Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 07:26
Static task
static1
Behavioral task
behavioral1
Sample
9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe
-
Size
188KB
-
MD5
9a0e6645f3ceb7d70a8627bce6838a25
-
SHA1
43d76e08a412b2cef915cd5f0630f8aba7576f33
-
SHA256
d23d9c5dc49cdcf7a13416b35de4f691ff0d77c7b3dcdc661680972623721a07
-
SHA512
4866105fa5de239570243aecc326cab4317b2c2340fa58a1126d77361a2f2a7f695f46adf2c99143ed27ff3d91be941df247d8bfbc927a04a196bba27d251beb
-
SSDEEP
3072:9RgaAb3zidY/5HhbPKRgMR2tr4QPxC2ig81zhR5jShWyIZhsS91IZps8TA4AvFOw:pAb4CbPwgMshRxhTWzr5xywhsS9eU8k3
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 64 IoCs
pid Process 3436 nyxxy.exe 2608 nyxxy.exe 1048 mgxav.exe 1680 mgxav.exe 1256 mktqx.exe 2320 mktqx.exe 1828 saawq.exe 3192 saawq.exe 1944 xckpm.exe 1524 xckpm.exe 2308 zxxke.exe 4664 zxxke.exe 884 hryiz.exe 4412 hryiz.exe 4952 flcbp.exe 316 flcbp.exe 5040 mfdzj.exe 1360 mfdzj.exe 2748 rkgfi.exe 3984 rkgfi.exe 4344 xxcfy.exe 4680 xxcfy.exe 1788 hwqax.exe 3160 hwqax.exe 1560 peolo.exe 700 peolo.exe 1048 ropzm.exe 3996 ropzm.exe 2728 ukcue.exe 1856 ukcue.exe 4544 uzafv.exe 3136 uzafv.exe 1976 zqhlp.exe 1072 zqhlp.exe 2548 jpvgn.exe 452 jpvgn.exe 1824 mlacf.exe 1984 mlacf.exe 2384 orqki.exe 3804 orqki.exe 1452 wlziu.exe 2976 wlziu.exe 1956 wpoyw.exe 664 wpoyw.exe 1372 eiwwq.exe 4316 eiwwq.exe 2896 jcppm.exe 4688 jcppm.exe 832 gawug.exe 1216 gawug.exe 2168 mnrvw.exe 1176 mnrvw.exe 5032 tgalq.exe 4476 tgalq.exe 3204 ylerp.exe 224 ylerp.exe 1532 bdxze.exe 1976 bdxze.exe 3632 gibfl.exe 2548 gibfl.exe 2324 lktyh.exe 884 lktyh.exe 4528 tarjr.exe 3496 tarjr.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\gawug.exe jcppm.exe File created C:\Windows\SysWOW64\acpbs.exe dbxiw.exe File opened for modification C:\Windows\SysWOW64\ijijb.exe clbeh.exe File opened for modification C:\Windows\SysWOW64\igsaz.exe anjcf.exe File opened for modification C:\Windows\SysWOW64\pgvmy.exe ijijb.exe File opened for modification C:\Windows\SysWOW64\mktqx.exe mgxav.exe File created C:\Windows\SysWOW64\hryiz.exe zxxke.exe File opened for modification C:\Windows\SysWOW64\eiwwq.exe wpoyw.exe File created C:\Windows\SysWOW64\ghcqb.exe xdpsn.exe File created C:\Windows\SysWOW64\shgyt.exe krjnc.exe File created C:\Windows\SysWOW64\rkgfi.exe mfdzj.exe File created C:\Windows\SysWOW64\mubmw.exe medbn.exe File created C:\Windows\SysWOW64\lagfw.exe dwuhq.exe File opened for modification C:\Windows\SysWOW64\uobuq.exe nvtww.exe File opened for modification C:\Windows\SysWOW64\rkgfi.exe mfdzj.exe File created C:\Windows\SysWOW64\idwnt.exe dfpha.exe File opened for modification C:\Windows\SysWOW64\clbeh.exe sacap.exe File created C:\Windows\SysWOW64\wpoyw.exe wlziu.exe File created C:\Windows\SysWOW64\tarjr.exe lktyh.exe File opened for modification C:\Windows\SysWOW64\hevjs.exe cgovz.exe File created C:\Windows\SysWOW64\medbn.exe fefmn.exe File opened for modification C:\Windows\SysWOW64\xwnjr.exe nmngy.exe File opened for modification C:\Windows\SysWOW64\saawq.exe mktqx.exe File opened for modification C:\Windows\SysWOW64\mlacf.exe jpvgn.exe File created C:\Windows\SysWOW64\eiwwq.exe wpoyw.exe File opened for modification C:\Windows\SysWOW64\jflch.exe mzpwb.exe File created C:\Windows\SysWOW64\nmngy.exe igsaz.exe File created C:\Windows\SysWOW64\jpvgn.exe zqhlp.exe File opened for modification C:\Windows\SysWOW64\xdpsn.exe qkgus.exe File opened for modification C:\Windows\SysWOW64\blxpi.exe tsxro.exe File created C:\Windows\SysWOW64\uobuq.exe nvtww.exe File opened for modification C:\Windows\SysWOW64\mgxav.exe nyxxy.exe File opened for modification C:\Windows\SysWOW64\isddz.exe ghcqb.exe File opened for modification C:\Windows\SysWOW64\mubmw.exe medbn.exe File opened for modification C:\Windows\SysWOW64\wnfau.exe lgrkf.exe File created C:\Windows\SysWOW64\nkklb.exe jfgfc.exe File created C:\Windows\SysWOW64\pbbia.exe etnak.exe File created C:\Windows\SysWOW64\bdxze.exe ylerp.exe File created C:\Windows\SysWOW64\lktyh.exe gibfl.exe File opened for modification C:\Windows\SysWOW64\hboeg.exe bkhym.exe File created C:\Windows\SysWOW64\xwnjr.exe nmngy.exe File created C:\Windows\SysWOW64\aaiof.exe vvfqy.exe File opened for modification C:\Windows\SysWOW64\medbn.exe fefmn.exe File created C:\Windows\SysWOW64\hmgyj.exe clwfn.exe File opened for modification C:\Windows\SysWOW64\uxfzr.exe mskou.exe File opened for modification C:\Windows\SysWOW64\cfcki.exe uxfzr.exe File created C:\Windows\SysWOW64\dnizr.exe isddz.exe File created C:\Windows\SysWOW64\chzwa.exe aaiof.exe File created C:\Windows\SysWOW64\favkq.exe cyuos.exe File opened for modification C:\Windows\SysWOW64\cerzo.exe ziedw.exe File opened for modification C:\Windows\SysWOW64\vdljv.exe nkklb.exe File opened for modification C:\Windows\SysWOW64\oesrt.exe gougj.exe File created C:\Windows\SysWOW64\krjnc.exe idwnt.exe File opened for modification C:\Windows\SysWOW64\sacap.exe hqkxx.exe File created C:\Windows\SysWOW64\pgvmy.exe ijijb.exe File created C:\Windows\SysWOW64\ylerp.exe tgalq.exe File opened for modification C:\Windows\SysWOW64\ggwia.exe aqpvh.exe File opened for modification C:\Windows\SysWOW64\rmsty.exe kpgqb.exe File opened for modification C:\Windows\SysWOW64\rvous.exe goaek.exe File created C:\Windows\SysWOW64\blxpi.exe tsxro.exe File opened for modification C:\Windows\SysWOW64\cgovz.exe ppjvc.exe File opened for modification C:\Windows\SysWOW64\rwtfa.exe mubmw.exe File opened for modification C:\Windows\SysWOW64\jfgfc.exe blxpi.exe File opened for modification C:\Windows\SysWOW64\notff.exe lagfw.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 3344 set thread context of 444 3344 9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe 83 PID 3436 set thread context of 2608 3436 nyxxy.exe 87 PID 1048 set thread context of 1680 1048 mgxav.exe 91 PID 1256 set thread context of 2320 1256 mktqx.exe 93 PID 1828 set thread context of 3192 1828 saawq.exe 95 PID 1944 set thread context of 1524 1944 xckpm.exe 99 PID 2308 set thread context of 4664 2308 zxxke.exe 101 PID 884 set thread context of 4412 884 hryiz.exe 106 PID 4952 set thread context of 316 4952 flcbp.exe 108 PID 5040 set thread context of 1360 5040 mfdzj.exe 110 PID 2748 set thread context of 3984 2748 rkgfi.exe 112 PID 4344 set thread context of 4680 4344 xxcfy.exe 114 PID 1788 set thread context of 3160 1788 hwqax.exe 116 PID 1560 set thread context of 700 1560 peolo.exe 118 PID 1048 set thread context of 3996 1048 ropzm.exe 120 PID 2728 set thread context of 1856 2728 ukcue.exe 122 PID 4544 set thread context of 3136 4544 uzafv.exe 124 PID 1976 set thread context of 1072 1976 zqhlp.exe 126 PID 2548 set thread context of 452 2548 jpvgn.exe 128 PID 1824 set thread context of 1984 1824 mlacf.exe 130 PID 2384 set thread context of 3804 2384 orqki.exe 132 PID 1452 set thread context of 2976 1452 wlziu.exe 134 PID 1956 set thread context of 664 1956 wpoyw.exe 136 PID 1372 set thread context of 4316 1372 eiwwq.exe 138 PID 2896 set thread context of 4688 2896 jcppm.exe 140 PID 832 set thread context of 1216 832 gawug.exe 144 PID 2168 set thread context of 1176 2168 mnrvw.exe 146 PID 5032 set thread context of 4476 5032 tgalq.exe 149 PID 3204 set thread context of 224 3204 ylerp.exe 151 PID 1532 set thread context of 1976 1532 bdxze.exe 153 PID 3632 set thread context of 2548 3632 gibfl.exe 155 PID 2324 set thread context of 884 2324 lktyh.exe 157 PID 4528 set thread context of 3496 4528 tarjr.exe 159 PID 3640 set thread context of 868 3640 qnmjp.exe 161 PID 1860 set thread context of 2788 1860 sarkq.exe 163 PID 4848 set thread context of 3732 4848 aqpvh.exe 165 PID 1968 set thread context of 4740 1968 ggwia.exe 167 PID 804 set thread context of 4552 804 irxwy.exe 169 PID 5060 set thread context of 3052 5060 qkgus.exe 171 PID 1332 set thread context of 2168 1332 xdpsn.exe 173 PID 1972 set thread context of 1424 1972 ghcqb.exe 175 PID 3152 set thread context of 3528 3152 isddz.exe 177 PID 352 set thread context of 2216 352 dnizr.exe 179 PID 4348 set thread context of 548 4348 iparv.exe 181 PID 1308 set thread context of 3548 1308 qfycf.exe 183 PID 4384 set thread context of 3440 4384 vvfqy.exe 185 PID 836 set thread context of 4628 836 aaiof.exe 187 PID 1452 set thread context of 2716 1452 chzwa.exe 189 PID 1348 set thread context of 3504 1348 iqjkn.exe 191 PID 1252 set thread context of 1376 1252 stiso.exe 193 PID 1080 set thread context of 3704 1080 dbxiw.exe 195 PID 5052 set thread context of 4504 5052 acpbs.exe 198 PID 3212 set thread context of 2000 3212 cyuos.exe 200 PID 4636 set thread context of 2424 4636 favkq.exe 202 PID 3932 set thread context of 1476 3932 kycpj.exe 204 PID 992 set thread context of 232 992 ppjvc.exe 206 PID 812 set thread context of 2412 812 cgovz.exe 208 PID 3632 set thread context of 2084 3632 hevjs.exe 210 PID 3628 set thread context of 4384 3628 pxehm.exe 212 PID 3096 set thread context of 5096 3096 kpgqb.exe 214 PID 1808 set thread context of 1580 1808 rmsty.exe 216 PID 4324 set thread context of 1348 4324 ziedw.exe 218 PID 2912 set thread context of 4400 2912 cerzo.exe 220 PID 4284 set thread context of 1368 4284 jidcl.exe 222 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hryiz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kycpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iszde.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language clbeh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zxxke.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gawug.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rmsty.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wqlyw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jflch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yrcqo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iaxov.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language blxpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hwqax.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llhry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language snqiz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language medbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mzpwb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jfgfc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lagfw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xwnjr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pxehm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language orqki.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aqpvh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvfqy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbxiw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mubmw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lgrkf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nyxxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hdjqc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppjvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziedw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llhry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unpqp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mfdzj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qfycf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iqjkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pxehm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pgvmy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jcppm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language favkq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rvous.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lagfw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stiso.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fefmn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbjar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gougj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdpsn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ggwia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvfqy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfpha.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mlacf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdxze.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mlacf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language anjcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nvtww.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hevjs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pbbia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wxtpn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language saawq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tgalq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language isddz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nvtww.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zxxke.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 3344 9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe 3436 nyxxy.exe 1048 mgxav.exe 1256 mktqx.exe 1828 saawq.exe 1944 xckpm.exe 2308 zxxke.exe 884 hryiz.exe 4952 flcbp.exe 5040 mfdzj.exe 2748 rkgfi.exe 4344 xxcfy.exe 1788 hwqax.exe 1560 peolo.exe 1048 ropzm.exe 2728 ukcue.exe 4544 uzafv.exe 1976 zqhlp.exe 2548 jpvgn.exe 1824 mlacf.exe 2384 orqki.exe 1452 wlziu.exe 1956 wpoyw.exe 1372 eiwwq.exe 2896 jcppm.exe 832 gawug.exe 2168 mnrvw.exe 5032 tgalq.exe 3204 ylerp.exe 1532 bdxze.exe 3632 gibfl.exe 2324 lktyh.exe 4528 tarjr.exe 3640 qnmjp.exe 1860 sarkq.exe 4848 aqpvh.exe 1968 ggwia.exe 804 irxwy.exe 5060 qkgus.exe 1332 xdpsn.exe 1972 ghcqb.exe 3152 isddz.exe 352 dnizr.exe 4348 iparv.exe 1308 qfycf.exe 4384 vvfqy.exe 836 aaiof.exe 1452 chzwa.exe 1348 iqjkn.exe 1252 stiso.exe 1080 dbxiw.exe 5052 acpbs.exe 3212 cyuos.exe 4636 favkq.exe 3932 kycpj.exe 992 ppjvc.exe 812 cgovz.exe 3632 hevjs.exe 3628 pxehm.exe 3096 kpgqb.exe 1808 rmsty.exe 4324 ziedw.exe 2912 cerzo.exe 4284 jidcl.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3344 wrote to memory of 444 3344 9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe 83 PID 3344 wrote to memory of 444 3344 9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe 83 PID 3344 wrote to memory of 444 3344 9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe 83 PID 3344 wrote to memory of 444 3344 9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe 83 PID 3344 wrote to memory of 444 3344 9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe 83 PID 3344 wrote to memory of 444 3344 9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe 83 PID 3344 wrote to memory of 444 3344 9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe 83 PID 444 wrote to memory of 3436 444 9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe 84 PID 444 wrote to memory of 3436 444 9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe 84 PID 444 wrote to memory of 3436 444 9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe 84 PID 3436 wrote to memory of 2608 3436 nyxxy.exe 87 PID 3436 wrote to memory of 2608 3436 nyxxy.exe 87 PID 3436 wrote to memory of 2608 3436 nyxxy.exe 87 PID 3436 wrote to memory of 2608 3436 nyxxy.exe 87 PID 3436 wrote to memory of 2608 3436 nyxxy.exe 87 PID 3436 wrote to memory of 2608 3436 nyxxy.exe 87 PID 3436 wrote to memory of 2608 3436 nyxxy.exe 87 PID 2608 wrote to memory of 1048 2608 nyxxy.exe 88 PID 2608 wrote to memory of 1048 2608 nyxxy.exe 88 PID 2608 wrote to memory of 1048 2608 nyxxy.exe 88 PID 1048 wrote to memory of 1680 1048 mgxav.exe 91 PID 1048 wrote to memory of 1680 1048 mgxav.exe 91 PID 1048 wrote to memory of 1680 1048 mgxav.exe 91 PID 1048 wrote to memory of 1680 1048 mgxav.exe 91 PID 1048 wrote to memory of 1680 1048 mgxav.exe 91 PID 1048 wrote to memory of 1680 1048 mgxav.exe 91 PID 1048 wrote to memory of 1680 1048 mgxav.exe 91 PID 1680 wrote to memory of 1256 1680 mgxav.exe 92 PID 1680 wrote to memory of 1256 1680 mgxav.exe 92 PID 1680 wrote to memory of 1256 1680 mgxav.exe 92 PID 1256 wrote to memory of 2320 1256 mktqx.exe 93 PID 1256 wrote to memory of 2320 1256 mktqx.exe 93 PID 1256 wrote to memory of 2320 1256 mktqx.exe 93 PID 1256 wrote to memory of 2320 1256 mktqx.exe 93 PID 1256 wrote to memory of 2320 1256 mktqx.exe 93 PID 1256 wrote to memory of 2320 1256 mktqx.exe 93 PID 1256 wrote to memory of 2320 1256 mktqx.exe 93 PID 2320 wrote to memory of 1828 2320 mktqx.exe 94 PID 2320 wrote to memory of 1828 2320 mktqx.exe 94 PID 2320 wrote to memory of 1828 2320 mktqx.exe 94 PID 1828 wrote to memory of 3192 1828 saawq.exe 95 PID 1828 wrote to memory of 3192 1828 saawq.exe 95 PID 1828 wrote to memory of 3192 1828 saawq.exe 95 PID 1828 wrote to memory of 3192 1828 saawq.exe 95 PID 1828 wrote to memory of 3192 1828 saawq.exe 95 PID 1828 wrote to memory of 3192 1828 saawq.exe 95 PID 1828 wrote to memory of 3192 1828 saawq.exe 95 PID 3192 wrote to memory of 1944 3192 saawq.exe 96 PID 3192 wrote to memory of 1944 3192 saawq.exe 96 PID 3192 wrote to memory of 1944 3192 saawq.exe 96 PID 1944 wrote to memory of 1524 1944 xckpm.exe 99 PID 1944 wrote to memory of 1524 1944 xckpm.exe 99 PID 1944 wrote to memory of 1524 1944 xckpm.exe 99 PID 1944 wrote to memory of 1524 1944 xckpm.exe 99 PID 1944 wrote to memory of 1524 1944 xckpm.exe 99 PID 1944 wrote to memory of 1524 1944 xckpm.exe 99 PID 1944 wrote to memory of 1524 1944 xckpm.exe 99 PID 1524 wrote to memory of 2308 1524 xckpm.exe 100 PID 1524 wrote to memory of 2308 1524 xckpm.exe 100 PID 1524 wrote to memory of 2308 1524 xckpm.exe 100 PID 2308 wrote to memory of 4664 2308 zxxke.exe 101 PID 2308 wrote to memory of 4664 2308 zxxke.exe 101 PID 2308 wrote to memory of 4664 2308 zxxke.exe 101 PID 2308 wrote to memory of 4664 2308 zxxke.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe2⤵
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Windows\SysWOW64\nyxxy.exeC:\Windows\system32\nyxxy.exe 1000 "C:\Users\Admin\AppData\Local\Temp\9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\SysWOW64\nyxxy.exeC:\Windows\SysWOW64\nyxxy.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\mgxav.exeC:\Windows\system32\mgxav.exe 1044 "C:\Windows\SysWOW64\nyxxy.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\mgxav.exeC:\Windows\SysWOW64\mgxav.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\mktqx.exeC:\Windows\system32\mktqx.exe 1152 "C:\Windows\SysWOW64\mgxav.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\mktqx.exeC:\Windows\SysWOW64\mktqx.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\saawq.exeC:\Windows\system32\saawq.exe 1156 "C:\Windows\SysWOW64\mktqx.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\SysWOW64\saawq.exeC:\Windows\SysWOW64\saawq.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\SysWOW64\xckpm.exeC:\Windows\system32\xckpm.exe 1156 "C:\Windows\SysWOW64\saawq.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\xckpm.exeC:\Windows\SysWOW64\xckpm.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\zxxke.exeC:\Windows\system32\zxxke.exe 1148 "C:\Windows\SysWOW64\xckpm.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\zxxke.exeC:\Windows\SysWOW64\zxxke.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4664 -
C:\Windows\SysWOW64\hryiz.exeC:\Windows\system32\hryiz.exe 1044 "C:\Windows\SysWOW64\zxxke.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:884 -
C:\Windows\SysWOW64\hryiz.exeC:\Windows\SysWOW64\hryiz.exe16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4412 -
C:\Windows\SysWOW64\flcbp.exeC:\Windows\system32\flcbp.exe 1040 "C:\Windows\SysWOW64\hryiz.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4952 -
C:\Windows\SysWOW64\flcbp.exeC:\Windows\SysWOW64\flcbp.exe18⤵
- Executes dropped EXE
PID:316 -
C:\Windows\SysWOW64\mfdzj.exeC:\Windows\system32\mfdzj.exe 1016 "C:\Windows\SysWOW64\flcbp.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5040 -
C:\Windows\SysWOW64\mfdzj.exeC:\Windows\SysWOW64\mfdzj.exe20⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1360 -
C:\Windows\SysWOW64\rkgfi.exeC:\Windows\system32\rkgfi.exe 1148 "C:\Windows\SysWOW64\mfdzj.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2748 -
C:\Windows\SysWOW64\rkgfi.exeC:\Windows\SysWOW64\rkgfi.exe22⤵
- Executes dropped EXE
PID:3984 -
C:\Windows\SysWOW64\xxcfy.exeC:\Windows\system32\xxcfy.exe 1020 "C:\Windows\SysWOW64\rkgfi.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4344 -
C:\Windows\SysWOW64\xxcfy.exeC:\Windows\SysWOW64\xxcfy.exe24⤵
- Executes dropped EXE
PID:4680 -
C:\Windows\SysWOW64\hwqax.exeC:\Windows\system32\hwqax.exe 1016 "C:\Windows\SysWOW64\xxcfy.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1788 -
C:\Windows\SysWOW64\hwqax.exeC:\Windows\SysWOW64\hwqax.exe26⤵
- Executes dropped EXE
PID:3160 -
C:\Windows\SysWOW64\peolo.exeC:\Windows\system32\peolo.exe 1016 "C:\Windows\SysWOW64\hwqax.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1560 -
C:\Windows\SysWOW64\peolo.exeC:\Windows\SysWOW64\peolo.exe28⤵
- Executes dropped EXE
PID:700 -
C:\Windows\SysWOW64\ropzm.exeC:\Windows\system32\ropzm.exe 1016 "C:\Windows\SysWOW64\peolo.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1048 -
C:\Windows\SysWOW64\ropzm.exeC:\Windows\SysWOW64\ropzm.exe30⤵
- Executes dropped EXE
PID:3996 -
C:\Windows\SysWOW64\ukcue.exeC:\Windows\system32\ukcue.exe 988 "C:\Windows\SysWOW64\ropzm.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2728 -
C:\Windows\SysWOW64\ukcue.exeC:\Windows\SysWOW64\ukcue.exe32⤵
- Executes dropped EXE
PID:1856 -
C:\Windows\SysWOW64\uzafv.exeC:\Windows\system32\uzafv.exe 1032 "C:\Windows\SysWOW64\ukcue.exe"33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4544 -
C:\Windows\SysWOW64\uzafv.exeC:\Windows\SysWOW64\uzafv.exe34⤵
- Executes dropped EXE
PID:3136 -
C:\Windows\SysWOW64\zqhlp.exeC:\Windows\system32\zqhlp.exe 1016 "C:\Windows\SysWOW64\uzafv.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1976 -
C:\Windows\SysWOW64\zqhlp.exeC:\Windows\SysWOW64\zqhlp.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1072 -
C:\Windows\SysWOW64\jpvgn.exeC:\Windows\system32\jpvgn.exe 1028 "C:\Windows\SysWOW64\zqhlp.exe"37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2548 -
C:\Windows\SysWOW64\jpvgn.exeC:\Windows\SysWOW64\jpvgn.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:452 -
C:\Windows\SysWOW64\mlacf.exeC:\Windows\system32\mlacf.exe 1148 "C:\Windows\SysWOW64\jpvgn.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1824 -
C:\Windows\SysWOW64\mlacf.exeC:\Windows\SysWOW64\mlacf.exe40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1984 -
C:\Windows\SysWOW64\orqki.exeC:\Windows\system32\orqki.exe 1028 "C:\Windows\SysWOW64\mlacf.exe"41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2384 -
C:\Windows\SysWOW64\orqki.exeC:\Windows\SysWOW64\orqki.exe42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3804 -
C:\Windows\SysWOW64\wlziu.exeC:\Windows\system32\wlziu.exe 1148 "C:\Windows\SysWOW64\orqki.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1452 -
C:\Windows\SysWOW64\wlziu.exeC:\Windows\SysWOW64\wlziu.exe44⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2976 -
C:\Windows\SysWOW64\wpoyw.exeC:\Windows\system32\wpoyw.exe 1020 "C:\Windows\SysWOW64\wlziu.exe"45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1956 -
C:\Windows\SysWOW64\wpoyw.exeC:\Windows\SysWOW64\wpoyw.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:664 -
C:\Windows\SysWOW64\eiwwq.exeC:\Windows\system32\eiwwq.exe 1148 "C:\Windows\SysWOW64\wpoyw.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1372 -
C:\Windows\SysWOW64\eiwwq.exeC:\Windows\SysWOW64\eiwwq.exe48⤵
- Executes dropped EXE
PID:4316 -
C:\Windows\SysWOW64\jcppm.exeC:\Windows\system32\jcppm.exe 1028 "C:\Windows\SysWOW64\eiwwq.exe"49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2896 -
C:\Windows\SysWOW64\jcppm.exeC:\Windows\SysWOW64\jcppm.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4688 -
C:\Windows\SysWOW64\gawug.exeC:\Windows\system32\gawug.exe 1148 "C:\Windows\SysWOW64\jcppm.exe"51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:832 -
C:\Windows\SysWOW64\gawug.exeC:\Windows\SysWOW64\gawug.exe52⤵
- Executes dropped EXE
PID:1216 -
C:\Windows\SysWOW64\mnrvw.exeC:\Windows\system32\mnrvw.exe 1148 "C:\Windows\SysWOW64\gawug.exe"53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2168 -
C:\Windows\SysWOW64\mnrvw.exeC:\Windows\SysWOW64\mnrvw.exe54⤵
- Executes dropped EXE
PID:1176 -
C:\Windows\SysWOW64\tgalq.exeC:\Windows\system32\tgalq.exe 1148 "C:\Windows\SysWOW64\mnrvw.exe"55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:5032 -
C:\Windows\SysWOW64\tgalq.exeC:\Windows\SysWOW64\tgalq.exe56⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4476 -
C:\Windows\SysWOW64\ylerp.exeC:\Windows\system32\ylerp.exe 1152 "C:\Windows\SysWOW64\tgalq.exe"57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3204 -
C:\Windows\SysWOW64\ylerp.exeC:\Windows\SysWOW64\ylerp.exe58⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:224 -
C:\Windows\SysWOW64\bdxze.exeC:\Windows\system32\bdxze.exe 1148 "C:\Windows\SysWOW64\ylerp.exe"59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1532 -
C:\Windows\SysWOW64\bdxze.exeC:\Windows\SysWOW64\bdxze.exe60⤵
- Executes dropped EXE
PID:1976 -
C:\Windows\SysWOW64\gibfl.exeC:\Windows\system32\gibfl.exe 1152 "C:\Windows\SysWOW64\bdxze.exe"61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3632 -
C:\Windows\SysWOW64\gibfl.exeC:\Windows\SysWOW64\gibfl.exe62⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2548 -
C:\Windows\SysWOW64\lktyh.exeC:\Windows\system32\lktyh.exe 1036 "C:\Windows\SysWOW64\gibfl.exe"63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2324 -
C:\Windows\SysWOW64\lktyh.exeC:\Windows\SysWOW64\lktyh.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:884 -
C:\Windows\SysWOW64\tarjr.exeC:\Windows\system32\tarjr.exe 1152 "C:\Windows\SysWOW64\lktyh.exe"65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4528 -
C:\Windows\SysWOW64\tarjr.exeC:\Windows\SysWOW64\tarjr.exe66⤵
- Executes dropped EXE
PID:3496 -
C:\Windows\SysWOW64\qnmjp.exeC:\Windows\system32\qnmjp.exe 1040 "C:\Windows\SysWOW64\tarjr.exe"67⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3640 -
C:\Windows\SysWOW64\qnmjp.exeC:\Windows\SysWOW64\qnmjp.exe68⤵PID:868
-
C:\Windows\SysWOW64\sarkq.exeC:\Windows\system32\sarkq.exe 1112 "C:\Windows\SysWOW64\qnmjp.exe"69⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1860 -
C:\Windows\SysWOW64\sarkq.exeC:\Windows\SysWOW64\sarkq.exe70⤵PID:2788
-
C:\Windows\SysWOW64\aqpvh.exeC:\Windows\system32\aqpvh.exe 1032 "C:\Windows\SysWOW64\sarkq.exe"71⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4848 -
C:\Windows\SysWOW64\aqpvh.exeC:\Windows\SysWOW64\aqpvh.exe72⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3732 -
C:\Windows\SysWOW64\ggwia.exeC:\Windows\system32\ggwia.exe 1160 "C:\Windows\SysWOW64\aqpvh.exe"73⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1968 -
C:\Windows\SysWOW64\ggwia.exeC:\Windows\SysWOW64\ggwia.exe74⤵
- System Location Discovery: System Language Discovery
PID:4740 -
C:\Windows\SysWOW64\irxwy.exeC:\Windows\system32\irxwy.exe 1036 "C:\Windows\SysWOW64\ggwia.exe"75⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:804 -
C:\Windows\SysWOW64\irxwy.exeC:\Windows\SysWOW64\irxwy.exe76⤵PID:4552
-
C:\Windows\SysWOW64\qkgus.exeC:\Windows\system32\qkgus.exe 1036 "C:\Windows\SysWOW64\irxwy.exe"77⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:5060 -
C:\Windows\SysWOW64\qkgus.exeC:\Windows\SysWOW64\qkgus.exe78⤵
- Drops file in System32 directory
PID:3052 -
C:\Windows\SysWOW64\xdpsn.exeC:\Windows\system32\xdpsn.exe 1148 "C:\Windows\SysWOW64\qkgus.exe"79⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1332 -
C:\Windows\SysWOW64\xdpsn.exeC:\Windows\SysWOW64\xdpsn.exe80⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2168 -
C:\Windows\SysWOW64\ghcqb.exeC:\Windows\system32\ghcqb.exe 1020 "C:\Windows\SysWOW64\xdpsn.exe"81⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1972 -
C:\Windows\SysWOW64\ghcqb.exeC:\Windows\SysWOW64\ghcqb.exe82⤵
- Drops file in System32 directory
PID:1424 -
C:\Windows\SysWOW64\isddz.exeC:\Windows\system32\isddz.exe 1156 "C:\Windows\SysWOW64\ghcqb.exe"83⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3152 -
C:\Windows\SysWOW64\isddz.exeC:\Windows\SysWOW64\isddz.exe84⤵
- Drops file in System32 directory
PID:3528 -
C:\Windows\SysWOW64\dnizr.exeC:\Windows\system32\dnizr.exe 1032 "C:\Windows\SysWOW64\isddz.exe"85⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:352 -
C:\Windows\SysWOW64\dnizr.exeC:\Windows\SysWOW64\dnizr.exe86⤵PID:2216
-
C:\Windows\SysWOW64\iparv.exeC:\Windows\system32\iparv.exe 1148 "C:\Windows\SysWOW64\dnizr.exe"87⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4348 -
C:\Windows\SysWOW64\iparv.exeC:\Windows\SysWOW64\iparv.exe88⤵PID:548
-
C:\Windows\SysWOW64\qfycf.exeC:\Windows\system32\qfycf.exe 1056 "C:\Windows\SysWOW64\iparv.exe"89⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1308 -
C:\Windows\SysWOW64\qfycf.exeC:\Windows\SysWOW64\qfycf.exe90⤵PID:3548
-
C:\Windows\SysWOW64\vvfqy.exeC:\Windows\system32\vvfqy.exe 1016 "C:\Windows\SysWOW64\qfycf.exe"91⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4384 -
C:\Windows\SysWOW64\vvfqy.exeC:\Windows\SysWOW64\vvfqy.exe92⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3440 -
C:\Windows\SysWOW64\aaiof.exeC:\Windows\system32\aaiof.exe 1032 "C:\Windows\SysWOW64\vvfqy.exe"93⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:836 -
C:\Windows\SysWOW64\aaiof.exeC:\Windows\SysWOW64\aaiof.exe94⤵
- Drops file in System32 directory
PID:4628 -
C:\Windows\SysWOW64\chzwa.exeC:\Windows\system32\chzwa.exe 1148 "C:\Windows\SysWOW64\aaiof.exe"95⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1452 -
C:\Windows\SysWOW64\chzwa.exeC:\Windows\SysWOW64\chzwa.exe96⤵PID:2716
-
C:\Windows\SysWOW64\iqjkn.exeC:\Windows\system32\iqjkn.exe 1044 "C:\Windows\SysWOW64\chzwa.exe"97⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1348 -
C:\Windows\SysWOW64\iqjkn.exeC:\Windows\SysWOW64\iqjkn.exe98⤵
- System Location Discovery: System Language Discovery
PID:3504 -
C:\Windows\SysWOW64\stiso.exeC:\Windows\system32\stiso.exe 1016 "C:\Windows\SysWOW64\iqjkn.exe"99⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1252 -
C:\Windows\SysWOW64\stiso.exeC:\Windows\SysWOW64\stiso.exe100⤵
- System Location Discovery: System Language Discovery
PID:1376 -
C:\Windows\SysWOW64\dbxiw.exeC:\Windows\system32\dbxiw.exe 1016 "C:\Windows\SysWOW64\stiso.exe"101⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1080 -
C:\Windows\SysWOW64\dbxiw.exeC:\Windows\SysWOW64\dbxiw.exe102⤵
- Drops file in System32 directory
PID:3704 -
C:\Windows\SysWOW64\acpbs.exeC:\Windows\system32\acpbs.exe 1148 "C:\Windows\SysWOW64\dbxiw.exe"103⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:5052 -
C:\Windows\SysWOW64\acpbs.exeC:\Windows\SysWOW64\acpbs.exe104⤵PID:4504
-
C:\Windows\SysWOW64\cyuos.exeC:\Windows\system32\cyuos.exe 1156 "C:\Windows\SysWOW64\acpbs.exe"105⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3212 -
C:\Windows\SysWOW64\cyuos.exeC:\Windows\SysWOW64\cyuos.exe106⤵
- Drops file in System32 directory
PID:2000 -
C:\Windows\SysWOW64\favkq.exeC:\Windows\system32\favkq.exe 1184 "C:\Windows\SysWOW64\cyuos.exe"107⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4636 -
C:\Windows\SysWOW64\favkq.exeC:\Windows\SysWOW64\favkq.exe108⤵
- System Location Discovery: System Language Discovery
PID:2424 -
C:\Windows\SysWOW64\kycpj.exeC:\Windows\system32\kycpj.exe 1032 "C:\Windows\SysWOW64\favkq.exe"109⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3932 -
C:\Windows\SysWOW64\kycpj.exeC:\Windows\SysWOW64\kycpj.exe110⤵
- System Location Discovery: System Language Discovery
PID:1476 -
C:\Windows\SysWOW64\ppjvc.exeC:\Windows\system32\ppjvc.exe 1044 "C:\Windows\SysWOW64\kycpj.exe"111⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:992 -
C:\Windows\SysWOW64\ppjvc.exeC:\Windows\SysWOW64\ppjvc.exe112⤵
- Drops file in System32 directory
PID:232 -
C:\Windows\SysWOW64\cgovz.exeC:\Windows\system32\cgovz.exe 1032 "C:\Windows\SysWOW64\ppjvc.exe"113⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:812 -
C:\Windows\SysWOW64\cgovz.exeC:\Windows\SysWOW64\cgovz.exe114⤵
- Drops file in System32 directory
PID:2412 -
C:\Windows\SysWOW64\hevjs.exeC:\Windows\system32\hevjs.exe 1120 "C:\Windows\SysWOW64\cgovz.exe"115⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3632 -
C:\Windows\SysWOW64\hevjs.exeC:\Windows\SysWOW64\hevjs.exe116⤵
- System Location Discovery: System Language Discovery
PID:2084 -
C:\Windows\SysWOW64\pxehm.exeC:\Windows\system32\pxehm.exe 1020 "C:\Windows\SysWOW64\hevjs.exe"117⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3628 -
C:\Windows\SysWOW64\pxehm.exeC:\Windows\SysWOW64\pxehm.exe118⤵
- System Location Discovery: System Language Discovery
PID:4384 -
C:\Windows\SysWOW64\kpgqb.exeC:\Windows\system32\kpgqb.exe 1040 "C:\Windows\SysWOW64\pxehm.exe"119⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3096 -
C:\Windows\SysWOW64\kpgqb.exeC:\Windows\SysWOW64\kpgqb.exe120⤵
- Drops file in System32 directory
PID:5096 -
C:\Windows\SysWOW64\rmsty.exeC:\Windows\system32\rmsty.exe 1040 "C:\Windows\SysWOW64\kpgqb.exe"121⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1808 -
C:\Windows\SysWOW64\rmsty.exeC:\Windows\SysWOW64\rmsty.exe122⤵
- System Location Discovery: System Language Discovery
PID:1580
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-