Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 07:54
Behavioral task
behavioral1
Sample
a6c084313af9004bd93f950d402325f1_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a6c084313af9004bd93f950d402325f1_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a6c084313af9004bd93f950d402325f1_JaffaCakes118.exe
-
Size
147KB
-
MD5
a6c084313af9004bd93f950d402325f1
-
SHA1
700aad3dd08576087be3a670fc9934ad69c4619e
-
SHA256
f4fb97402cc99bd0a29647458d556b3eec9cc5765e552dab9b459b222107e2ec
-
SHA512
495078dadc3861cc7c910548bf98d011ca58a7a5aa8d34eeda32dc9e9770a7b88bfd920300957ed7979f0f03018ee6013b15c9443ef03e45896cb08d7bbbbf00
-
SSDEEP
3072:HrwKSBk6KYLYkl8V127uRIdyl9Tm5lLgCUgHxryoJHE:HrwKMk6jY1V8uiQ7EJUmwoO
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
resource yara_rule behavioral2/files/0x000c000000023ba7-5.dat aspack_v212_v242 -
Executes dropped EXE 64 IoCs
pid Process 5028 yhaum.exe 2212 igfsf.exe 4408 vqlci.exe 368 idcsn.exe 2812 qkqka.exe 3040 agrdp.exe 1536 qwclo.exe 1300 avgig.exe 1648 qwdqi.exe 1180 agtav.exe 1812 ntkqb.exe 4024 agcgg.exe 3584 lfgdr.exe 1628 xebgh.exe 1892 izcyp.exe 960 yektt.exe 4924 lrtjz.exe 3432 vbjtm.exe 3744 ioajs.exe 1660 soehc.exe 4660 iobpd.exe 1688 szrzz.exe 3092 dvsrg.exe 3748 tzamk.exe 4176 dvtxs.exe 3348 qxzmd.exe 2252 dyfpg.exe 2532 njuab.exe 4544 xevkj.exe 2988 krnip.exe 1152 vngsw.exe 1120 iaxic.exe 4508 szbfv.exe 4112 futva.exe 4848 thltg.exe 2096 dgpqr.exe 1592 qtggw.exe 2564 dsbjf.exe 708 qftyl.exe 1292 aalja.exe 4512 nrolj.exe 4148 apjos.exe 4364 konlc.exe 3280 xbfji.exe 4964 ksamq.exe 3644 qbgpt.exe 2936 aismm.exe 2956 nvccs.exe 744 aitzx.exe 3396 khxxi.exe 4864 yupno.exe 1928 hfexj.exe 60 vswnp.exe 1796 iffcv.exe 1276 vsxsa.exe 540 fdmco.exe 4220 pvcia.exe 3480 fzcdw.exe 1524 sqfgf.exe 1184 cxjdx.exe 184 pnmgg.exe 2900 cavvm.exe 3300 qnnls.exe 4560 auric.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\xvkjr.exe nlvze.exe File opened for modification C:\Windows\SysWOW64\snewh.exe famyb.exe File created C:\Windows\SysWOW64\klkpd.exe xyszx.exe File opened for modification C:\Windows\SysWOW64\yhsru.exe kuaco.exe File opened for modification C:\Windows\SysWOW64\hygps.exe vadmj.exe File created C:\Windows\SysWOW64\idcsn.exe vqlci.exe File opened for modification C:\Windows\SysWOW64\famyb.exe tvvdn.exe File created C:\Windows\SysWOW64\rpuzr.exe iewpd.exe File created C:\Windows\SysWOW64\hzqpj.exe umyzv.exe File created C:\Windows\SysWOW64\xytej.exe klkpd.exe File created C:\Windows\SysWOW64\fceui.exe spvec.exe File created C:\Windows\SysWOW64\dffqz.exe tgbtp.exe File opened for modification C:\Windows\SysWOW64\emiep.exe ukttu.exe File opened for modification C:\Windows\SysWOW64\ouvxo.exe evjzw.exe File opened for modification C:\Windows\SysWOW64\fplwm.exe uqzzb.exe File opened for modification C:\Windows\SysWOW64\qqvbx.exe daagh.exe File created C:\Windows\SysWOW64\uwaec.exe llluo.exe File opened for modification C:\Windows\SysWOW64\nyxyr.exe dnaow.exe File created C:\Windows\SysWOW64\mvwly.exe zievs.exe File opened for modification C:\Windows\SysWOW64\zgcvr.exe mtkfl.exe File created C:\Windows\SysWOW64\oxdrx.exe acmts.exe File created C:\Windows\SysWOW64\qzpcj.exe ikucp.exe File created C:\Windows\SysWOW64\ffust.exe sdoli.exe File opened for modification C:\Windows\SysWOW64\evjzw.exe riacq.exe File created C:\Windows\SysWOW64\oogcx.exe abomr.exe File opened for modification C:\Windows\SysWOW64\ffvgf.exe ssmqz.exe File created C:\Windows\SysWOW64\vsxsa.exe iffcv.exe File created C:\Windows\SysWOW64\sqfgf.exe fzcdw.exe File created C:\Windows\SysWOW64\tsjnu.exe gxaqo.exe File opened for modification C:\Windows\SysWOW64\ekdoi.exe rxlyd.exe File created C:\Windows\SysWOW64\vqlci.exe igfsf.exe File created C:\Windows\SysWOW64\cszfk.exe lrcxj.exe File created C:\Windows\SysWOW64\jawvk.exe zqhlp.exe File created C:\Windows\SysWOW64\lsafk.exe zcfcb.exe File created C:\Windows\SysWOW64\jaskb.exe vnavw.exe File opened for modification C:\Windows\SysWOW64\kgnwf.exe ahjyv.exe File opened for modification C:\Windows\SysWOW64\xxqyo.exe kgnwf.exe File opened for modification C:\Windows\SysWOW64\jprgs.exe wcarm.exe File opened for modification C:\Windows\SysWOW64\rhvab.exe eumkv.exe File opened for modification C:\Windows\SysWOW64\lfgdr.exe agcgg.exe File opened for modification C:\Windows\SysWOW64\zhzcs.exe muinm.exe File opened for modification C:\Windows\SysWOW64\gxcyk.exe snewh.exe File opened for modification C:\Windows\SysWOW64\enimk.exe uktbx.exe File created C:\Windows\SysWOW64\gxaqo.exe tkiai.exe File created C:\Windows\SysWOW64\aclog.exe qzvel.exe File created C:\Windows\SysWOW64\dqlkd.exe sgvfy.exe File opened for modification C:\Windows\SysWOW64\pofkq.exe ctwvk.exe File created C:\Windows\SysWOW64\djert.exe pwntn.exe File opened for modification C:\Windows\SysWOW64\ekcsi.exe czmiv.exe File created C:\Windows\SysWOW64\cirsh.exe pvhdb.exe File created C:\Windows\SysWOW64\gtrmg.exe tgzoa.exe File opened for modification C:\Windows\SysWOW64\ckxnz.exe pxoyt.exe File created C:\Windows\SysWOW64\xcjwx.exe jprgs.exe File created C:\Windows\SysWOW64\ubolz.exe howwt.exe File opened for modification C:\Windows\SysWOW64\fwpiq.exe sjykc.exe File opened for modification C:\Windows\SysWOW64\scecd.exe iglsv.exe File opened for modification C:\Windows\SysWOW64\ctbgl.exe pgsif.exe File opened for modification C:\Windows\SysWOW64\zrjlq.exe meawk.exe File opened for modification C:\Windows\SysWOW64\qqyws.exe ldghe.exe File opened for modification C:\Windows\SysWOW64\sqfgf.exe fzcdw.exe File created C:\Windows\SysWOW64\iztft.exe dqlkd.exe File opened for modification C:\Windows\SysWOW64\iewpd.exe urnzy.exe File created C:\Windows\SysWOW64\wlzqy.exe jyias.exe File opened for modification C:\Windows\SysWOW64\fxmjx.exe sccmr.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language evmob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sdstn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ydbmm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iewpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uarkk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language khxxi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fgvvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hdzhd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ukttu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gnqyb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llfcy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apmcg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbxiw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xvkjr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qzmiq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ckwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language srbqy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hoxbf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dnmze.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language akiti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bsqay.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tysfd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language itung.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drzrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bqhwe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ccafx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rftha.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language onzyl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fesas.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ykzul.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmcfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hevjs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jprgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language majar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kiczx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eoteq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pykzi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gyejo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ypshr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qgpjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksamq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nqnru.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language emiep.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language elhzj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qzkip.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aiygv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thltg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lbepw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hcohb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rzuup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jyias.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ncvfs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kgnwf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcarm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qehbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apjos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctwvk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zpdqg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hyfoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qeoez.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dffqz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddyoj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iyhud.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language utspe.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5076 wrote to memory of 5028 5076 a6c084313af9004bd93f950d402325f1_JaffaCakes118.exe 82 PID 5076 wrote to memory of 5028 5076 a6c084313af9004bd93f950d402325f1_JaffaCakes118.exe 82 PID 5076 wrote to memory of 5028 5076 a6c084313af9004bd93f950d402325f1_JaffaCakes118.exe 82 PID 5028 wrote to memory of 2212 5028 yhaum.exe 83 PID 5028 wrote to memory of 2212 5028 yhaum.exe 83 PID 5028 wrote to memory of 2212 5028 yhaum.exe 83 PID 2212 wrote to memory of 4408 2212 igfsf.exe 84 PID 2212 wrote to memory of 4408 2212 igfsf.exe 84 PID 2212 wrote to memory of 4408 2212 igfsf.exe 84 PID 4408 wrote to memory of 368 4408 vqlci.exe 85 PID 4408 wrote to memory of 368 4408 vqlci.exe 85 PID 4408 wrote to memory of 368 4408 vqlci.exe 85 PID 368 wrote to memory of 2812 368 idcsn.exe 86 PID 368 wrote to memory of 2812 368 idcsn.exe 86 PID 368 wrote to memory of 2812 368 idcsn.exe 86 PID 2812 wrote to memory of 3040 2812 qkqka.exe 87 PID 2812 wrote to memory of 3040 2812 qkqka.exe 87 PID 2812 wrote to memory of 3040 2812 qkqka.exe 87 PID 3040 wrote to memory of 1536 3040 agrdp.exe 88 PID 3040 wrote to memory of 1536 3040 agrdp.exe 88 PID 3040 wrote to memory of 1536 3040 agrdp.exe 88 PID 1536 wrote to memory of 1300 1536 qwclo.exe 89 PID 1536 wrote to memory of 1300 1536 qwclo.exe 89 PID 1536 wrote to memory of 1300 1536 qwclo.exe 89 PID 1300 wrote to memory of 1648 1300 avgig.exe 90 PID 1300 wrote to memory of 1648 1300 avgig.exe 90 PID 1300 wrote to memory of 1648 1300 avgig.exe 90 PID 1648 wrote to memory of 1180 1648 qwdqi.exe 91 PID 1648 wrote to memory of 1180 1648 qwdqi.exe 91 PID 1648 wrote to memory of 1180 1648 qwdqi.exe 91 PID 1180 wrote to memory of 1812 1180 agtav.exe 92 PID 1180 wrote to memory of 1812 1180 agtav.exe 92 PID 1180 wrote to memory of 1812 1180 agtav.exe 92 PID 1812 wrote to memory of 4024 1812 ntkqb.exe 93 PID 1812 wrote to memory of 4024 1812 ntkqb.exe 93 PID 1812 wrote to memory of 4024 1812 ntkqb.exe 93 PID 4024 wrote to memory of 3584 4024 agcgg.exe 94 PID 4024 wrote to memory of 3584 4024 agcgg.exe 94 PID 4024 wrote to memory of 3584 4024 agcgg.exe 94 PID 3584 wrote to memory of 1628 3584 lfgdr.exe 95 PID 3584 wrote to memory of 1628 3584 lfgdr.exe 95 PID 3584 wrote to memory of 1628 3584 lfgdr.exe 95 PID 1628 wrote to memory of 1892 1628 xebgh.exe 96 PID 1628 wrote to memory of 1892 1628 xebgh.exe 96 PID 1628 wrote to memory of 1892 1628 xebgh.exe 96 PID 1892 wrote to memory of 960 1892 izcyp.exe 97 PID 1892 wrote to memory of 960 1892 izcyp.exe 97 PID 1892 wrote to memory of 960 1892 izcyp.exe 97 PID 960 wrote to memory of 4924 960 yektt.exe 98 PID 960 wrote to memory of 4924 960 yektt.exe 98 PID 960 wrote to memory of 4924 960 yektt.exe 98 PID 4924 wrote to memory of 3432 4924 lrtjz.exe 99 PID 4924 wrote to memory of 3432 4924 lrtjz.exe 99 PID 4924 wrote to memory of 3432 4924 lrtjz.exe 99 PID 3432 wrote to memory of 3744 3432 vbjtm.exe 102 PID 3432 wrote to memory of 3744 3432 vbjtm.exe 102 PID 3432 wrote to memory of 3744 3432 vbjtm.exe 102 PID 3744 wrote to memory of 1660 3744 ioajs.exe 103 PID 3744 wrote to memory of 1660 3744 ioajs.exe 103 PID 3744 wrote to memory of 1660 3744 ioajs.exe 103 PID 1660 wrote to memory of 4660 1660 soehc.exe 104 PID 1660 wrote to memory of 4660 1660 soehc.exe 104 PID 1660 wrote to memory of 4660 1660 soehc.exe 104 PID 4660 wrote to memory of 1688 4660 iobpd.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6c084313af9004bd93f950d402325f1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a6c084313af9004bd93f950d402325f1_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\yhaum.exeC:\Windows\system32\yhaum.exe 1164 "C:\Users\Admin\AppData\Local\Temp\a6c084313af9004bd93f950d402325f1_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\SysWOW64\igfsf.exeC:\Windows\system32\igfsf.exe 1152 "C:\Windows\SysWOW64\yhaum.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\vqlci.exeC:\Windows\system32\vqlci.exe 1160 "C:\Windows\SysWOW64\igfsf.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\SysWOW64\idcsn.exeC:\Windows\system32\idcsn.exe 1156 "C:\Windows\SysWOW64\vqlci.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Windows\SysWOW64\qkqka.exeC:\Windows\system32\qkqka.exe 1168 "C:\Windows\SysWOW64\idcsn.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\agrdp.exeC:\Windows\system32\agrdp.exe 1148 "C:\Windows\SysWOW64\qkqka.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\qwclo.exeC:\Windows\system32\qwclo.exe 1176 "C:\Windows\SysWOW64\agrdp.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\avgig.exeC:\Windows\system32\avgig.exe 1172 "C:\Windows\SysWOW64\qwclo.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\qwdqi.exeC:\Windows\system32\qwdqi.exe 1180 "C:\Windows\SysWOW64\avgig.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\agtav.exeC:\Windows\system32\agtav.exe 1184 "C:\Windows\SysWOW64\qwdqi.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\ntkqb.exeC:\Windows\system32\ntkqb.exe 1192 "C:\Windows\SysWOW64\agtav.exe"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\agcgg.exeC:\Windows\system32\agcgg.exe 1196 "C:\Windows\SysWOW64\ntkqb.exe"13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\SysWOW64\lfgdr.exeC:\Windows\system32\lfgdr.exe 1204 "C:\Windows\SysWOW64\agcgg.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\SysWOW64\xebgh.exeC:\Windows\system32\xebgh.exe 1140 "C:\Windows\SysWOW64\lfgdr.exe"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\izcyp.exeC:\Windows\system32\izcyp.exe 1208 "C:\Windows\SysWOW64\xebgh.exe"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\yektt.exeC:\Windows\system32\yektt.exe 1212 "C:\Windows\SysWOW64\izcyp.exe"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\lrtjz.exeC:\Windows\system32\lrtjz.exe 1216 "C:\Windows\SysWOW64\yektt.exe"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\SysWOW64\vbjtm.exeC:\Windows\system32\vbjtm.exe 1220 "C:\Windows\SysWOW64\lrtjz.exe"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\SysWOW64\ioajs.exeC:\Windows\system32\ioajs.exe 1200 "C:\Windows\SysWOW64\vbjtm.exe"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Windows\SysWOW64\soehc.exeC:\Windows\system32\soehc.exe 1228 "C:\Windows\SysWOW64\ioajs.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\iobpd.exeC:\Windows\system32\iobpd.exe 1232 "C:\Windows\SysWOW64\soehc.exe"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\SysWOW64\szrzz.exeC:\Windows\system32\szrzz.exe 1224 "C:\Windows\SysWOW64\iobpd.exe"23⤵
- Executes dropped EXE
PID:1688 -
C:\Windows\SysWOW64\dvsrg.exeC:\Windows\system32\dvsrg.exe 1236 "C:\Windows\SysWOW64\szrzz.exe"24⤵
- Executes dropped EXE
PID:3092 -
C:\Windows\SysWOW64\tzamk.exeC:\Windows\system32\tzamk.exe 1244 "C:\Windows\SysWOW64\dvsrg.exe"25⤵
- Executes dropped EXE
PID:3748 -
C:\Windows\SysWOW64\dvtxs.exeC:\Windows\system32\dvtxs.exe 1248 "C:\Windows\SysWOW64\tzamk.exe"26⤵
- Executes dropped EXE
PID:4176 -
C:\Windows\SysWOW64\qxzmd.exeC:\Windows\system32\qxzmd.exe 1144 "C:\Windows\SysWOW64\dvtxs.exe"27⤵
- Executes dropped EXE
PID:3348 -
C:\Windows\SysWOW64\dyfpg.exeC:\Windows\system32\dyfpg.exe 1256 "C:\Windows\SysWOW64\qxzmd.exe"28⤵
- Executes dropped EXE
PID:2252 -
C:\Windows\SysWOW64\njuab.exeC:\Windows\system32\njuab.exe 1252 "C:\Windows\SysWOW64\dyfpg.exe"29⤵
- Executes dropped EXE
PID:2532 -
C:\Windows\SysWOW64\xevkj.exeC:\Windows\system32\xevkj.exe 1264 "C:\Windows\SysWOW64\njuab.exe"30⤵
- Executes dropped EXE
PID:4544 -
C:\Windows\SysWOW64\krnip.exeC:\Windows\system32\krnip.exe 1272 "C:\Windows\SysWOW64\xevkj.exe"31⤵
- Executes dropped EXE
PID:2988 -
C:\Windows\SysWOW64\vngsw.exeC:\Windows\system32\vngsw.exe 1268 "C:\Windows\SysWOW64\krnip.exe"32⤵
- Executes dropped EXE
PID:1152 -
C:\Windows\SysWOW64\iaxic.exeC:\Windows\system32\iaxic.exe 1280 "C:\Windows\SysWOW64\vngsw.exe"33⤵
- Executes dropped EXE
PID:1120 -
C:\Windows\SysWOW64\szbfv.exeC:\Windows\system32\szbfv.exe 1276 "C:\Windows\SysWOW64\iaxic.exe"34⤵
- Executes dropped EXE
PID:4508 -
C:\Windows\SysWOW64\futva.exeC:\Windows\system32\futva.exe 1284 "C:\Windows\SysWOW64\szbfv.exe"35⤵
- Executes dropped EXE
PID:4112 -
C:\Windows\SysWOW64\thltg.exeC:\Windows\system32\thltg.exe 1260 "C:\Windows\SysWOW64\futva.exe"36⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4848 -
C:\Windows\SysWOW64\dgpqr.exeC:\Windows\system32\dgpqr.exe 1308 "C:\Windows\SysWOW64\thltg.exe"37⤵
- Executes dropped EXE
PID:2096 -
C:\Windows\SysWOW64\qtggw.exeC:\Windows\system32\qtggw.exe 1292 "C:\Windows\SysWOW64\dgpqr.exe"38⤵
- Executes dropped EXE
PID:1592 -
C:\Windows\SysWOW64\dsbjf.exeC:\Windows\system32\dsbjf.exe 1188 "C:\Windows\SysWOW64\qtggw.exe"39⤵
- Executes dropped EXE
PID:2564 -
C:\Windows\SysWOW64\qftyl.exeC:\Windows\system32\qftyl.exe 1296 "C:\Windows\SysWOW64\dsbjf.exe"40⤵
- Executes dropped EXE
PID:708 -
C:\Windows\SysWOW64\aalja.exeC:\Windows\system32\aalja.exe 1304 "C:\Windows\SysWOW64\qftyl.exe"41⤵
- Executes dropped EXE
PID:1292 -
C:\Windows\SysWOW64\nrolj.exeC:\Windows\system32\nrolj.exe 1312 "C:\Windows\SysWOW64\aalja.exe"42⤵
- Executes dropped EXE
PID:4512 -
C:\Windows\SysWOW64\apjos.exeC:\Windows\system32\apjos.exe 1288 "C:\Windows\SysWOW64\nrolj.exe"43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4148 -
C:\Windows\SysWOW64\konlc.exeC:\Windows\system32\konlc.exe 1316 "C:\Windows\SysWOW64\apjos.exe"44⤵
- Executes dropped EXE
PID:4364 -
C:\Windows\SysWOW64\xbfji.exeC:\Windows\system32\xbfji.exe 1328 "C:\Windows\SysWOW64\konlc.exe"45⤵
- Executes dropped EXE
PID:3280 -
C:\Windows\SysWOW64\ksamq.exeC:\Windows\system32\ksamq.exe 1240 "C:\Windows\SysWOW64\xbfji.exe"46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4964 -
C:\Windows\SysWOW64\qbgpt.exeC:\Windows\system32\qbgpt.exe 1336 "C:\Windows\SysWOW64\ksamq.exe"47⤵
- Executes dropped EXE
PID:3644 -
C:\Windows\SysWOW64\aismm.exeC:\Windows\system32\aismm.exe 1300 "C:\Windows\SysWOW64\qbgpt.exe"48⤵
- Executes dropped EXE
PID:2936 -
C:\Windows\SysWOW64\nvccs.exeC:\Windows\system32\nvccs.exe 1332 "C:\Windows\SysWOW64\aismm.exe"49⤵
- Executes dropped EXE
PID:2956 -
C:\Windows\SysWOW64\aitzx.exeC:\Windows\system32\aitzx.exe 1340 "C:\Windows\SysWOW64\nvccs.exe"50⤵
- Executes dropped EXE
PID:744 -
C:\Windows\SysWOW64\khxxi.exeC:\Windows\system32\khxxi.exe 1348 "C:\Windows\SysWOW64\aitzx.exe"51⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3396 -
C:\Windows\SysWOW64\yupno.exeC:\Windows\system32\yupno.exe 1344 "C:\Windows\SysWOW64\khxxi.exe"52⤵
- Executes dropped EXE
PID:4864 -
C:\Windows\SysWOW64\hfexj.exeC:\Windows\system32\hfexj.exe 1356 "C:\Windows\SysWOW64\yupno.exe"53⤵
- Executes dropped EXE
PID:1928 -
C:\Windows\SysWOW64\vswnp.exeC:\Windows\system32\vswnp.exe 1352 "C:\Windows\SysWOW64\hfexj.exe"54⤵
- Executes dropped EXE
PID:60 -
C:\Windows\SysWOW64\iffcv.exeC:\Windows\system32\iffcv.exe 1364 "C:\Windows\SysWOW64\vswnp.exe"55⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1796 -
C:\Windows\SysWOW64\vsxsa.exeC:\Windows\system32\vsxsa.exe 1376 "C:\Windows\SysWOW64\iffcv.exe"56⤵
- Executes dropped EXE
PID:1276 -
C:\Windows\SysWOW64\fdmco.exeC:\Windows\system32\fdmco.exe 1368 "C:\Windows\SysWOW64\vsxsa.exe"57⤵
- Executes dropped EXE
PID:540 -
C:\Windows\SysWOW64\pvcia.exeC:\Windows\system32\pvcia.exe 1360 "C:\Windows\SysWOW64\fdmco.exe"58⤵
- Executes dropped EXE
PID:4220 -
C:\Windows\SysWOW64\fzcdw.exeC:\Windows\system32\fzcdw.exe 1380 "C:\Windows\SysWOW64\pvcia.exe"59⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3480 -
C:\Windows\SysWOW64\sqfgf.exeC:\Windows\system32\sqfgf.exe 1372 "C:\Windows\SysWOW64\fzcdw.exe"60⤵
- Executes dropped EXE
PID:1524 -
C:\Windows\SysWOW64\cxjdx.exeC:\Windows\system32\cxjdx.exe 1384 "C:\Windows\SysWOW64\sqfgf.exe"61⤵
- Executes dropped EXE
PID:1184 -
C:\Windows\SysWOW64\pnmgg.exeC:\Windows\system32\pnmgg.exe 1392 "C:\Windows\SysWOW64\cxjdx.exe"62⤵
- Executes dropped EXE
PID:184 -
C:\Windows\SysWOW64\cavvm.exeC:\Windows\system32\cavvm.exe 1120 "C:\Windows\SysWOW64\pnmgg.exe"63⤵
- Executes dropped EXE
PID:2900 -
C:\Windows\SysWOW64\qnnls.exeC:\Windows\system32\qnnls.exe 1400 "C:\Windows\SysWOW64\cavvm.exe"64⤵
- Executes dropped EXE
PID:3300 -
C:\Windows\SysWOW64\auric.exeC:\Windows\system32\auric.exe 1404 "C:\Windows\SysWOW64\qnnls.exe"65⤵
- Executes dropped EXE
PID:4560 -
C:\Windows\SysWOW64\nhigi.exeC:\Windows\system32\nhigi.exe 1408 "C:\Windows\SysWOW64\auric.exe"66⤵PID:1304
-
C:\Windows\SysWOW64\aydby.exeC:\Windows\system32\aydby.exe 1424 "C:\Windows\SysWOW64\nhigi.exe"67⤵PID:2740
-
C:\Windows\SysWOW64\nlvze.exeC:\Windows\system32\nlvze.exe 1428 "C:\Windows\SysWOW64\aydby.exe"68⤵
- Drops file in System32 directory
PID:3324 -
C:\Windows\SysWOW64\xvkjr.exeC:\Windows\system32\xvkjr.exe 1412 "C:\Windows\SysWOW64\nlvze.exe"69⤵
- System Location Discovery: System Language Discovery
PID:3172 -
C:\Windows\SysWOW64\kiczx.exeC:\Windows\system32\kiczx.exe 1396 "C:\Windows\SysWOW64\xvkjr.exe"70⤵
- System Location Discovery: System Language Discovery
PID:1848 -
C:\Windows\SysWOW64\xvlod.exeC:\Windows\system32\xvlod.exe 1420 "C:\Windows\SysWOW64\kiczx.exe"71⤵PID:2620
-
C:\Windows\SysWOW64\kidej.exeC:\Windows\system32\kidej.exe 1432 "C:\Windows\SysWOW64\xvlod.exe"72⤵PID:3600
-
C:\Windows\SysWOW64\utspe.exeC:\Windows\system32\utspe.exe 1416 "C:\Windows\SysWOW64\kidej.exe"73⤵
- System Location Discovery: System Language Discovery
PID:1368 -
C:\Windows\SysWOW64\hgcek.exeC:\Windows\system32\hgcek.exe 1436 "C:\Windows\SysWOW64\utspe.exe"74⤵PID:440
-
C:\Windows\SysWOW64\vttuq.exeC:\Windows\system32\vttuq.exe 1444 "C:\Windows\SysWOW64\hgcek.exe"75⤵PID:1480
-
C:\Windows\SysWOW64\iglsv.exeC:\Windows\system32\iglsv.exe 1448 "C:\Windows\SysWOW64\vttuq.exe"76⤵
- Drops file in System32 directory
PID:5004 -
C:\Windows\SysWOW64\scecd.exeC:\Windows\system32\scecd.exe 1440 "C:\Windows\SysWOW64\iglsv.exe"77⤵PID:964
-
C:\Windows\SysWOW64\fekso.exeC:\Windows\system32\fekso.exe 1452 "C:\Windows\SysWOW64\scecd.exe"78⤵PID:4776
-
C:\Windows\SysWOW64\srbhu.exeC:\Windows\system32\srbhu.exe 1456 "C:\Windows\SysWOW64\fekso.exe"79⤵PID:616
-
C:\Windows\SysWOW64\fetxa.exeC:\Windows\system32\fetxa.exe 1124 "C:\Windows\SysWOW64\srbhu.exe"80⤵PID:5040
-
C:\Windows\SysWOW64\qzmiq.exeC:\Windows\system32\qzmiq.exe 1464 "C:\Windows\SysWOW64\fetxa.exe"81⤵
- System Location Discovery: System Language Discovery
PID:2456 -
C:\Windows\SysWOW64\cbsxb.exeC:\Windows\system32\cbsxb.exe 1472 "C:\Windows\SysWOW64\qzmiq.exe"82⤵PID:1216
-
C:\Windows\SysWOW64\pojnh.exeC:\Windows\system32\pojnh.exe 1476 "C:\Windows\SysWOW64\cbsxb.exe"83⤵PID:364
-
C:\Windows\SysWOW64\anokr.exeC:\Windows\system32\anokr.exe 1492 "C:\Windows\SysWOW64\pojnh.exe"84⤵PID:4448
-
C:\Windows\SysWOW64\nafix.exeC:\Windows\system32\nafix.exe 1468 "C:\Windows\SysWOW64\anokr.exe"85⤵PID:1456
-
C:\Windows\SysWOW64\azadg.exeC:\Windows\system32\azadg.exe 1480 "C:\Windows\SysWOW64\nafix.exe"86⤵PID:528
-
C:\Windows\SysWOW64\nmral.exeC:\Windows\system32\nmral.exe 1484 "C:\Windows\SysWOW64\azadg.exe"87⤵PID:4640
-
C:\Windows\SysWOW64\xlwye.exeC:\Windows\system32\xlwye.exe 1496 "C:\Windows\SysWOW64\nmral.exe"88⤵PID:4548
-
C:\Windows\SysWOW64\kjybm.exeC:\Windows\system32\kjybm.exe 1388 "C:\Windows\SysWOW64\xlwye.exe"89⤵PID:1068
-
C:\Windows\SysWOW64\xwiqs.exeC:\Windows\system32\xwiqs.exe 1504 "C:\Windows\SysWOW64\kjybm.exe"90⤵PID:2416
-
C:\Windows\SysWOW64\kgotv.exeC:\Windows\system32\kgotv.exe 1500 "C:\Windows\SysWOW64\xwiqs.exe"91⤵PID:1224
-
C:\Windows\SysWOW64\xwrwe.exeC:\Windows\system32\xwrwe.exe 1512 "C:\Windows\SysWOW64\kgotv.exe"92⤵PID:4820
-
C:\Windows\SysWOW64\zvvto.exeC:\Windows\system32\zvvto.exe 1508 "C:\Windows\SysWOW64\xwrwe.exe"93⤵PID:4132
-
C:\Windows\SysWOW64\nqnru.exeC:\Windows\system32\nqnru.exe 1520 "C:\Windows\SysWOW64\zvvto.exe"94⤵
- System Location Discovery: System Language Discovery
PID:356 -
C:\Windows\SysWOW64\ahiul.exeC:\Windows\system32\ahiul.exe 1516 "C:\Windows\SysWOW64\nqnru.exe"95⤵PID:2100
-
C:\Windows\SysWOW64\kgmrv.exeC:\Windows\system32\kgmrv.exe 1532 "C:\Windows\SysWOW64\ahiul.exe"96⤵PID:3248
-
C:\Windows\SysWOW64\xfoue.exeC:\Windows\system32\xfoue.exe 1536 "C:\Windows\SysWOW64\kgmrv.exe"97⤵PID:1632
-
C:\Windows\SysWOW64\hahel.exeC:\Windows\system32\hahel.exe 1540 "C:\Windows\SysWOW64\xfoue.exe"98⤵PID:2752
-
C:\Windows\SysWOW64\xfqzp.exeC:\Windows\system32\xfqzp.exe 1524 "C:\Windows\SysWOW64\hahel.exe"99⤵PID:4972
-
C:\Windows\SysWOW64\heuwa.exeC:\Windows\system32\heuwa.exe 1544 "C:\Windows\SysWOW64\xfqzp.exe"100⤵PID:2744
-
C:\Windows\SysWOW64\unahd.exeC:\Windows\system32\unahd.exe 1132 "C:\Windows\SysWOW64\heuwa.exe"101⤵PID:2400
-
C:\Windows\SysWOW64\hpgpw.exeC:\Windows\system32\hpgpw.exe 1552 "C:\Windows\SysWOW64\unahd.exe"102⤵PID:4000
-
C:\Windows\SysWOW64\ucyfc.exeC:\Windows\system32\ucyfc.exe 1556 "C:\Windows\SysWOW64\hpgpw.exe"103⤵PID:1664
-
C:\Windows\SysWOW64\htshk.exeC:\Windows\system32\htshk.exe 1564 "C:\Windows\SysWOW64\ucyfc.exe"104⤵PID:4296
-
C:\Windows\SysWOW64\raenv.exeC:\Windows\system32\raenv.exe 1548 "C:\Windows\SysWOW64\htshk.exe"105⤵PID:2036
-
C:\Windows\SysWOW64\fnocb.exeC:\Windows\system32\fnocb.exe 1568 "C:\Windows\SysWOW64\raenv.exe"106⤵PID:4576
-
C:\Windows\SysWOW64\sagsh.exeC:\Windows\system32\sagsh.exe 1572 "C:\Windows\SysWOW64\fnocb.exe"107⤵PID:3208
-
C:\Windows\SysWOW64\fnxim.exeC:\Windows\system32\fnxim.exe 1576 "C:\Windows\SysWOW64\sagsh.exe"108⤵PID:3532
-
C:\Windows\SysWOW64\pxnsi.exeC:\Windows\system32\pxnsi.exe 1320 "C:\Windows\SysWOW64\fnxim.exe"109⤵PID:3636
-
C:\Windows\SysWOW64\ckwin.exeC:\Windows\system32\ckwin.exe 1580 "C:\Windows\SysWOW64\pxnsi.exe"110⤵
- System Location Discovery: System Language Discovery
PID:3708 -
C:\Windows\SysWOW64\pxoyt.exeC:\Windows\system32\pxoyt.exe 1560 "C:\Windows\SysWOW64\ckwin.exe"111⤵
- Drops file in System32 directory
PID:4144 -
C:\Windows\SysWOW64\ckxnz.exeC:\Windows\system32\ckxnz.exe 1588 "C:\Windows\SysWOW64\pxoyt.exe"112⤵PID:4700
-
C:\Windows\SysWOW64\mvvym.exeC:\Windows\system32\mvvym.exe 1596 "C:\Windows\SysWOW64\ckxnz.exe"113⤵PID:1996
-
C:\Windows\SysWOW64\zievs.exeC:\Windows\system32\zievs.exe 1136 "C:\Windows\SysWOW64\mvvym.exe"114⤵
- Drops file in System32 directory
PID:4968 -
C:\Windows\SysWOW64\mvwly.exeC:\Windows\system32\mvwly.exe 1600 "C:\Windows\SysWOW64\zievs.exe"115⤵PID:2112
-
C:\Windows\SysWOW64\aifbe.exeC:\Windows\system32\aifbe.exe 1604 "C:\Windows\SysWOW64\mvwly.exe"116⤵PID:4516
-
C:\Windows\SysWOW64\ktdlz.exeC:\Windows\system32\ktdlz.exe 1612 "C:\Windows\SysWOW64\aifbe.exe"117⤵PID:4696
-
C:\Windows\SysWOW64\xgmbf.exeC:\Windows\system32\xgmbf.exe 1624 "C:\Windows\SysWOW64\ktdlz.exe"118⤵PID:3004
-
C:\Windows\SysWOW64\kpsei.exeC:\Windows\system32\kpsei.exe 1620 "C:\Windows\SysWOW64\xgmbf.exe"119⤵PID:4184
-
C:\Windows\SysWOW64\xgngq.exeC:\Windows\system32\xgngq.exe 1628 "C:\Windows\SysWOW64\kpsei.exe"120⤵PID:3284
-
C:\Windows\SysWOW64\keqjz.exeC:\Windows\system32\keqjz.exe 1592 "C:\Windows\SysWOW64\xgngq.exe"121⤵PID:4108
-
C:\Windows\SysWOW64\udugj.exeC:\Windows\system32\udugj.exe 1616 "C:\Windows\SysWOW64\keqjz.exe"122⤵PID:2728
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-