine glemp.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine qlaww.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine xhkkg.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine mqjii.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine vrmob.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine jjxlm.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine eeipg.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine magqh.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine zylhx.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine wobkb.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine swjvw.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine wstyt.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine 8e88af0135a490ce9edb4a2e2dbe0036_JaffaCakes118.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine fforl.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine dsair.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine uzxyn.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine tzczw.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine dfnjo.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine sybud.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine wzpko.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine fjhxp.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine iibya.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine idshx.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine nhhfd.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine kgeex.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine xtges.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine ppeho.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine aifbo.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine mmrst.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine gmalf.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine wscid.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine kygxd.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine gbdgm.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine orqev.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine qzwnt.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine qzcrh.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine sryrf.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine djicu.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine krddb.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine cvayr.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine udkul.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine vhohy.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine muahr.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine dqwll.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine obqhy.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine unbzw.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine zhmkq.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine grivn.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine ectvm.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine rfryr.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine zatjb.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine guzvq.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine chikq.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine kkquq.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine qavur.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine qxjcd.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine dhhno.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine dewzl.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine ijewi.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine iarbs.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine iggtt.exe -
Loads dropped DLL 64 IoCs
pid Process 2344 8e88af0135a490ce9edb4a2e2dbe0036_JaffaCakes118.exe 2344 8e88af0135a490ce9edb4a2e2dbe0036_JaffaCakes118.exe 2688 mszse.exe 2688 mszse.exe 3060 qeqkx.exe 3060 qeqkx.exe 1756 frnph.exe 1756 frnph.exe 376 udkul.exe 376 udkul.exe 1680 dyjxa.exe 1680 dyjxa.exe 816 yezsd.exe 816 yezsd.exe 996 syeiv.exe 996 syeiv.exe 1512 uuhlq.exe 1512 uuhlq.exe 2692 wwhtk.exe 2692 wwhtk.exe 2856 gzwdx.exe 2856 gzwdx.exe 2028 gzxns.exe 2028 gzxns.exe 552 ijplk.exe 552 ijplk.exe 2220 icyvm.exe 2220 icyvm.exe 1928 kmpte.exe 1928 kmpte.exe 2428 mvhjw.exe 2428 mvhjw.exe 2648 moqbq.exe 2648 moqbq.exe 2820 twdtc.exe 2820 twdtc.exe 1396 gugwl.exe 1396 gugwl.exe 2040 qiztj.exe 2040 qiztj.exe 2552 dzbws.exe 2552 dzbws.exe 788 qmllx.exe 788 qmllx.exe 444 xtges.exe 444 xtges.exe 1028 hewof.exe 1028 hewof.exe 1044 rdilp.exe 1044 rdilp.exe 1776 fqrbv.exe 1776 fqrbv.exe 640 ppeho.exe 640 ppeho.exe 2504 zatjb.exe 2504 zatjb.exe 2880 gigjv.exe 2880 gigjv.exe 536 tyjme.exe 536 tyjme.exe 1844 dfnjo.exe 1844 dfnjo.exe 1148 niduj.exe 1148 niduj.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\qzyvp.exe gamxe.exe File opened for modification C:\Windows\SysWOW64\chylf.exe riufv.exe File created C:\Windows\SysWOW64\qavur.exe cnmel.exe File opened for modification C:\Windows\SysWOW64\lhjlw.exe guzvq.exe File opened for modification C:\Windows\SysWOW64\ewcxo.exe rjshi.exe File opened for modification C:\Windows\SysWOW64\pzhsr.exe foshd.exe File opened for modification C:\Windows\SysWOW64\ncvcu.exe ddjfk.exe File opened for modification C:\Windows\SysWOW64\zhuyr.exe pxfnw.exe File created C:\Windows\SysWOW64\nsvnu.exe abalm.exe File opened for modification C:\Windows\SysWOW64\zaytp.exe pmgwz.exe File opened for modification C:\Windows\SysWOW64\nqtpx.exe dndfk.exe File opened for modification C:\Windows\SysWOW64\uzdkq.exe hbbhi.exe File opened for modification C:\Windows\SysWOW64\emtzb.exe qzcjv.exe File opened for modification C:\Windows\SysWOW64\txkvu.exe jnnkh.exe File created C:\Windows\SysWOW64\pcxjd.exe cmugv.exe File opened for modification C:\Windows\SysWOW64\lrglv.exe ywwwp.exe File opened for modification C:\Windows\SysWOW64\fkdrt.exe vhohy.exe File created C:\Windows\SysWOW64\znygn.exe magqh.exe File opened for modification C:\Windows\SysWOW64\bzavf.exe rpkkr.exe File created C:\Windows\SysWOW64\lsarr.exe bhkge.exe File created C:\Windows\SysWOW64\buejt.exe oejgl.exe File created C:\Windows\SysWOW64\jjknz.exe ahudm.exe File opened for modification C:\Windows\SysWOW64\qleka.exe dujhj.exe File created C:\Windows\SysWOW64\fqpfp.exe sdxpk.exe File created C:\Windows\SysWOW64\unbzw.exe hpgwo.exe File created C:\Windows\SysWOW64\ebywe.exe cvyzg.exe File opened for modification C:\Windows\SysWOW64\ngaef.exe aifbo.exe File created C:\Windows\SysWOW64\mvhjw.exe kmpte.exe File opened for modification C:\Windows\SysWOW64\zkmnp.exe mlstg.exe File created C:\Windows\SysWOW64\wyuwc.exe jirut.exe File opened for modification C:\Windows\SysWOW64\hiypy.exe usvnp.exe File opened for modification C:\Windows\SysWOW64\djicu.exe uvife.exe File opened for modification C:\Windows\SysWOW64\jbksq.exe zquid.exe File opened for modification C:\Windows\SysWOW64\jcyur.exe xasff.exe File opened for modification C:\Windows\SysWOW64\ojreb.exe bswbl.exe File created C:\Windows\SysWOW64\rqslk.exe hndbx.exe File created C:\Windows\SysWOW64\xpbbo.exe obiey.exe File opened for modification C:\Windows\SysWOW64\jjxlm.exe wscid.exe File created C:\Windows\SysWOW64\daafh.exe txkvu.exe File created C:\Windows\SysWOW64\sybud.exe fagrm.exe File created C:\Windows\SysWOW64\jgtir.exe wiyfi.exe File opened for modification C:\Windows\SysWOW64\xzlvv.exe sjism.exe File created C:\Windows\SysWOW64\fvtgm.exe teqdd.exe File opened for modification C:\Windows\SysWOW64\lzgwo.exe yaeug.exe File opened for modification C:\Windows\SysWOW64\wdjei.exe jngcs.exe File opened for modification C:\Windows\SysWOW64\jfwns.exe wobkb.exe File created C:\Windows\SysWOW64\zisxu.exe pydmz.exe File opened for modification C:\Windows\SysWOW64\xucgh.exe nvxjw.exe File created C:\Windows\SysWOW64\tjahe.exe jgkxi.exe File opened for modification C:\Windows\SysWOW64\icyvm.exe ijplk.exe File opened for modification C:\Windows\SysWOW64\aatjv.exe qxdzh.exe File created C:\Windows\SysWOW64\gqiul.exe tdqef.exe File created C:\Windows\SysWOW64\nrard.exe bxukk.exe File created C:\Windows\SysWOW64\cjlgs.exe svljc.exe File created C:\Windows\SysWOW64\iarbs.exe vbwzk.exe File created C:\Windows\SysWOW64\edmbz.exe rfryr.exe File opened for modification C:\Windows\SysWOW64\cpqke.exe pqnhw.exe File opened for modification C:\Windows\SysWOW64\xgwqe.exe jtnby.exe File opened for modification C:\Windows\SysWOW64\dflzn.exe qorwe.exe File opened for modification C:\Windows\SysWOW64\pldaz.exe cvayr.exe File created C:\Windows\SysWOW64\cttmq.exe pgcxk.exe File opened for modification C:\Windows\SysWOW64\heiil.exe rrzni.exe File opened for modification C:\Windows\SysWOW64\jjknz.exe ahudm.exe File created C:\Windows\SysWOW64\zotdp.exe mqyag.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrglv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhohy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rqslk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gvxnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fylwj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jnnkh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sjlod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language usvnp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jgkxi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ssbnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tyllo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eeipg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dsjix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jgtir.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hvsjk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bjewh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsduc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wjkld.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xzlvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lnbxo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jaxnx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language twdtc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yiqqj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shysk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gbdgm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language npjko.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zhuyr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sziva.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qxjcd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language meorn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language orqev.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ndxqd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hljcj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language couxm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zhmkq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zyaav.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lkjrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qleka.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unbzw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ywwwp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ewcxo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qzcrh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ykmco.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pxfnw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zcyko.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wbclp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbnwo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language paumb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pzhkm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language klchp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kxvqc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language heiil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mszse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tdqef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chikq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjtdk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dflzn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dndfk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rtjlg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language naoib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qottk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language awphj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language whpua.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qcugu.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2688 2344 8e88af0135a490ce9edb4a2e2dbe0036_JaffaCakes118.exe 30 PID 2344 wrote to memory of 2688 2344 8e88af0135a490ce9edb4a2e2dbe0036_JaffaCakes118.exe 30 PID 2344 wrote to memory of 2688 2344 8e88af0135a490ce9edb4a2e2dbe0036_JaffaCakes118.exe 30 PID 2344 wrote to memory of 2688 2344 8e88af0135a490ce9edb4a2e2dbe0036_JaffaCakes118.exe 30 PID 2688 wrote to memory of 3060 2688 mszse.exe 31 PID 2688 wrote to memory of 3060 2688 mszse.exe 31 PID 2688 wrote to memory of 3060 2688 mszse.exe 31 PID 2688 wrote to memory of 3060 2688 mszse.exe 31 PID 3060 wrote to memory of 1756 3060 qeqkx.exe 32 PID 3060 wrote to memory of 1756 3060 qeqkx.exe 32 PID 3060 wrote to memory of 1756 3060 qeqkx.exe 32 PID 3060 wrote to memory of 1756 3060 qeqkx.exe 32 PID 1756 wrote to memory of 376 1756 frnph.exe 33 PID 1756 wrote to memory of 376 1756 frnph.exe 33 PID 1756 wrote to memory of 376 1756 frnph.exe 33 PID 1756 wrote to memory of 376 1756 frnph.exe 33 PID 376 wrote to memory of 1680 376 udkul.exe 34 PID 376 wrote to memory of 1680 376 udkul.exe 34 PID 376 wrote to memory of 1680 376 udkul.exe 34 PID 376 wrote to memory of 1680 376 udkul.exe 34 PID 1680 wrote to memory of 816 1680 dyjxa.exe 35 PID 1680 wrote to memory of 816 1680 dyjxa.exe 35 PID 1680 wrote to memory of 816 1680 dyjxa.exe 35 PID 1680 wrote to memory of 816 1680 dyjxa.exe 35 PID 816 wrote to memory of 996 816 yezsd.exe 36 PID 816 wrote to memory of 996 816 yezsd.exe 36 PID 816 wrote to memory of 996 816 yezsd.exe 36 PID 816 wrote to memory of 996 816 yezsd.exe 36 PID 996 wrote to memory of 1512 996 syeiv.exe 37 PID 996 wrote to memory of 1512 996 syeiv.exe 37 PID 996 wrote to memory of 1512 996 syeiv.exe 37 PID 996 wrote to memory of 1512 996 syeiv.exe 37 PID 1512 wrote to memory of 2692 1512 uuhlq.exe 38 PID 1512 wrote to memory of 2692 1512 uuhlq.exe 38 PID 1512 wrote to memory of 2692 1512 uuhlq.exe 38 PID 1512 wrote to memory of 2692 1512 uuhlq.exe 38 PID 2692 wrote to memory of 2856 2692 wwhtk.exe 39 PID 2692 wrote to memory of 2856 2692 wwhtk.exe 39 PID 2692 wrote to memory of 2856 2692 wwhtk.exe 39 PID 2692 wrote to memory of 2856 2692 wwhtk.exe 39 PID 2856 wrote to memory of 2028 2856 gzwdx.exe 40 PID 2856 wrote to memory of 2028 2856 gzwdx.exe 40 PID 2856 wrote to memory of 2028 2856 gzwdx.exe 40 PID 2856 wrote to memory of 2028 2856 gzwdx.exe 40 PID 2028 wrote to memory of 552 2028 gzxns.exe 41 PID 2028 wrote to memory of 552 2028 gzxns.exe 41 PID 2028 wrote to memory of 552 2028 gzxns.exe 41 PID 2028 wrote to memory of 552 2028 gzxns.exe 41 PID 552 wrote to memory of 2220 552 ijplk.exe 42 PID 552 wrote to memory of 2220 552 ijplk.exe 42 PID 552 wrote to memory of 2220 552 ijplk.exe 42 PID 552 wrote to memory of 2220 552 ijplk.exe 42 PID 2220 wrote to memory of 1928 2220 icyvm.exe 43 PID 2220 wrote to memory of 1928 2220 icyvm.exe 43 PID 2220 wrote to memory of 1928 2220 icyvm.exe 43 PID 2220 wrote to memory of 1928 2220 icyvm.exe 43 PID 1928 wrote to memory of 2428 1928 kmpte.exe 44 PID 1928 wrote to memory of 2428 1928 kmpte.exe 44 PID 1928 wrote to memory of 2428 1928 kmpte.exe 44 PID 1928 wrote to memory of 2428 1928 kmpte.exe 44 PID 2428 wrote to memory of 2648 2428 mvhjw.exe 45 PID 2428 wrote to memory of 2648 2428 mvhjw.exe 45 PID 2428 wrote to memory of 2648 2428 mvhjw.exe 45 PID 2428 wrote to memory of 2648 2428 mvhjw.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e88af0135a490ce9edb4a2e2dbe0036_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8e88af0135a490ce9edb4a2e2dbe0036_JaffaCakes118.exe"1⤵
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\mszse.exeC:\Windows\system32\mszse.exe 636 "C:\Users\Admin\AppData\Local\Temp\8e88af0135a490ce9edb4a2e2dbe0036_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\qeqkx.exeC:\Windows\system32\qeqkx.exe 612 "C:\Windows\SysWOW64\mszse.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\frnph.exeC:\Windows\system32\frnph.exe 616 "C:\Windows\SysWOW64\qeqkx.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\udkul.exeC:\Windows\system32\udkul.exe 624 "C:\Windows\SysWOW64\frnph.exe"5⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Windows\SysWOW64\dyjxa.exeC:\Windows\system32\dyjxa.exe 628 "C:\Windows\SysWOW64\udkul.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\yezsd.exeC:\Windows\system32\yezsd.exe 620 "C:\Windows\SysWOW64\dyjxa.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\SysWOW64\syeiv.exeC:\Windows\system32\syeiv.exe 640 "C:\Windows\SysWOW64\yezsd.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\SysWOW64\uuhlq.exeC:\Windows\system32\uuhlq.exe 632 "C:\Windows\SysWOW64\syeiv.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\wwhtk.exeC:\Windows\system32\wwhtk.exe 644 "C:\Windows\SysWOW64\uuhlq.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\gzwdx.exeC:\Windows\system32\gzwdx.exe 652 "C:\Windows\SysWOW64\wwhtk.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\gzxns.exeC:\Windows\system32\gzxns.exe 668 "C:\Windows\SysWOW64\gzwdx.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\ijplk.exeC:\Windows\system32\ijplk.exe 680 "C:\Windows\SysWOW64\gzxns.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\icyvm.exeC:\Windows\system32\icyvm.exe 660 "C:\Windows\SysWOW64\ijplk.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\kmpte.exeC:\Windows\system32\kmpte.exe 708 "C:\Windows\SysWOW64\icyvm.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\mvhjw.exeC:\Windows\system32\mvhjw.exe 664 "C:\Windows\SysWOW64\kmpte.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\moqbq.exeC:\Windows\system32\moqbq.exe 608 "C:\Windows\SysWOW64\mvhjw.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2648 -
C:\Windows\SysWOW64\twdtc.exeC:\Windows\system32\twdtc.exe 756 "C:\Windows\SysWOW64\moqbq.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2820 -
C:\Windows\SysWOW64\gugwl.exeC:\Windows\system32\gugwl.exe 760 "C:\Windows\SysWOW64\twdtc.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1396 -
C:\Windows\SysWOW64\qiztj.exeC:\Windows\system32\qiztj.exe 752 "C:\Windows\SysWOW64\gugwl.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2040 -
C:\Windows\SysWOW64\dzbws.exeC:\Windows\system32\dzbws.exe 772 "C:\Windows\SysWOW64\qiztj.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2552 -
C:\Windows\SysWOW64\qmllx.exeC:\Windows\system32\qmllx.exe 768 "C:\Windows\SysWOW64\dzbws.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:788 -
C:\Windows\SysWOW64\xtges.exeC:\Windows\system32\xtges.exe 764 "C:\Windows\SysWOW64\qmllx.exe"23⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
PID:444 -
C:\Windows\SysWOW64\hewof.exeC:\Windows\system32\hewof.exe 780 "C:\Windows\SysWOW64\xtges.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1028 -
C:\Windows\SysWOW64\rdilp.exeC:\Windows\system32\rdilp.exe 784 "C:\Windows\SysWOW64\hewof.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1044 -
C:\Windows\SysWOW64\fqrbv.exeC:\Windows\system32\fqrbv.exe 788 "C:\Windows\SysWOW64\rdilp.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1776 -
C:\Windows\SysWOW64\ppeho.exeC:\Windows\system32\ppeho.exe 792 "C:\Windows\SysWOW64\fqrbv.exe"27⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
PID:640 -
C:\Windows\SysWOW64\zatjb.exeC:\Windows\system32\zatjb.exe 796 "C:\Windows\SysWOW64\ppeho.exe"28⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
PID:2504 -
C:\Windows\SysWOW64\gigjv.exeC:\Windows\system32\gigjv.exe 776 "C:\Windows\SysWOW64\zatjb.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2880 -
C:\Windows\SysWOW64\tyjme.exeC:\Windows\system32\tyjme.exe 800 "C:\Windows\SysWOW64\gigjv.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:536 -
C:\Windows\SysWOW64\dfnjo.exeC:\Windows\system32\dfnjo.exe 812 "C:\Windows\SysWOW64\tyjme.exe"31⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
PID:1844 -
C:\Windows\SysWOW64\niduj.exeC:\Windows\system32\niduj.exe 808 "C:\Windows\SysWOW64\dfnjo.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1148 -
C:\Windows\SysWOW64\xhpru.exeC:\Windows\system32\xhpru.exe 804 "C:\Windows\SysWOW64\niduj.exe"33⤵
- Executes dropped EXE
PID:1064 -
C:\Windows\SysWOW64\ccyhz.exeC:\Windows\system32\ccyhz.exe 832 "C:\Windows\SysWOW64\xhpru.exe"34⤵
- Executes dropped EXE
PID:2544 -
C:\Windows\SysWOW64\meorn.exeC:\Windows\system32\meorn.exe 828 "C:\Windows\SysWOW64\ccyhz.exe"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1544 -
C:\Windows\SysWOW64\zrfhs.exeC:\Windows\system32\zrfhs.exe 820 "C:\Windows\SysWOW64\meorn.exe"36⤵
- Executes dropped EXE
PID:2712 -
C:\Windows\SysWOW64\glemp.exeC:\Windows\system32\glemp.exe 816 "C:\Windows\SysWOW64\zrfhs.exe"37⤵
- Executes dropped EXE
- Identifies Wine through registry keys
PID:1784 -
C:\Windows\SysWOW64\uywkv.exeC:\Windows\system32\uywkv.exe 824 "C:\Windows\SysWOW64\glemp.exe"38⤵
- Executes dropped EXE
PID:2908 -
C:\Windows\SysWOW64\dewzl.exeC:\Windows\system32\dewzl.exe 840 "C:\Windows\SysWOW64\uywkv.exe"39⤵
- Executes dropped EXE
- Identifies Wine through registry keys
PID:2744 -
C:\Windows\SysWOW64\nlawe.exeC:\Windows\system32\nlawe.exe 836 "C:\Windows\SysWOW64\dewzl.exe"40⤵
- Executes dropped EXE
PID:2756 -
C:\Windows\SysWOW64\ykmco.exeC:\Windows\system32\ykmco.exe 848 "C:\Windows\SysWOW64\nlawe.exe"41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:680 -
C:\Windows\SysWOW64\icczt.exeC:\Windows\system32\icczt.exe 852 "C:\Windows\SysWOW64\ykmco.exe"42⤵
- Executes dropped EXE
PID:3016 -
C:\Windows\SysWOW64\sivxr.exeC:\Windows\system32\sivxr.exe 860 "C:\Windows\SysWOW64\icczt.exe"43⤵
- Executes dropped EXE
PID:1312 -
C:\Windows\SysWOW64\fdmmx.exeC:\Windows\system32\fdmmx.exe 864 "C:\Windows\SysWOW64\sivxr.exe"44⤵
- Executes dropped EXE
PID:2964 -
C:\Windows\SysWOW64\pgcxk.exeC:\Windows\system32\pgcxk.exe 844 "C:\Windows\SysWOW64\fdmmx.exe"45⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2008 -
C:\Windows\SysWOW64\cttmq.exeC:\Windows\system32\cttmq.exe 868 "C:\Windows\SysWOW64\pgcxk.exe"46⤵
- Executes dropped EXE
PID:696 -
C:\Windows\SysWOW64\mhuko.exeC:\Windows\system32\mhuko.exe 872 "C:\Windows\SysWOW64\cttmq.exe"47⤵
- Executes dropped EXE
PID:2420 -
C:\Windows\SysWOW64\zxpnw.exeC:\Windows\system32\zxpnw.exe 876 "C:\Windows\SysWOW64\mhuko.exe"48⤵
- Executes dropped EXE
PID:1436 -
C:\Windows\SysWOW64\jtpxe.exeC:\Windows\system32\jtpxe.exe 880 "C:\Windows\SysWOW64\zxpnw.exe"49⤵
- Executes dropped EXE
PID:2280 -
C:\Windows\SysWOW64\tauuo.exeC:\Windows\system32\tauuo.exe 884 "C:\Windows\SysWOW64\jtpxe.exe"50⤵
- Executes dropped EXE
PID:2632 -
C:\Windows\SysWOW64\ddjfk.exeC:\Windows\system32\ddjfk.exe 900 "C:\Windows\SysWOW64\tauuo.exe"51⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2160 -
C:\Windows\SysWOW64\ncvcu.exeC:\Windows\system32\ncvcu.exe 856 "C:\Windows\SysWOW64\ddjfk.exe"52⤵
- Executes dropped EXE
PID:2512 -
C:\Windows\SysWOW64\xjzin.exeC:\Windows\system32\xjzin.exe 888 "C:\Windows\SysWOW64\ncvcu.exe"53⤵
- Executes dropped EXE
PID:1596 -
C:\Windows\SysWOW64\kwrxs.exeC:\Windows\system32\kwrxs.exe 896 "C:\Windows\SysWOW64\xjzin.exe"54⤵
- Executes dropped EXE
PID:1800 -
C:\Windows\SysWOW64\pmokg.exeC:\Windows\system32\pmokg.exe 908 "C:\Windows\SysWOW64\kwrxs.exe"55⤵
- Executes dropped EXE
PID:352 -
C:\Windows\SysWOW64\zplvc.exeC:\Windows\system32\zplvc.exe 892 "C:\Windows\SysWOW64\pmokg.exe"56⤵
- Executes dropped EXE
PID:2076 -
C:\Windows\SysWOW64\mngxk.exeC:\Windows\system32\mngxk.exe 904 "C:\Windows\SysWOW64\zplvc.exe"57⤵
- Executes dropped EXE
PID:2896 -
C:\Windows\SysWOW64\zebat.exeC:\Windows\system32\zebat.exe 916 "C:\Windows\SysWOW64\mngxk.exe"58⤵
- Executes dropped EXE
PID:1688 -
C:\Windows\SysWOW64\jzbka.exeC:\Windows\system32\jzbka.exe 920 "C:\Windows\SysWOW64\zebat.exe"59⤵
- Executes dropped EXE
PID:2336 -
C:\Windows\SysWOW64\tygqt.exeC:\Windows\system32\tygqt.exe 924 "C:\Windows\SysWOW64\jzbka.exe"60⤵
- Executes dropped EXE
PID:976 -
C:\Windows\SysWOW64\gamxe.exeC:\Windows\system32\gamxe.exe 932 "C:\Windows\SysWOW64\tygqt.exe"61⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:876 -
C:\Windows\SysWOW64\qzyvp.exeC:\Windows\system32\qzyvp.exe 936 "C:\Windows\SysWOW64\gamxe.exe"62⤵
- Executes dropped EXE
PID:372 -
C:\Windows\SysWOW64\xlwim.exeC:\Windows\system32\xlwim.exe 940 "C:\Windows\SysWOW64\qzyvp.exe"63⤵
- Executes dropped EXE
PID:2736 -
C:\Windows\SysWOW64\kjrlu.exeC:\Windows\system32\kjrlu.exe 944 "C:\Windows\SysWOW64\xlwim.exe"64⤵
- Executes dropped EXE
PID:572 -
C:\Windows\SysWOW64\snbqe.exeC:\Windows\system32\snbqe.exe 912 "C:\Windows\SysWOW64\kjrlu.exe"65⤵
- Executes dropped EXE
PID:2064 -
C:\Windows\SysWOW64\cmonw.exeC:\Windows\system32\cmonw.exe 948 "C:\Windows\SysWOW64\snbqe.exe"66⤵PID:2068
-
C:\Windows\SysWOW64\mlstg.exeC:\Windows\system32\mlstg.exe 952 "C:\Windows\SysWOW64\cmonw.exe"67⤵
- Drops file in System32 directory
PID:1168 -
C:\Windows\SysWOW64\zkmnp.exeC:\Windows\system32\zkmnp.exe 928 "C:\Windows\SysWOW64\mlstg.exe"68⤵PID:1076
-
C:\Windows\SysWOW64\mapqy.exeC:\Windows\system32\mapqy.exe 964 "C:\Windows\SysWOW64\zkmnp.exe"69⤵PID:1548
-
C:\Windows\SysWOW64\wlfat.exeC:\Windows\system32\wlfat.exe 960 "C:\Windows\SysWOW64\mapqy.exe"70⤵PID:1056
-
C:\Windows\SysWOW64\goulg.exeC:\Windows\system32\goulg.exe 968 "C:\Windows\SysWOW64\wlfat.exe"71⤵PID:2188
-
C:\Windows\SysWOW64\tbmbm.exeC:\Windows\system32\tbmbm.exe 972 "C:\Windows\SysWOW64\goulg.exe"72⤵PID:2376
-
C:\Windows\SysWOW64\dlblh.exeC:\Windows\system32\dlblh.exe 956 "C:\Windows\SysWOW64\tbmbm.exe"73⤵PID:2868
-
C:\Windows\SysWOW64\qcwoq.exeC:\Windows\system32\qcwoq.exe 976 "C:\Windows\SysWOW64\dlblh.exe"74⤵PID:2392
-
C:\Windows\SysWOW64\dsrqy.exeC:\Windows\system32\dsrqy.exe 984 "C:\Windows\SysWOW64\qcwoq.exe"75⤵PID:2584
-
C:\Windows\SysWOW64\qrtth.exeC:\Windows\system32\qrtth.exe 988 "C:\Windows\SysWOW64\dsrqy.exe"76⤵PID:480
-
C:\Windows\SysWOW64\ztjdu.exeC:\Windows\system32\ztjdu.exe 992 "C:\Windows\SysWOW64\qrtth.exe"77⤵PID:968
-
C:\Windows\SysWOW64\jeyop.exeC:\Windows\system32\jeyop.exe 996 "C:\Windows\SysWOW64\ztjdu.exe"78⤵PID:1956
-
C:\Windows\SysWOW64\orqev.exeC:\Windows\system32\orqev.exe 980 "C:\Windows\SysWOW64\jeyop.exe"79⤵
- Identifies Wine through registry keys
- System Location Discovery: System Language Discovery
PID:568 -
C:\Windows\SysWOW64\bhkge.exeC:\Windows\system32\bhkge.exe 1008 "C:\Windows\SysWOW64\orqev.exe"80⤵
- Drops file in System32 directory
PID:2412 -
C:\Windows\SysWOW64\lsarr.exeC:\Windows\system32\lsarr.exe 1000 "C:\Windows\SysWOW64\bhkge.exe"81⤵PID:2292
-
C:\Windows\SysWOW64\vrmob.exeC:\Windows\system32\vrmob.exe 1012 "C:\Windows\SysWOW64\lsarr.exe"82⤵
- Identifies Wine through registry keys
PID:2316 -
C:\Windows\SysWOW64\iqhrs.exeC:\Windows\system32\iqhrs.exe 1004 "C:\Windows\SysWOW64\vrmob.exe"83⤵PID:1660
-
C:\Windows\SysWOW64\sswbf.exeC:\Windows\system32\sswbf.exe 1016 "C:\Windows\SysWOW64\iqhrs.exe"84⤵PID:912
-
C:\Windows\SysWOW64\fforl.exeC:\Windows\system32\fforl.exe 1028 "C:\Windows\SysWOW64\sswbf.exe"85⤵
- Identifies Wine through registry keys
PID:1564 -
C:\Windows\SysWOW64\sejtu.exeC:\Windows\system32\sejtu.exe 1020 "C:\Windows\SysWOW64\fforl.exe"86⤵PID:1804
-
C:\Windows\SysWOW64\cgyeh.exeC:\Windows\system32\cgyeh.exe 1036 "C:\Windows\SysWOW64\sejtu.exe"87⤵PID:2304
-
C:\Windows\SysWOW64\mrnoc.exeC:\Windows\system32\mrnoc.exe 1040 "C:\Windows\SysWOW64\cgyeh.exe"88⤵PID:2416
-
C:\Windows\SysWOW64\zefei.exeC:\Windows\system32\zefei.exe 1044 "C:\Windows\SysWOW64\mrnoc.exe"89⤵PID:2740
-
C:\Windows\SysWOW64\muahr.exeC:\Windows\system32\muahr.exe 1048 "C:\Windows\SysWOW64\zefei.exe"90⤵
- Identifies Wine through registry keys
PID:1060 -
C:\Windows\SysWOW64\wbmeb.exeC:\Windows\system32\wbmeb.exe 1052 "C:\Windows\SysWOW64\muahr.exe"91⤵PID:2224
-
C:\Windows\SysWOW64\gimbz.exeC:\Windows\system32\gimbz.exe 1056 "C:\Windows\SysWOW64\wbmeb.exe"92⤵PID:108
-
C:\Windows\SysWOW64\tuwrf.exeC:\Windows\system32\tuwrf.exe 1064 "C:\Windows\SysWOW64\gimbz.exe"93⤵PID:2912
-
C:\Windows\SysWOW64\gtzun.exeC:\Windows\system32\gtzun.exe 1032 "C:\Windows\SysWOW64\tuwrf.exe"94⤵PID:2136
-
C:\Windows\SysWOW64\qwoeb.exeC:\Windows\system32\qwoeb.exe 1068 "C:\Windows\SysWOW64\gtzun.exe"95⤵PID:2636
-
C:\Windows\SysWOW64\dujhj.exeC:\Windows\system32\dujhj.exe 1072 "C:\Windows\SysWOW64\qwoeb.exe"96⤵
- Drops file in System32 directory
PID:2228 -
C:\Windows\SysWOW64\qleka.exeC:\Windows\system32\qleka.exe 1076 "C:\Windows\SysWOW64\dujhj.exe"97⤵
- System Location Discovery: System Language Discovery
PID:2308 -
C:\Windows\SysWOW64\zzezq.exeC:\Windows\system32\zzezq.exe 1080 "C:\Windows\SysWOW64\qleka.exe"98⤵PID:2380
-
C:\Windows\SysWOW64\nmwpw.exeC:\Windows\system32\nmwpw.exe 1084 "C:\Windows\SysWOW64\zzezq.exe"99⤵PID:2864
-
C:\Windows\SysWOW64\acrre.exeC:\Windows\system32\acrre.exe 1088 "C:\Windows\SysWOW64\nmwpw.exe"100⤵PID:2924
-
C:\Windows\SysWOW64\jngcs.exeC:\Windows\system32\jngcs.exe 1092 "C:\Windows\SysWOW64\acrre.exe"101⤵
- Drops file in System32 directory
PID:2148 -
C:\Windows\SysWOW64\wdjei.exeC:\Windows\system32\wdjei.exe 1060 "C:\Windows\SysWOW64\jngcs.exe"102⤵PID:2328
-
C:\Windows\SysWOW64\jfpuu.exeC:\Windows\system32\jfpuu.exe 1104 "C:\Windows\SysWOW64\wdjei.exe"103⤵PID:2264
-
C:\Windows\SysWOW64\tqefh.exeC:\Windows\system32\tqefh.exe 1100 "C:\Windows\SysWOW64\jfpuu.exe"104⤵PID:2824
-
C:\Windows\SysWOW64\ggzhp.exeC:\Windows\system32\ggzhp.exe 1096 "C:\Windows\SysWOW64\tqefh.exe"105⤵PID:2132
-
C:\Windows\SysWOW64\txuky.exeC:\Windows\system32\txuky.exe 1108 "C:\Windows\SysWOW64\ggzhp.exe"106⤵PID:2204
-
C:\Windows\SysWOW64\gvxnh.exeC:\Windows\system32\gvxnh.exe 1112 "C:\Windows\SysWOW64\txuky.exe"107⤵
- System Location Discovery: System Language Discovery
PID:2236 -
C:\Windows\SysWOW64\tmspx.exeC:\Windows\system32\tmspx.exe 1120 "C:\Windows\SysWOW64\gvxnh.exe"108⤵PID:2024
-
C:\Windows\SysWOW64\casfn.exeC:\Windows\system32\casfn.exe 1116 "C:\Windows\SysWOW64\tmspx.exe"109⤵PID:1248
-
C:\Windows\SysWOW64\pqnhw.exeC:\Windows\system32\pqnhw.exe 1128 "C:\Windows\SysWOW64\casfn.exe"110⤵
- Drops file in System32 directory
PID:2464 -
C:\Windows\SysWOW64\cpqke.exeC:\Windows\system32\cpqke.exe 1132 "C:\Windows\SysWOW64\pqnhw.exe"111⤵PID:2424
-
C:\Windows\SysWOW64\pflnn.exeC:\Windows\system32\pflnn.exe 1136 "C:\Windows\SysWOW64\cpqke.exe"112⤵PID:2320
-
C:\Windows\SysWOW64\cefpw.exeC:\Windows\system32\cefpw.exe 1144 "C:\Windows\SysWOW64\pflnn.exe"113⤵PID:2596
-
C:\Windows\SysWOW64\lkgnu.exeC:\Windows\system32\lkgnu.exe 1148 "C:\Windows\SysWOW64\cefpw.exe"114⤵PID:584
-
C:\Windows\SysWOW64\yijic.exeC:\Windows\system32\yijic.exe 1156 "C:\Windows\SysWOW64\lkgnu.exe"115⤵PID:2732
-
C:\Windows\SysWOW64\lcpxo.exeC:\Windows\system32\lcpxo.exe 1140 "C:\Windows\SysWOW64\yijic.exe"116⤵PID:392
-
C:\Windows\SysWOW64\yxznt.exeC:\Windows\system32\yxznt.exe 1152 "C:\Windows\SysWOW64\lcpxo.exe"117⤵PID:884
-
C:\Windows\SysWOW64\lobqc.exeC:\Windows\system32\lobqc.exe 1160 "C:\Windows\SysWOW64\yxznt.exe"118⤵PID:2900
-
C:\Windows\SysWOW64\vrrax.exeC:\Windows\system32\vrrax.exe 1168 "C:\Windows\SysWOW64\lobqc.exe"119⤵PID:2608
-
C:\Windows\SysWOW64\ipldg.exeC:\Windows\system32\ipldg.exe 1124 "C:\Windows\SysWOW64\vrrax.exe"120⤵PID:2672
-
C:\Windows\SysWOW64\ssbnt.exeC:\Windows\system32\ssbnt.exe 1172 "C:\Windows\SysWOW64\ipldg.exe"121⤵
- System Location Discovery: System Language Discovery
PID:2660 -
C:\Windows\SysWOW64\fqeqc.exeC:\Windows\system32\fqeqc.exe 1176 "C:\Windows\SysWOW64\ssbnt.exe"122⤵PID:1856
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-