Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 23:38
Static task
static1
Behavioral task
behavioral1
Sample
b4108823652c261eb828bc8aaf351551_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
b4108823652c261eb828bc8aaf351551_JaffaCakes118.exe
-
Size
532KB
-
MD5
b4108823652c261eb828bc8aaf351551
-
SHA1
e6ffcaf31949acda7ff035f8ef7128fb4748eae5
-
SHA256
e14c09c2bd9a5ebc199b97288d9da2bb06c8644aa913b918f3a9c38ae870c9cd
-
SHA512
985d80ea161e3d003302a144857171ef93b556b1d2d6ac12e00b691e1b7328157188ef36d7b65b290d29ae0d3e7affb17fc0d322c92115c4aca60d5d369da5c2
-
SSDEEP
12288:0jhqS1t21/xRfD+ATnhzAWfpHv/WJoChHIV:0YSoJRfreW91CiV
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 64 IoCs
pid Process 2872 jicyd.exe 1824 nridt.exe 2984 xfkgd.exe 2496 rwbta.exe 2940 vfhyq.exe 820 yajbl.exe 1076 krmeu.exe 1852 kjnwo.exe 2928 cynus.exe 2676 eebwi.exe 1676 iqkpb.exe 1160 tjzuf.exe 908 ceypv.exe 2304 zbfpo.exe 1716 tlyxt.exe 1212 qeqkx.exe 1788 xmdky.exe 2456 hmphi.exe 2696 cvipo.exe 2716 wjyap.exe 2244 bkgvf.exe 340 ommcr.exe 692 bdhfz.exe 1956 yaofa.exe 2160 qlbfa.exe 1568 vfjfz.exe 2616 hvmih.exe 2036 srfsx.exe 1780 ftlii.exe 564 jjqde.exe 1052 zoqya.exe 840 jncvt.exe 1684 tbdlj.exe 2012 gomip.exe 1312 tqsqa.exe 2124 noitd.exe 2288 uwelx.exe 3048 huzog.exe 536 pcugs.exe 1084 cpevy.exe 1724 moqbq.exe 2892 wzfld.exe 884 gugwl.exe 2648 qiztj.exe 2380 yejys.exe 1944 kdmbb.exe 1608 ugblw.exe 844 hewof.exe 1752 pmrgz.exe 2784 ccmji.exe 1000 ppeho.exe 2632 trmgm.exe 2360 gedws.exe 2808 tyjme.exe 2228 gxeom.exe 2120 tnzrv.exe 1324 dyoci.exe 1984 iorwr.exe 568 uqxmk.exe 1668 hhspt.exe 2224 rrhzg.exe 1068 elnpr.exe 2860 rgfex.exe 2444 dalmj.exe -
Identifies Wine through registry keys 2 TTPs 64 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine tnqym.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine ahoka.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine tqsqa.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine dqjbk.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine xrlzm.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine jncvt.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine gomip.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine yrpep.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine aysea.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine haxmf.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine rktml.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine dcjke.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine yilcn.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine tchwx.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine uyvte.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine vxwju.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine glkse.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine rrmlu.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine dmcgo.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine znyie.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine qjfqg.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine rxsrt.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine onand.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine acdgl.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine wqguu.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine sjokq.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine pmrgz.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine esvma.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine cfmyu.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine zlhqg.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine lvbeh.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine xqoed.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine yaqjs.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine hkouf.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine ddzgl.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine jragp.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine nlpwb.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine blzbj.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine usvnp.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine vfjfz.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine kwrxs.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine pseoa.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine nyxbu.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine trdow.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine ayywe.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine nrloj.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine uwelx.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine squex.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine gtxpj.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine asrvr.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine utrxu.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine pbfaa.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine qzgpz.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine ryoxs.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine frhcp.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine oqzei.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine lkzkn.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine wtfeg.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine xsovl.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine rqphs.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine irqwp.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine ppmzn.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine cvipo.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine ohyhe.exe -
Loads dropped DLL 64 IoCs
pid Process 2464 b4108823652c261eb828bc8aaf351551_JaffaCakes118.exe 2464 b4108823652c261eb828bc8aaf351551_JaffaCakes118.exe 2872 jicyd.exe 2872 jicyd.exe 1824 nridt.exe 1824 nridt.exe 2984 xfkgd.exe 2984 xfkgd.exe 2496 rwbta.exe 2496 rwbta.exe 2940 vfhyq.exe 2940 vfhyq.exe 820 yajbl.exe 820 yajbl.exe 1076 krmeu.exe 1076 krmeu.exe 1852 kjnwo.exe 1852 kjnwo.exe 2928 cynus.exe 2928 cynus.exe 2676 eebwi.exe 2676 eebwi.exe 1676 iqkpb.exe 1676 iqkpb.exe 1160 tjzuf.exe 1160 tjzuf.exe 908 ceypv.exe 908 ceypv.exe 2304 zbfpo.exe 2304 zbfpo.exe 1716 tlyxt.exe 1716 tlyxt.exe 1212 qeqkx.exe 1212 qeqkx.exe 1788 xmdky.exe 1788 xmdky.exe 2456 hmphi.exe 2456 hmphi.exe 2696 cvipo.exe 2696 cvipo.exe 2716 wjyap.exe 2716 wjyap.exe 2244 bkgvf.exe 2244 bkgvf.exe 340 ommcr.exe 340 ommcr.exe 692 bdhfz.exe 692 bdhfz.exe 1956 yaofa.exe 1956 yaofa.exe 2160 qlbfa.exe 2160 qlbfa.exe 1568 vfjfz.exe 1568 vfjfz.exe 2616 hvmih.exe 2616 hvmih.exe 2036 srfsx.exe 2036 srfsx.exe 1780 ftlii.exe 1780 ftlii.exe 564 jjqde.exe 564 jjqde.exe 1052 zoqya.exe 1052 zoqya.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\gwhlr.exe tgnii.exe File created C:\Windows\SysWOW64\kevpr.exe xrlzm.exe File created C:\Windows\SysWOW64\usvnp.exe kevpr.exe File created C:\Windows\SysWOW64\yhqhc.exe oeaxp.exe File opened for modification C:\Windows\SysWOW64\rgfex.exe elnpr.exe File created C:\Windows\SysWOW64\suhpf.exe fdmmx.exe File opened for modification C:\Windows\SysWOW64\unefx.exe hampr.exe File created C:\Windows\SysWOW64\bhkge.exe rigjl.exe File opened for modification C:\Windows\SysWOW64\rlmlw.exe ergwl.exe File created C:\Windows\SysWOW64\rgfex.exe elnpr.exe File opened for modification C:\Windows\SysWOW64\osfgu.exe bukdl.exe File opened for modification C:\Windows\SysWOW64\marxi.exe zcxua.exe File created C:\Windows\SysWOW64\hwqvn.exe uyvte.exe File opened for modification C:\Windows\SysWOW64\fgseq.exe stapk.exe File opened for modification C:\Windows\SysWOW64\pvtas.exe fhsdc.exe File created C:\Windows\SysWOW64\gpqty.exe wnbjl.exe File created C:\Windows\SysWOW64\jwpef.exe tkhjb.exe File opened for modification C:\Windows\SysWOW64\vxsqv.exe tvcnz.exe File created C:\Windows\SysWOW64\apohy.exe ucfrs.exe File created C:\Windows\SysWOW64\ozigp.exe bjney.exe File opened for modification C:\Windows\SysWOW64\xhesc.exe kuucw.exe File opened for modification C:\Windows\SysWOW64\ehlss.exe rrqpj.exe File opened for modification C:\Windows\SysWOW64\tzehs.exe jwpef.exe File opened for modification C:\Windows\SysWOW64\nirfo.exe dxbub.exe File created C:\Windows\SysWOW64\kznzb.exe boypo.exe File opened for modification C:\Windows\SysWOW64\fcqqu.exe vstgy.exe File created C:\Windows\SysWOW64\qitee.exe eonos.exe File created C:\Windows\SysWOW64\sbmah.exe qnlcj.exe File created C:\Windows\SysWOW64\hxrjq.exe uhwgh.exe File opened for modification C:\Windows\SysWOW64\wlrmv.exe mwrox.exe File created C:\Windows\SysWOW64\rrqpj.exe esvma.exe File opened for modification C:\Windows\SysWOW64\evmff.exe rxrcx.exe File created C:\Windows\SysWOW64\ekwmg.exe rqqxv.exe File created C:\Windows\SysWOW64\tezsu.exe jbkhz.exe File opened for modification C:\Windows\SysWOW64\yexre.exe wbihj.exe File opened for modification C:\Windows\SysWOW64\mgbsv.exe celia.exe File created C:\Windows\SysWOW64\leraf.exe vzjfb.exe File opened for modification C:\Windows\SysWOW64\hhspt.exe uqxmk.exe File opened for modification C:\Windows\SysWOW64\jncvt.exe zoqya.exe File created C:\Windows\SysWOW64\vxsqv.exe tvcnz.exe File opened for modification C:\Windows\SysWOW64\ncddd.exe ddzgl.exe File created C:\Windows\SysWOW64\hulri.exe uafjx.exe File created C:\Windows\SysWOW64\rohsy.exe hagci.exe File created C:\Windows\SysWOW64\glsts.exe wiujx.exe File opened for modification C:\Windows\SysWOW64\opegn.exe ebeqp.exe File opened for modification C:\Windows\SysWOW64\vfhyq.exe rwbta.exe File created C:\Windows\SysWOW64\hzkru.exe ylkce.exe File opened for modification C:\Windows\SysWOW64\ucidm.exe hlnbe.exe File opened for modification C:\Windows\SysWOW64\wlsdh.exe jjmvv.exe File created C:\Windows\SysWOW64\ibrtg.exe vcory.exe File created C:\Windows\SysWOW64\ofwjh.exe bsfmb.exe File opened for modification C:\Windows\SysWOW64\naxbr.exe dmwet.exe File created C:\Windows\SysWOW64\fdmmx.exe sfrko.exe File opened for modification C:\Windows\SysWOW64\bsfmb.exe oqzei.exe File created C:\Windows\SysWOW64\iorwr.exe dyoci.exe File opened for modification C:\Windows\SysWOW64\noitd.exe aucds.exe File opened for modification C:\Windows\SysWOW64\ccmji.exe pmrgz.exe File created C:\Windows\SysWOW64\fgseq.exe stapk.exe File created C:\Windows\SysWOW64\uvzpb.exe hbszp.exe File created C:\Windows\SysWOW64\jncvt.exe zoqya.exe File opened for modification C:\Windows\SysWOW64\rygoq.exe ikgza.exe File created C:\Windows\SysWOW64\jphqr.exe zesgw.exe File opened for modification C:\Windows\SysWOW64\lkjjl.exe yuggc.exe File created C:\Windows\SysWOW64\zeedw.exe mkynk.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mpeny.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uhdpo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zckzj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vfoql.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxrcx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rygoq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language toums.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aazvg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ccvji.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nemsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nqilg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language obuwr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhkge.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language osicn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jprgm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhspt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cqiqr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ifqrw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rmbwt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jilfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ujbzh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language noydn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ekwmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language koase.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vxsqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jgndj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asrvr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ergwl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tzehs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yxszr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lykch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pxbia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oplry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aipbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rgfex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gppgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ciimv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abila.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acdgl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rporm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xmyrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htgxz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language polsz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ugqlq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xmdky.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rszfd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ucgzv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gchsp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ykyrc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppmzn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ccmji.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ukrni.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tzucb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cnejm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ljwxo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hwqvn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhajw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nrloj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iqkpb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hjjwz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ubesz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ucidm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zeedw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language joqib.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2464 wrote to memory of 2872 2464 b4108823652c261eb828bc8aaf351551_JaffaCakes118.exe 31 PID 2464 wrote to memory of 2872 2464 b4108823652c261eb828bc8aaf351551_JaffaCakes118.exe 31 PID 2464 wrote to memory of 2872 2464 b4108823652c261eb828bc8aaf351551_JaffaCakes118.exe 31 PID 2464 wrote to memory of 2872 2464 b4108823652c261eb828bc8aaf351551_JaffaCakes118.exe 31 PID 2872 wrote to memory of 1824 2872 jicyd.exe 32 PID 2872 wrote to memory of 1824 2872 jicyd.exe 32 PID 2872 wrote to memory of 1824 2872 jicyd.exe 32 PID 2872 wrote to memory of 1824 2872 jicyd.exe 32 PID 1824 wrote to memory of 2984 1824 nridt.exe 33 PID 1824 wrote to memory of 2984 1824 nridt.exe 33 PID 1824 wrote to memory of 2984 1824 nridt.exe 33 PID 1824 wrote to memory of 2984 1824 nridt.exe 33 PID 2984 wrote to memory of 2496 2984 xfkgd.exe 34 PID 2984 wrote to memory of 2496 2984 xfkgd.exe 34 PID 2984 wrote to memory of 2496 2984 xfkgd.exe 34 PID 2984 wrote to memory of 2496 2984 xfkgd.exe 34 PID 2496 wrote to memory of 2940 2496 rwbta.exe 35 PID 2496 wrote to memory of 2940 2496 rwbta.exe 35 PID 2496 wrote to memory of 2940 2496 rwbta.exe 35 PID 2496 wrote to memory of 2940 2496 rwbta.exe 35 PID 2940 wrote to memory of 820 2940 vfhyq.exe 36 PID 2940 wrote to memory of 820 2940 vfhyq.exe 36 PID 2940 wrote to memory of 820 2940 vfhyq.exe 36 PID 2940 wrote to memory of 820 2940 vfhyq.exe 36 PID 820 wrote to memory of 1076 820 yajbl.exe 37 PID 820 wrote to memory of 1076 820 yajbl.exe 37 PID 820 wrote to memory of 1076 820 yajbl.exe 37 PID 820 wrote to memory of 1076 820 yajbl.exe 37 PID 1076 wrote to memory of 1852 1076 krmeu.exe 38 PID 1076 wrote to memory of 1852 1076 krmeu.exe 38 PID 1076 wrote to memory of 1852 1076 krmeu.exe 38 PID 1076 wrote to memory of 1852 1076 krmeu.exe 38 PID 1852 wrote to memory of 2928 1852 kjnwo.exe 39 PID 1852 wrote to memory of 2928 1852 kjnwo.exe 39 PID 1852 wrote to memory of 2928 1852 kjnwo.exe 39 PID 1852 wrote to memory of 2928 1852 kjnwo.exe 39 PID 2928 wrote to memory of 2676 2928 cynus.exe 40 PID 2928 wrote to memory of 2676 2928 cynus.exe 40 PID 2928 wrote to memory of 2676 2928 cynus.exe 40 PID 2928 wrote to memory of 2676 2928 cynus.exe 40 PID 2676 wrote to memory of 1676 2676 eebwi.exe 41 PID 2676 wrote to memory of 1676 2676 eebwi.exe 41 PID 2676 wrote to memory of 1676 2676 eebwi.exe 41 PID 2676 wrote to memory of 1676 2676 eebwi.exe 41 PID 1676 wrote to memory of 1160 1676 iqkpb.exe 42 PID 1676 wrote to memory of 1160 1676 iqkpb.exe 42 PID 1676 wrote to memory of 1160 1676 iqkpb.exe 42 PID 1676 wrote to memory of 1160 1676 iqkpb.exe 42 PID 1160 wrote to memory of 908 1160 tjzuf.exe 43 PID 1160 wrote to memory of 908 1160 tjzuf.exe 43 PID 1160 wrote to memory of 908 1160 tjzuf.exe 43 PID 1160 wrote to memory of 908 1160 tjzuf.exe 43 PID 908 wrote to memory of 2304 908 ceypv.exe 44 PID 908 wrote to memory of 2304 908 ceypv.exe 44 PID 908 wrote to memory of 2304 908 ceypv.exe 44 PID 908 wrote to memory of 2304 908 ceypv.exe 44 PID 2304 wrote to memory of 1716 2304 zbfpo.exe 45 PID 2304 wrote to memory of 1716 2304 zbfpo.exe 45 PID 2304 wrote to memory of 1716 2304 zbfpo.exe 45 PID 2304 wrote to memory of 1716 2304 zbfpo.exe 45 PID 1716 wrote to memory of 1212 1716 tlyxt.exe 46 PID 1716 wrote to memory of 1212 1716 tlyxt.exe 46 PID 1716 wrote to memory of 1212 1716 tlyxt.exe 46 PID 1716 wrote to memory of 1212 1716 tlyxt.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4108823652c261eb828bc8aaf351551_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b4108823652c261eb828bc8aaf351551_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\jicyd.exeC:\Windows\system32\jicyd.exe 636 "C:\Users\Admin\AppData\Local\Temp\b4108823652c261eb828bc8aaf351551_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\nridt.exeC:\Windows\system32\nridt.exe 612 "C:\Windows\SysWOW64\jicyd.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\xfkgd.exeC:\Windows\system32\xfkgd.exe 616 "C:\Windows\SysWOW64\nridt.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\rwbta.exeC:\Windows\system32\rwbta.exe 620 "C:\Windows\SysWOW64\xfkgd.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\vfhyq.exeC:\Windows\system32\vfhyq.exe 624 "C:\Windows\SysWOW64\rwbta.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\yajbl.exeC:\Windows\system32\yajbl.exe 644 "C:\Windows\SysWOW64\vfhyq.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\SysWOW64\krmeu.exeC:\Windows\system32\krmeu.exe 728 "C:\Windows\SysWOW64\yajbl.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\SysWOW64\kjnwo.exeC:\Windows\system32\kjnwo.exe 684 "C:\Windows\SysWOW64\krmeu.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\cynus.exeC:\Windows\system32\cynus.exe 628 "C:\Windows\SysWOW64\kjnwo.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\eebwi.exeC:\Windows\system32\eebwi.exe 656 "C:\Windows\SysWOW64\cynus.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\iqkpb.exeC:\Windows\system32\iqkpb.exe 652 "C:\Windows\SysWOW64\eebwi.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\tjzuf.exeC:\Windows\system32\tjzuf.exe 672 "C:\Windows\SysWOW64\iqkpb.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\ceypv.exeC:\Windows\system32\ceypv.exe 648 "C:\Windows\SysWOW64\tjzuf.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\zbfpo.exeC:\Windows\system32\zbfpo.exe 680 "C:\Windows\SysWOW64\ceypv.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\tlyxt.exeC:\Windows\system32\tlyxt.exe 660 "C:\Windows\SysWOW64\zbfpo.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\qeqkx.exeC:\Windows\system32\qeqkx.exe 692 "C:\Windows\SysWOW64\tlyxt.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1212 -
C:\Windows\SysWOW64\xmdky.exeC:\Windows\system32\xmdky.exe 700 "C:\Windows\SysWOW64\qeqkx.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1788 -
C:\Windows\SysWOW64\hmphi.exeC:\Windows\system32\hmphi.exe 632 "C:\Windows\SysWOW64\xmdky.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2456 -
C:\Windows\SysWOW64\cvipo.exeC:\Windows\system32\cvipo.exe 708 "C:\Windows\SysWOW64\hmphi.exe"20⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
PID:2696 -
C:\Windows\SysWOW64\wjyap.exeC:\Windows\system32\wjyap.exe 772 "C:\Windows\SysWOW64\cvipo.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2716 -
C:\Windows\SysWOW64\bkgvf.exeC:\Windows\system32\bkgvf.exe 712 "C:\Windows\SysWOW64\wjyap.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2244 -
C:\Windows\SysWOW64\ommcr.exeC:\Windows\system32\ommcr.exe 716 "C:\Windows\SysWOW64\bkgvf.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:340 -
C:\Windows\SysWOW64\bdhfz.exeC:\Windows\system32\bdhfz.exe 776 "C:\Windows\SysWOW64\ommcr.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:692 -
C:\Windows\SysWOW64\yaofa.exeC:\Windows\system32\yaofa.exe 676 "C:\Windows\SysWOW64\bdhfz.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1956 -
C:\Windows\SysWOW64\qlbfa.exeC:\Windows\system32\qlbfa.exe 792 "C:\Windows\SysWOW64\yaofa.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2160 -
C:\Windows\SysWOW64\vfjfz.exeC:\Windows\system32\vfjfz.exe 796 "C:\Windows\SysWOW64\qlbfa.exe"27⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
PID:1568 -
C:\Windows\SysWOW64\hvmih.exeC:\Windows\system32\hvmih.exe 788 "C:\Windows\SysWOW64\vfjfz.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2616 -
C:\Windows\SysWOW64\srfsx.exeC:\Windows\system32\srfsx.exe 800 "C:\Windows\SysWOW64\hvmih.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2036 -
C:\Windows\SysWOW64\ftlii.exeC:\Windows\system32\ftlii.exe 804 "C:\Windows\SysWOW64\srfsx.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1780 -
C:\Windows\SysWOW64\jjqde.exeC:\Windows\system32\jjqde.exe 808 "C:\Windows\SysWOW64\ftlii.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:564 -
C:\Windows\SysWOW64\zoqya.exeC:\Windows\system32\zoqya.exe 812 "C:\Windows\SysWOW64\jjqde.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1052 -
C:\Windows\SysWOW64\jncvt.exeC:\Windows\system32\jncvt.exe 816 "C:\Windows\SysWOW64\zoqya.exe"33⤵
- Executes dropped EXE
- Identifies Wine through registry keys
PID:840 -
C:\Windows\SysWOW64\tbdlj.exeC:\Windows\system32\tbdlj.exe 820 "C:\Windows\SysWOW64\jncvt.exe"34⤵
- Executes dropped EXE
PID:1684 -
C:\Windows\SysWOW64\gomip.exeC:\Windows\system32\gomip.exe 836 "C:\Windows\SysWOW64\tbdlj.exe"35⤵
- Executes dropped EXE
- Identifies Wine through registry keys
PID:2012 -
C:\Windows\SysWOW64\tqsqa.exeC:\Windows\system32\tqsqa.exe 824 "C:\Windows\SysWOW64\gomip.exe"36⤵
- Executes dropped EXE
- Identifies Wine through registry keys
PID:1312 -
C:\Windows\SysWOW64\aucds.exeC:\Windows\system32\aucds.exe 828 "C:\Windows\SysWOW64\tqsqa.exe"37⤵
- Drops file in System32 directory
PID:2628 -
C:\Windows\SysWOW64\noitd.exeC:\Windows\system32\noitd.exe 832 "C:\Windows\SysWOW64\aucds.exe"38⤵
- Executes dropped EXE
PID:2124 -
C:\Windows\SysWOW64\uwelx.exeC:\Windows\system32\uwelx.exe 840 "C:\Windows\SysWOW64\noitd.exe"39⤵
- Executes dropped EXE
- Identifies Wine through registry keys
PID:2288 -
C:\Windows\SysWOW64\huzog.exeC:\Windows\system32\huzog.exe 844 "C:\Windows\SysWOW64\uwelx.exe"40⤵
- Executes dropped EXE
PID:3048 -
C:\Windows\SysWOW64\pcugs.exeC:\Windows\system32\pcugs.exe 848 "C:\Windows\SysWOW64\huzog.exe"41⤵
- Executes dropped EXE
PID:536 -
C:\Windows\SysWOW64\cpevy.exeC:\Windows\system32\cpevy.exe 784 "C:\Windows\SysWOW64\pcugs.exe"42⤵
- Executes dropped EXE
PID:1084 -
C:\Windows\SysWOW64\moqbq.exeC:\Windows\system32\moqbq.exe 856 "C:\Windows\SysWOW64\cpevy.exe"43⤵
- Executes dropped EXE
PID:1724 -
C:\Windows\SysWOW64\wzfld.exeC:\Windows\system32\wzfld.exe 852 "C:\Windows\SysWOW64\moqbq.exe"44⤵
- Executes dropped EXE
PID:2892 -
C:\Windows\SysWOW64\gugwl.exeC:\Windows\system32\gugwl.exe 868 "C:\Windows\SysWOW64\wzfld.exe"45⤵
- Executes dropped EXE
PID:884 -
C:\Windows\SysWOW64\qiztj.exeC:\Windows\system32\qiztj.exe 860 "C:\Windows\SysWOW64\gugwl.exe"46⤵
- Executes dropped EXE
PID:2648 -
C:\Windows\SysWOW64\yejys.exeC:\Windows\system32\yejys.exe 872 "C:\Windows\SysWOW64\qiztj.exe"47⤵
- Executes dropped EXE
PID:2380 -
C:\Windows\SysWOW64\kdmbb.exeC:\Windows\system32\kdmbb.exe 864 "C:\Windows\SysWOW64\yejys.exe"48⤵
- Executes dropped EXE
PID:1944 -
C:\Windows\SysWOW64\ugblw.exeC:\Windows\system32\ugblw.exe 880 "C:\Windows\SysWOW64\kdmbb.exe"49⤵
- Executes dropped EXE
PID:1608 -
C:\Windows\SysWOW64\hewof.exeC:\Windows\system32\hewof.exe 884 "C:\Windows\SysWOW64\ugblw.exe"50⤵
- Executes dropped EXE
PID:844 -
C:\Windows\SysWOW64\pmrgz.exeC:\Windows\system32\pmrgz.exe 888 "C:\Windows\SysWOW64\hewof.exe"51⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Drops file in System32 directory
PID:1752 -
C:\Windows\SysWOW64\ccmji.exeC:\Windows\system32\ccmji.exe 892 "C:\Windows\SysWOW64\pmrgz.exe"52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2784 -
C:\Windows\SysWOW64\ppeho.exeC:\Windows\system32\ppeho.exe 896 "C:\Windows\SysWOW64\ccmji.exe"53⤵
- Executes dropped EXE
PID:1000 -
C:\Windows\SysWOW64\trmgm.exeC:\Windows\system32\trmgm.exe 908 "C:\Windows\SysWOW64\ppeho.exe"54⤵
- Executes dropped EXE
PID:2632 -
C:\Windows\SysWOW64\gedws.exeC:\Windows\system32\gedws.exe 900 "C:\Windows\SysWOW64\trmgm.exe"55⤵
- Executes dropped EXE
PID:2360 -
C:\Windows\SysWOW64\tyjme.exeC:\Windows\system32\tyjme.exe 904 "C:\Windows\SysWOW64\gedws.exe"56⤵
- Executes dropped EXE
PID:2808 -
C:\Windows\SysWOW64\gxeom.exeC:\Windows\system32\gxeom.exe 920 "C:\Windows\SysWOW64\tyjme.exe"57⤵
- Executes dropped EXE
PID:2228 -
C:\Windows\SysWOW64\tnzrv.exeC:\Windows\system32\tnzrv.exe 876 "C:\Windows\SysWOW64\gxeom.exe"58⤵
- Executes dropped EXE
PID:2120 -
C:\Windows\SysWOW64\dyoci.exeC:\Windows\system32\dyoci.exe 928 "C:\Windows\SysWOW64\tnzrv.exe"59⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1324 -
C:\Windows\SysWOW64\iorwr.exeC:\Windows\system32\iorwr.exe 916 "C:\Windows\SysWOW64\dyoci.exe"60⤵
- Executes dropped EXE
PID:1984 -
C:\Windows\SysWOW64\uqxmk.exeC:\Windows\system32\uqxmk.exe 924 "C:\Windows\SysWOW64\iorwr.exe"61⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:568 -
C:\Windows\SysWOW64\hhspt.exeC:\Windows\system32\hhspt.exe 932 "C:\Windows\SysWOW64\uqxmk.exe"62⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1668 -
C:\Windows\SysWOW64\rrhzg.exeC:\Windows\system32\rrhzg.exe 936 "C:\Windows\SysWOW64\hhspt.exe"63⤵
- Executes dropped EXE
PID:2224 -
C:\Windows\SysWOW64\elnpr.exeC:\Windows\system32\elnpr.exe 948 "C:\Windows\SysWOW64\rrhzg.exe"64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1068 -
C:\Windows\SysWOW64\rgfex.exeC:\Windows\system32\rgfex.exe 940 "C:\Windows\SysWOW64\elnpr.exe"65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2860 -
C:\Windows\SysWOW64\dalmj.exeC:\Windows\system32\dalmj.exe 912 "C:\Windows\SysWOW64\rgfex.exe"66⤵
- Executes dropped EXE
PID:2444 -
C:\Windows\SysWOW64\qzgpz.exeC:\Windows\system32\qzgpz.exe 952 "C:\Windows\SysWOW64\dalmj.exe"67⤵
- Identifies Wine through registry keys
PID:1028 -
C:\Windows\SysWOW64\jjtpz.exeC:\Windows\system32\jjtpz.exe 956 "C:\Windows\SysWOW64\qzgpz.exe"68⤵PID:2096
-
C:\Windows\SysWOW64\squex.exeC:\Windows\system32\squex.exe 964 "C:\Windows\SysWOW64\jjtpz.exe"69⤵
- Identifies Wine through registry keys
PID:2908 -
C:\Windows\SysWOW64\fophg.exeC:\Windows\system32\fophg.exe 960 "C:\Windows\SysWOW64\squex.exe"70⤵PID:3044
-
C:\Windows\SysWOW64\sfrko.exeC:\Windows\system32\sfrko.exe 968 "C:\Windows\SysWOW64\fophg.exe"71⤵
- Drops file in System32 directory
PID:2844 -
C:\Windows\SysWOW64\fdmmx.exeC:\Windows\system32\fdmmx.exe 972 "C:\Windows\SysWOW64\sfrko.exe"72⤵
- Drops file in System32 directory
PID:2740 -
C:\Windows\SysWOW64\suhpf.exeC:\Windows\system32\suhpf.exe 980 "C:\Windows\SysWOW64\fdmmx.exe"73⤵PID:2428
-
C:\Windows\SysWOW64\ciimv.exeC:\Windows\system32\ciimv.exe 976 "C:\Windows\SysWOW64\suhpf.exe"74⤵
- System Location Discovery: System Language Discovery
PID:648 -
C:\Windows\SysWOW64\oykpm.exeC:\Windows\system32\oykpm.exe 988 "C:\Windows\SysWOW64\ciimv.exe"75⤵PID:316
-
C:\Windows\SysWOW64\bxfkv.exeC:\Windows\system32\bxfkv.exe 984 "C:\Windows\SysWOW64\oykpm.exe"76⤵PID:1544
-
C:\Windows\SysWOW64\onand.exeC:\Windows\system32\onand.exe 992 "C:\Windows\SysWOW64\bxfkv.exe"77⤵
- Identifies Wine through registry keys
PID:2152 -
C:\Windows\SysWOW64\bedpm.exeC:\Windows\system32\bedpm.exe 996 "C:\Windows\SysWOW64\onand.exe"78⤵PID:2540
-
C:\Windows\SysWOW64\losaz.exeC:\Windows\system32\losaz.exe 1000 "C:\Windows\SysWOW64\bedpm.exe"79⤵PID:2996
-
C:\Windows\SysWOW64\yqypk.exeC:\Windows\system32\yqypk.exe 1004 "C:\Windows\SysWOW64\losaz.exe"80⤵PID:2708
-
C:\Windows\SysWOW64\ldifq.exeC:\Windows\system32\ldifq.exe 1008 "C:\Windows\SysWOW64\yqypk.exe"81⤵PID:2972
-
C:\Windows\SysWOW64\yxovk.exeC:\Windows\system32\yxovk.exe 1012 "C:\Windows\SysWOW64\ldifq.exe"82⤵PID:2268
-
C:\Windows\SysWOW64\kwrxs.exeC:\Windows\system32\kwrxs.exe 1032 "C:\Windows\SysWOW64\yxovk.exe"83⤵
- Identifies Wine through registry keys
PID:2044 -
C:\Windows\SysWOW64\ukrni.exeC:\Windows\system32\ukrni.exe 1016 "C:\Windows\SysWOW64\kwrxs.exe"84⤵
- System Location Discovery: System Language Discovery
PID:2276 -
C:\Windows\SysWOW64\hampr.exeC:\Windows\system32\hampr.exe 1020 "C:\Windows\SysWOW64\ukrni.exe"85⤵
- Drops file in System32 directory
PID:2900 -
C:\Windows\SysWOW64\unefx.exeC:\Windows\system32\unefx.exe 1028 "C:\Windows\SysWOW64\hampr.exe"86⤵PID:1704
-
C:\Windows\SysWOW64\eytps.exeC:\Windows\system32\eytps.exe 1036 "C:\Windows\SysWOW64\unefx.exe"87⤵PID:2368
-
C:\Windows\SysWOW64\rszfd.exeC:\Windows\system32\rszfd.exe 1040 "C:\Windows\SysWOW64\eytps.exe"88⤵
- System Location Discovery: System Language Discovery
PID:2612 -
C:\Windows\SysWOW64\brddo.exeC:\Windows\system32\brddo.exe 944 "C:\Windows\SysWOW64\rszfd.exe"89⤵PID:2688
-
C:\Windows\SysWOW64\otjsz.exeC:\Windows\system32\otjsz.exe 1048 "C:\Windows\SysWOW64\brddo.exe"90⤵PID:2404
-
C:\Windows\SysWOW64\bgbif.exeC:\Windows\system32\bgbif.exe 1052 "C:\Windows\SysWOW64\otjsz.exe"91⤵PID:2856
-
C:\Windows\SysWOW64\oewlo.exeC:\Windows\system32\oewlo.exe 1056 "C:\Windows\SysWOW64\bgbif.exe"92⤵PID:348
-
C:\Windows\SysWOW64\xlwim.exeC:\Windows\system32\xlwim.exe 1060 "C:\Windows\SysWOW64\oewlo.exe"93⤵PID:1740
-
C:\Windows\SysWOW64\kjrlu.exeC:\Windows\system32\kjrlu.exe 1064 "C:\Windows\SysWOW64\xlwim.exe"94⤵PID:1748
-
C:\Windows\SysWOW64\xwjaa.exeC:\Windows\system32\xwjaa.exe 1068 "C:\Windows\SysWOW64\kjrlu.exe"95⤵PID:1764
-
C:\Windows\SysWOW64\hkjqq.exeC:\Windows\system32\hkjqq.exe 1072 "C:\Windows\SysWOW64\xwjaa.exe"96⤵PID:2884
-
C:\Windows\SysWOW64\ubesz.exeC:\Windows\system32\ubesz.exe 1080 "C:\Windows\SysWOW64\hkjqq.exe"97⤵
- System Location Discovery: System Language Discovery
PID:1560 -
C:\Windows\SysWOW64\hzhvp.exeC:\Windows\system32\hzhvp.exe 1076 "C:\Windows\SysWOW64\ubesz.exe"98⤵PID:900
-
C:\Windows\SysWOW64\uqcyy.exeC:\Windows\system32\uqcyy.exe 1084 "C:\Windows\SysWOW64\hzhvp.exe"99⤵PID:2200
-
C:\Windows\SysWOW64\earil.exeC:\Windows\system32\earil.exe 1088 "C:\Windows\SysWOW64\uqcyy.exe"100⤵PID:1576
-
C:\Windows\SysWOW64\rrmlu.exeC:\Windows\system32\rrmlu.exe 1092 "C:\Windows\SysWOW64\earil.exe"101⤵
- Identifies Wine through registry keys
PID:3064 -
C:\Windows\SysWOW64\dtsbf.exeC:\Windows\system32\dtsbf.exe 1096 "C:\Windows\SysWOW64\rrmlu.exe"102⤵PID:2212
-
C:\Windows\SysWOW64\qgkql.exeC:\Windows\system32\qgkql.exe 1100 "C:\Windows\SysWOW64\dtsbf.exe"103⤵PID:3008
-
C:\Windows\SysWOW64\daqgw.exeC:\Windows\system32\daqgw.exe 1104 "C:\Windows\SysWOW64\qgkql.exe"104⤵PID:2272
-
C:\Windows\SysWOW64\qykbn.exeC:\Windows\system32\qykbn.exe 1108 "C:\Windows\SysWOW64\daqgw.exe"105⤵PID:2180
-
C:\Windows\SysWOW64\abila.exeC:\Windows\system32\abila.exe 1112 "C:\Windows\SysWOW64\qykbn.exe"106⤵
- System Location Discovery: System Language Discovery
PID:544 -
C:\Windows\SysWOW64\nzdoj.exeC:\Windows\system32\nzdoj.exe 1116 "C:\Windows\SysWOW64\abila.exe"107⤵PID:1580
-
C:\Windows\SysWOW64\ztjdu.exeC:\Windows\system32\ztjdu.exe 1120 "C:\Windows\SysWOW64\nzdoj.exe"108⤵PID:1696
-
C:\Windows\SysWOW64\msegd.exeC:\Windows\system32\msegd.exe 1124 "C:\Windows\SysWOW64\ztjdu.exe"109⤵PID:2920
-
C:\Windows\SysWOW64\rigjl.exeC:\Windows\system32\rigjl.exe 1128 "C:\Windows\SysWOW64\msegd.exe"110⤵
- Drops file in System32 directory
PID:548 -
C:\Windows\SysWOW64\bhkge.exeC:\Windows\system32\bhkge.exe 1136 "C:\Windows\SysWOW64\rigjl.exe"111⤵
- System Location Discovery: System Language Discovery
PID:2192 -
C:\Windows\SysWOW64\ojrwp.exeC:\Windows\system32\ojrwp.exe 1132 "C:\Windows\SysWOW64\bhkge.exe"112⤵PID:2596
-
C:\Windows\SysWOW64\yuggc.exeC:\Windows\system32\yuggc.exe 1140 "C:\Windows\SysWOW64\ojrwp.exe"113⤵
- Drops file in System32 directory
PID:2004 -
C:\Windows\SysWOW64\lkjjl.exeC:\Windows\system32\lkjjl.exe 1144 "C:\Windows\SysWOW64\yuggc.exe"114⤵PID:756
-
C:\Windows\SysWOW64\yxszr.exeC:\Windows\system32\yxszr.exe 1148 "C:\Windows\SysWOW64\lkjjl.exe"115⤵
- System Location Discovery: System Language Discovery
PID:1948 -
C:\Windows\SysWOW64\lzygk.exeC:\Windows\system32\lzygk.exe 1152 "C:\Windows\SysWOW64\yxszr.exe"116⤵PID:2944
-
C:\Windows\SysWOW64\vcory.exeC:\Windows\system32\vcory.exe 1160 "C:\Windows\SysWOW64\lzygk.exe"117⤵
- Drops file in System32 directory
PID:1100 -
C:\Windows\SysWOW64\ibrtg.exeC:\Windows\system32\ibrtg.exe 1164 "C:\Windows\SysWOW64\vcory.exe"118⤵PID:3056
-
C:\Windows\SysWOW64\urlwp.exeC:\Windows\system32\urlwp.exe 1156 "C:\Windows\SysWOW64\ibrtg.exe"119⤵PID:2336
-
C:\Windows\SysWOW64\hqgzx.exeC:\Windows\system32\hqgzx.exe 1168 "C:\Windows\SysWOW64\urlwp.exe"120⤵PID:672
-
C:\Windows\SysWOW64\rsejt.exeC:\Windows\system32\rsejt.exe 1172 "C:\Windows\SysWOW64\hqgzx.exe"121⤵PID:2284
-
C:\Windows\SysWOW64\erymb.exeC:\Windows\system32\erymb.exe 1176 "C:\Windows\SysWOW64\rsejt.exe"122⤵PID:2172
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-