Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 09:55
Static task
static1
Behavioral task
behavioral1
Sample
bcd874515272d8710cf53e748ad15d3f_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
bcd874515272d8710cf53e748ad15d3f_JaffaCakes118.exe
-
Size
531KB
-
MD5
bcd874515272d8710cf53e748ad15d3f
-
SHA1
fad2e3fce86bfb13740f68cf614fe9c79303ff68
-
SHA256
e97bc68195d88e5bf261a12619c869ec3708e33db7236d26c406f12037a4c024
-
SHA512
9ed56fe516f70b1d414b83e4b1e8bec2d5a59c9d87e6cd3ad2a74f6ae18f64683013c55f159f007c4372c2f4d9460ce6903a45bc4eed9a8c9bdfb7d3b1f80e2c
-
SSDEEP
12288:KvwHhePFcKICBvVrAEChDHUkariqZ4H9t5IJSXMw9/ZUR:lHh6xBabhD02caiJSZw
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 64 IoCs
pid Process 2740 loowk.exe 2336 dortj.exe 2288 pxvom.exe 2036 hmueq.exe 2372 dnmru.exe 924 ylvux.exe 2320 psujt.exe 884 psbji.exe 2728 xapcc.exe 2940 wwbhz.exe 1892 tqwup.exe 2472 abvzm.exe 1480 iffmw.exe 1996 iudsv.exe 1896 wkmkb.exe 2284 barxx.exe 1636 qbdxy.exe 2884 gqoxf.exe 2572 ncvcu.exe 2376 dvsxe.exe 484 qibnj.exe 1368 apokc.exe 1428 njuan.exe 1152 xqyxy.exe 2092 khbag.exe 2532 roosb.exe 2268 equim.exe 3032 otjsz.exe 2636 bgbif.exe 584 oewlo.exe 1360 yhlvj.exe 2912 fphnv.exe 2088 srndg.exe 3012 cmonw.exe 3024 mpdyj.exe 2880 wwhvu.exe 2764 jnkyk.exe 1552 wlfat.exe 2172 jczdc.exe 2440 qnyir.exe 896 daqgw.exe 396 nhudp.exe 3008 abila.exe 2684 klxvn.exe 2008 xcsyw.exe 1144 kanbn.exe 2244 orqev.exe 624 wzdwh.exe 2768 jxgyq.exe 1880 tavjl.exe 2292 jewep.exe 2116 qmreb.exe 2960 crizq.exe 1724 nymwi.exe 2168 alemo.exe 856 kotwb.exe 1768 xbdmh.exe 1280 eukze.exe 2152 rlecn.exe 2032 bkjzx.exe 1012 luyjs.exe 904 yhpzy.exe 2692 isfjl.exe 3028 viimu.exe -
Identifies Wine through registry keys 2 TTPs 64 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine muiri.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine lozig.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine csejd.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine uiwfg.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine egtbs.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine vgnzv.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine lqqqn.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine abila.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine tvmtj.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine izqlm.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine ywxle.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine eouwa.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine jnyip.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine nahsy.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine qqqdu.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine rlecn.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine byvpn.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine nnqbp.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine alemo.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine ggzfk.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine iaarv.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine ocsnh.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine nttzx.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine yhrnn.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine iznhu.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine ugnqn.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine xnwgc.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine vjtat.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine sopsz.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine zrsdl.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine eukze.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine axkzp.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine dalbt.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine bdhmx.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine mdjei.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine iylhc.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine apokc.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine iobpg.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine uyqpv.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine xsovl.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine mrfsm.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine vjnoi.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine dnecg.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine nmwvt.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine kvkvn.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine rdgte.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine kmjye.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine mqhjx.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine fpznh.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine dvbnh.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine jsoqb.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine ainux.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine yegcn.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine fqzmo.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine ymaok.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine vcncg.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine ziebp.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine amldy.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine rztzn.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine yeroj.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine afnmd.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine mbfzw.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine xapcc.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine ucgwq.exe -
Loads dropped DLL 64 IoCs
pid Process 2412 bcd874515272d8710cf53e748ad15d3f_JaffaCakes118.exe 2412 bcd874515272d8710cf53e748ad15d3f_JaffaCakes118.exe 2740 loowk.exe 2740 loowk.exe 2336 dortj.exe 2336 dortj.exe 2288 pxvom.exe 2288 pxvom.exe 2036 hmueq.exe 2036 hmueq.exe 2372 dnmru.exe 2372 dnmru.exe 924 ylvux.exe 924 ylvux.exe 2320 psujt.exe 2320 psujt.exe 884 psbji.exe 884 psbji.exe 2728 xapcc.exe 2728 xapcc.exe 2940 wwbhz.exe 2940 wwbhz.exe 1892 tqwup.exe 1892 tqwup.exe 2472 abvzm.exe 2472 abvzm.exe 1480 iffmw.exe 1480 iffmw.exe 1996 iudsv.exe 1996 iudsv.exe 1896 wkmkb.exe 1896 wkmkb.exe 2284 barxx.exe 2284 barxx.exe 1636 qbdxy.exe 1636 qbdxy.exe 2884 gqoxf.exe 2884 gqoxf.exe 2572 ncvcu.exe 2572 ncvcu.exe 2376 dvsxe.exe 2376 dvsxe.exe 484 qibnj.exe 484 qibnj.exe 1368 apokc.exe 1368 apokc.exe 1428 njuan.exe 1428 njuan.exe 1152 xqyxy.exe 1152 xqyxy.exe 2092 khbag.exe 2092 khbag.exe 2532 roosb.exe 2532 roosb.exe 2268 equim.exe 2268 equim.exe 3032 otjsz.exe 3032 otjsz.exe 2636 bgbif.exe 2636 bgbif.exe 584 oewlo.exe 584 oewlo.exe 1360 yhlvj.exe 1360 yhlvj.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\dlito.exe qunry.exe File opened for modification C:\Windows\SysWOW64\lftgp.exe yoyeg.exe File opened for modification C:\Windows\SysWOW64\ffktt.exe spprl.exe File opened for modification C:\Windows\SysWOW64\houkt.exe yitnv.exe File opened for modification C:\Windows\SysWOW64\xctol.exe kdylc.exe File opened for modification C:\Windows\SysWOW64\lgyeu.exe yeroj.exe File created C:\Windows\SysWOW64\pwxsx.exe cgvqo.exe File opened for modification C:\Windows\SysWOW64\eqouw.exe rztzn.exe File created C:\Windows\SysWOW64\nhsku.exe aqphm.exe File created C:\Windows\SysWOW64\gnbbz.exe wkmre.exe File opened for modification C:\Windows\SysWOW64\jczdc.exe wlfat.exe File created C:\Windows\SysWOW64\mugdt.exe zwlal.exe File created C:\Windows\SysWOW64\tttwg.exe gdybx.exe File created C:\Windows\SysWOW64\kzajc.exe axkzp.exe File opened for modification C:\Windows\SysWOW64\wmtly.exe jnyip.exe File created C:\Windows\SysWOW64\byvpn.exe oisne.exe File opened for modification C:\Windows\SysWOW64\tzrkr.exe giohi.exe File opened for modification C:\Windows\SysWOW64\knyic.exe xlsaj.exe File opened for modification C:\Windows\SysWOW64\fuzji.exe tsstw.exe File opened for modification C:\Windows\SysWOW64\bsfro.exe otkof.exe File opened for modification C:\Windows\SysWOW64\yjush.exe lszpz.exe File created C:\Windows\SysWOW64\tdqca.exe hmvzr.exe File opened for modification C:\Windows\SysWOW64\sixci.exe fruzr.exe File created C:\Windows\SysWOW64\bffdv.exe ookae.exe File opened for modification C:\Windows\SysWOW64\cgatp.exe ppfrg.exe File opened for modification C:\Windows\SysWOW64\qfxzi.exe eouwa.exe File created C:\Windows\SysWOW64\faiyi.exe sjfwz.exe File created C:\Windows\SysWOW64\axoyg.exe qjnbi.exe File opened for modification C:\Windows\SysWOW64\jsznn.exe wufkf.exe File created C:\Windows\SysWOW64\vrnee.exe jasbw.exe File opened for modification C:\Windows\SysWOW64\rpjvp.exe ecafk.exe File created C:\Windows\SysWOW64\nxrnk.exe bhwlc.exe File created C:\Windows\SysWOW64\ruxvr.exe edvtj.exe File created C:\Windows\SysWOW64\dsvcs.exe qflnm.exe File opened for modification C:\Windows\SysWOW64\oovps.exe bpanj.exe File created C:\Windows\SysWOW64\dorzv.exe tiqbx.exe File created C:\Windows\SysWOW64\xyyal.exe kidyc.exe File opened for modification C:\Windows\SysWOW64\hfjwp.exe uogtg.exe File opened for modification C:\Windows\SysWOW64\ckgtd.exe sarrp.exe File opened for modification C:\Windows\SysWOW64\lhovq.exe yjush.exe File created C:\Windows\SysWOW64\syope.exe isozo.exe File opened for modification C:\Windows\SysWOW64\ucmkt.exe hdspk.exe File opened for modification C:\Windows\SysWOW64\gqnpg.exe wcnaq.exe File created C:\Windows\SysWOW64\uflyh.exe hpivy.exe File opened for modification C:\Windows\SysWOW64\njszp.exe apmjd.exe File created C:\Windows\SysWOW64\equim.exe roosb.exe File opened for modification C:\Windows\SysWOW64\oewlo.exe bgbif.exe File opened for modification C:\Windows\SysWOW64\agwmr.exe npbja.exe File created C:\Windows\SysWOW64\bbvqp.exe ocsnh.exe File created C:\Windows\SysWOW64\tylpz.exe gluzu.exe File opened for modification C:\Windows\SysWOW64\yitnv.exe lkzkn.exe File opened for modification C:\Windows\SysWOW64\gahzk.exe tjnwb.exe File created C:\Windows\SysWOW64\badhs.exe pgxah.exe File created C:\Windows\SysWOW64\hymee.exe uegwt.exe File opened for modification C:\Windows\SysWOW64\efcsx.exe rohpg.exe File opened for modification C:\Windows\SysWOW64\sqeky.exe qcdvi.exe File opened for modification C:\Windows\SysWOW64\fbgqf.exe sopsz.exe File created C:\Windows\SysWOW64\mkakk.exe zmxhb.exe File created C:\Windows\SysWOW64\nttzx.exe diexc.exe File created C:\Windows\SysWOW64\grrkf.exe tboix.exe File created C:\Windows\SysWOW64\qiqgi.exe gfbvv.exe File opened for modification C:\Windows\SysWOW64\lsmxy.exe celia.exe File opened for modification C:\Windows\SysWOW64\qiqgi.exe gfbvv.exe File opened for modification C:\Windows\SysWOW64\mqptt.exe zsnrc.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kmjye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwkop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jlemi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rohpg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fruzr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bcd874515272d8710cf53e748ad15d3f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loowk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfacc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ruxvr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kobol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qgutq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rgbhf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhwlc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kkugj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcxzn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language efcsx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hdspk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpvkk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnjva.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qrfnz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zghjc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rdgte.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bkjzx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amsgk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language egtbs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lhovq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sujks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uqaqc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vttxg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mkakk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xhxpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mlytx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language elwfu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bqpyw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ggzfk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sjbhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yaove.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gmhwr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iuvgx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ubkll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zlcur.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nkake.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wtfeg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ocsnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language itvin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ndzyz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qvzto.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjlwk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xnwgc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jhyhv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avwqs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wvjjz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gyrio.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlmbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language celri.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dngmv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvyzg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uiymi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xvlxb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unicp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vevro.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sqdbr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language whgzt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xsovl.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2740 2412 bcd874515272d8710cf53e748ad15d3f_JaffaCakes118.exe 30 PID 2412 wrote to memory of 2740 2412 bcd874515272d8710cf53e748ad15d3f_JaffaCakes118.exe 30 PID 2412 wrote to memory of 2740 2412 bcd874515272d8710cf53e748ad15d3f_JaffaCakes118.exe 30 PID 2412 wrote to memory of 2740 2412 bcd874515272d8710cf53e748ad15d3f_JaffaCakes118.exe 30 PID 2740 wrote to memory of 2336 2740 loowk.exe 31 PID 2740 wrote to memory of 2336 2740 loowk.exe 31 PID 2740 wrote to memory of 2336 2740 loowk.exe 31 PID 2740 wrote to memory of 2336 2740 loowk.exe 31 PID 2336 wrote to memory of 2288 2336 dortj.exe 32 PID 2336 wrote to memory of 2288 2336 dortj.exe 32 PID 2336 wrote to memory of 2288 2336 dortj.exe 32 PID 2336 wrote to memory of 2288 2336 dortj.exe 32 PID 2288 wrote to memory of 2036 2288 pxvom.exe 33 PID 2288 wrote to memory of 2036 2288 pxvom.exe 33 PID 2288 wrote to memory of 2036 2288 pxvom.exe 33 PID 2288 wrote to memory of 2036 2288 pxvom.exe 33 PID 2036 wrote to memory of 2372 2036 hmueq.exe 34 PID 2036 wrote to memory of 2372 2036 hmueq.exe 34 PID 2036 wrote to memory of 2372 2036 hmueq.exe 34 PID 2036 wrote to memory of 2372 2036 hmueq.exe 34 PID 2372 wrote to memory of 924 2372 dnmru.exe 35 PID 2372 wrote to memory of 924 2372 dnmru.exe 35 PID 2372 wrote to memory of 924 2372 dnmru.exe 35 PID 2372 wrote to memory of 924 2372 dnmru.exe 35 PID 924 wrote to memory of 2320 924 ylvux.exe 36 PID 924 wrote to memory of 2320 924 ylvux.exe 36 PID 924 wrote to memory of 2320 924 ylvux.exe 36 PID 924 wrote to memory of 2320 924 ylvux.exe 36 PID 2320 wrote to memory of 884 2320 psujt.exe 37 PID 2320 wrote to memory of 884 2320 psujt.exe 37 PID 2320 wrote to memory of 884 2320 psujt.exe 37 PID 2320 wrote to memory of 884 2320 psujt.exe 37 PID 884 wrote to memory of 2728 884 psbji.exe 38 PID 884 wrote to memory of 2728 884 psbji.exe 38 PID 884 wrote to memory of 2728 884 psbji.exe 38 PID 884 wrote to memory of 2728 884 psbji.exe 38 PID 2728 wrote to memory of 2940 2728 xapcc.exe 39 PID 2728 wrote to memory of 2940 2728 xapcc.exe 39 PID 2728 wrote to memory of 2940 2728 xapcc.exe 39 PID 2728 wrote to memory of 2940 2728 xapcc.exe 39 PID 2940 wrote to memory of 1892 2940 wwbhz.exe 40 PID 2940 wrote to memory of 1892 2940 wwbhz.exe 40 PID 2940 wrote to memory of 1892 2940 wwbhz.exe 40 PID 2940 wrote to memory of 1892 2940 wwbhz.exe 40 PID 1892 wrote to memory of 2472 1892 tqwup.exe 41 PID 1892 wrote to memory of 2472 1892 tqwup.exe 41 PID 1892 wrote to memory of 2472 1892 tqwup.exe 41 PID 1892 wrote to memory of 2472 1892 tqwup.exe 41 PID 2472 wrote to memory of 1480 2472 abvzm.exe 42 PID 2472 wrote to memory of 1480 2472 abvzm.exe 42 PID 2472 wrote to memory of 1480 2472 abvzm.exe 42 PID 2472 wrote to memory of 1480 2472 abvzm.exe 42 PID 1480 wrote to memory of 1996 1480 iffmw.exe 43 PID 1480 wrote to memory of 1996 1480 iffmw.exe 43 PID 1480 wrote to memory of 1996 1480 iffmw.exe 43 PID 1480 wrote to memory of 1996 1480 iffmw.exe 43 PID 1996 wrote to memory of 1896 1996 iudsv.exe 44 PID 1996 wrote to memory of 1896 1996 iudsv.exe 44 PID 1996 wrote to memory of 1896 1996 iudsv.exe 44 PID 1996 wrote to memory of 1896 1996 iudsv.exe 44 PID 1896 wrote to memory of 2284 1896 wkmkb.exe 45 PID 1896 wrote to memory of 2284 1896 wkmkb.exe 45 PID 1896 wrote to memory of 2284 1896 wkmkb.exe 45 PID 1896 wrote to memory of 2284 1896 wkmkb.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcd874515272d8710cf53e748ad15d3f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bcd874515272d8710cf53e748ad15d3f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\loowk.exeC:\Windows\system32\loowk.exe 624 "C:\Users\Admin\AppData\Local\Temp\bcd874515272d8710cf53e748ad15d3f_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\dortj.exeC:\Windows\system32\dortj.exe 600 "C:\Windows\SysWOW64\loowk.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\pxvom.exeC:\Windows\system32\pxvom.exe 608 "C:\Windows\SysWOW64\dortj.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\hmueq.exeC:\Windows\system32\hmueq.exe 604 "C:\Windows\SysWOW64\pxvom.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\dnmru.exeC:\Windows\system32\dnmru.exe 696 "C:\Windows\SysWOW64\hmueq.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\ylvux.exeC:\Windows\system32\ylvux.exe 612 "C:\Windows\SysWOW64\dnmru.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Windows\SysWOW64\psujt.exeC:\Windows\system32\psujt.exe 616 "C:\Windows\SysWOW64\ylvux.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\psbji.exeC:\Windows\system32\psbji.exe 636 "C:\Windows\SysWOW64\psujt.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\xapcc.exeC:\Windows\system32\xapcc.exe 708 "C:\Windows\SysWOW64\psbji.exe"10⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\wwbhz.exeC:\Windows\system32\wwbhz.exe 656 "C:\Windows\SysWOW64\xapcc.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\tqwup.exeC:\Windows\system32\tqwup.exe 660 "C:\Windows\SysWOW64\wwbhz.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\abvzm.exeC:\Windows\system32\abvzm.exe 728 "C:\Windows\SysWOW64\tqwup.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\iffmw.exeC:\Windows\system32\iffmw.exe 720 "C:\Windows\SysWOW64\abvzm.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\iudsv.exeC:\Windows\system32\iudsv.exe 724 "C:\Windows\SysWOW64\iffmw.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\wkmkb.exeC:\Windows\system32\wkmkb.exe 628 "C:\Windows\SysWOW64\iudsv.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\barxx.exeC:\Windows\system32\barxx.exe 648 "C:\Windows\SysWOW64\wkmkb.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2284 -
C:\Windows\SysWOW64\qbdxy.exeC:\Windows\system32\qbdxy.exe 632 "C:\Windows\SysWOW64\barxx.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1636 -
C:\Windows\SysWOW64\gqoxf.exeC:\Windows\system32\gqoxf.exe 764 "C:\Windows\SysWOW64\qbdxy.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2884 -
C:\Windows\SysWOW64\ncvcu.exeC:\Windows\system32\ncvcu.exe 744 "C:\Windows\SysWOW64\gqoxf.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2572 -
C:\Windows\SysWOW64\dvsxe.exeC:\Windows\system32\dvsxe.exe 748 "C:\Windows\SysWOW64\ncvcu.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2376 -
C:\Windows\SysWOW64\qibnj.exeC:\Windows\system32\qibnj.exe 756 "C:\Windows\SysWOW64\dvsxe.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:484 -
C:\Windows\SysWOW64\apokc.exeC:\Windows\system32\apokc.exe 760 "C:\Windows\SysWOW64\qibnj.exe"23⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
PID:1368 -
C:\Windows\SysWOW64\njuan.exeC:\Windows\system32\njuan.exe 752 "C:\Windows\SysWOW64\apokc.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1428 -
C:\Windows\SysWOW64\xqyxy.exeC:\Windows\system32\xqyxy.exe 776 "C:\Windows\SysWOW64\njuan.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1152 -
C:\Windows\SysWOW64\khbag.exeC:\Windows\system32\khbag.exe 768 "C:\Windows\SysWOW64\xqyxy.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2092 -
C:\Windows\SysWOW64\roosb.exeC:\Windows\system32\roosb.exe 780 "C:\Windows\SysWOW64\khbag.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2532 -
C:\Windows\SysWOW64\equim.exeC:\Windows\system32\equim.exe 784 "C:\Windows\SysWOW64\roosb.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2268 -
C:\Windows\SysWOW64\otjsz.exeC:\Windows\system32\otjsz.exe 792 "C:\Windows\SysWOW64\equim.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3032 -
C:\Windows\SysWOW64\bgbif.exeC:\Windows\system32\bgbif.exe 772 "C:\Windows\SysWOW64\otjsz.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2636 -
C:\Windows\SysWOW64\oewlo.exeC:\Windows\system32\oewlo.exe 796 "C:\Windows\SysWOW64\bgbif.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:584 -
C:\Windows\SysWOW64\yhlvj.exeC:\Windows\system32\yhlvj.exe 800 "C:\Windows\SysWOW64\oewlo.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1360 -
C:\Windows\SysWOW64\fphnv.exeC:\Windows\system32\fphnv.exe 804 "C:\Windows\SysWOW64\yhlvj.exe"33⤵
- Executes dropped EXE
PID:2912 -
C:\Windows\SysWOW64\srndg.exeC:\Windows\system32\srndg.exe 808 "C:\Windows\SysWOW64\fphnv.exe"34⤵
- Executes dropped EXE
PID:2088 -
C:\Windows\SysWOW64\cmonw.exeC:\Windows\system32\cmonw.exe 816 "C:\Windows\SysWOW64\srndg.exe"35⤵
- Executes dropped EXE
PID:3012 -
C:\Windows\SysWOW64\mpdyj.exeC:\Windows\system32\mpdyj.exe 812 "C:\Windows\SysWOW64\cmonw.exe"36⤵
- Executes dropped EXE
PID:3024 -
C:\Windows\SysWOW64\wwhvu.exeC:\Windows\system32\wwhvu.exe 820 "C:\Windows\SysWOW64\mpdyj.exe"37⤵
- Executes dropped EXE
PID:2880 -
C:\Windows\SysWOW64\jnkyk.exeC:\Windows\system32\jnkyk.exe 788 "C:\Windows\SysWOW64\wwhvu.exe"38⤵
- Executes dropped EXE
PID:2764 -
C:\Windows\SysWOW64\wlfat.exeC:\Windows\system32\wlfat.exe 840 "C:\Windows\SysWOW64\jnkyk.exe"39⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1552 -
C:\Windows\SysWOW64\jczdc.exeC:\Windows\system32\jczdc.exe 824 "C:\Windows\SysWOW64\wlfat.exe"40⤵
- Executes dropped EXE
PID:2172 -
C:\Windows\SysWOW64\qnyir.exeC:\Windows\system32\qnyir.exe 836 "C:\Windows\SysWOW64\jczdc.exe"41⤵
- Executes dropped EXE
PID:2440 -
C:\Windows\SysWOW64\daqgw.exeC:\Windows\system32\daqgw.exe 828 "C:\Windows\SysWOW64\qnyir.exe"42⤵
- Executes dropped EXE
PID:896 -
C:\Windows\SysWOW64\nhudp.exeC:\Windows\system32\nhudp.exe 844 "C:\Windows\SysWOW64\daqgw.exe"43⤵
- Executes dropped EXE
PID:396 -
C:\Windows\SysWOW64\abila.exeC:\Windows\system32\abila.exe 832 "C:\Windows\SysWOW64\nhudp.exe"44⤵
- Executes dropped EXE
- Identifies Wine through registry keys
PID:3008 -
C:\Windows\SysWOW64\klxvn.exeC:\Windows\system32\klxvn.exe 852 "C:\Windows\SysWOW64\abila.exe"45⤵
- Executes dropped EXE
PID:2684 -
C:\Windows\SysWOW64\xcsyw.exeC:\Windows\system32\xcsyw.exe 848 "C:\Windows\SysWOW64\klxvn.exe"46⤵
- Executes dropped EXE
PID:2008 -
C:\Windows\SysWOW64\kanbn.exeC:\Windows\system32\kanbn.exe 860 "C:\Windows\SysWOW64\xcsyw.exe"47⤵
- Executes dropped EXE
PID:1144 -
C:\Windows\SysWOW64\orqev.exeC:\Windows\system32\orqev.exe 864 "C:\Windows\SysWOW64\kanbn.exe"48⤵
- Executes dropped EXE
PID:2244 -
C:\Windows\SysWOW64\wzdwh.exeC:\Windows\system32\wzdwh.exe 872 "C:\Windows\SysWOW64\orqev.exe"49⤵
- Executes dropped EXE
PID:624 -
C:\Windows\SysWOW64\jxgyq.exeC:\Windows\system32\jxgyq.exe 868 "C:\Windows\SysWOW64\wzdwh.exe"50⤵
- Executes dropped EXE
PID:2768 -
C:\Windows\SysWOW64\tavjl.exeC:\Windows\system32\tavjl.exe 876 "C:\Windows\SysWOW64\jxgyq.exe"51⤵
- Executes dropped EXE
PID:1880 -
C:\Windows\SysWOW64\jewep.exeC:\Windows\system32\jewep.exe 880 "C:\Windows\SysWOW64\tavjl.exe"52⤵
- Executes dropped EXE
PID:2292 -
C:\Windows\SysWOW64\qmreb.exeC:\Windows\system32\qmreb.exe 884 "C:\Windows\SysWOW64\jewep.exe"53⤵
- Executes dropped EXE
PID:2116 -
C:\Windows\SysWOW64\crizq.exeC:\Windows\system32\crizq.exe 856 "C:\Windows\SysWOW64\qmreb.exe"54⤵
- Executes dropped EXE
PID:2960 -
C:\Windows\SysWOW64\nymwi.exeC:\Windows\system32\nymwi.exe 892 "C:\Windows\SysWOW64\crizq.exe"55⤵
- Executes dropped EXE
PID:1724 -
C:\Windows\SysWOW64\alemo.exeC:\Windows\system32\alemo.exe 888 "C:\Windows\SysWOW64\nymwi.exe"56⤵
- Executes dropped EXE
- Identifies Wine through registry keys
PID:2168 -
C:\Windows\SysWOW64\kotwb.exeC:\Windows\system32\kotwb.exe 900 "C:\Windows\SysWOW64\alemo.exe"57⤵
- Executes dropped EXE
PID:856 -
C:\Windows\SysWOW64\xbdmh.exeC:\Windows\system32\xbdmh.exe 904 "C:\Windows\SysWOW64\kotwb.exe"58⤵
- Executes dropped EXE
PID:1768 -
C:\Windows\SysWOW64\eukze.exeC:\Windows\system32\eukze.exe 912 "C:\Windows\SysWOW64\xbdmh.exe"59⤵
- Executes dropped EXE
- Identifies Wine through registry keys
PID:1280 -
C:\Windows\SysWOW64\rlecn.exeC:\Windows\system32\rlecn.exe 908 "C:\Windows\SysWOW64\eukze.exe"60⤵
- Executes dropped EXE
- Identifies Wine through registry keys
PID:2152 -
C:\Windows\SysWOW64\bkjzx.exeC:\Windows\system32\bkjzx.exe 928 "C:\Windows\SysWOW64\rlecn.exe"61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2032 -
C:\Windows\SysWOW64\luyjs.exeC:\Windows\system32\luyjs.exe 896 "C:\Windows\SysWOW64\bkjzx.exe"62⤵
- Executes dropped EXE
PID:1012 -
C:\Windows\SysWOW64\yhpzy.exeC:\Windows\system32\yhpzy.exe 924 "C:\Windows\SysWOW64\luyjs.exe"63⤵
- Executes dropped EXE
PID:904 -
C:\Windows\SysWOW64\isfjl.exeC:\Windows\system32\isfjl.exe 920 "C:\Windows\SysWOW64\yhpzy.exe"64⤵
- Executes dropped EXE
PID:2692 -
C:\Windows\SysWOW64\viimu.exeC:\Windows\system32\viimu.exe 932 "C:\Windows\SysWOW64\isfjl.exe"65⤵
- Executes dropped EXE
PID:3028 -
C:\Windows\SysWOW64\izcpc.exeC:\Windows\system32\izcpc.exe 916 "C:\Windows\SysWOW64\viimu.exe"66⤵PID:1804
-
C:\Windows\SysWOW64\psbuz.exeC:\Windows\system32\psbuz.exe 944 "C:\Windows\SysWOW64\izcpc.exe"67⤵PID:832
-
C:\Windows\SysWOW64\hrdzw.exeC:\Windows\system32\hrdzw.exe 940 "C:\Windows\SysWOW64\psbuz.exe"68⤵PID:2916
-
C:\Windows\SysWOW64\uqgcn.exeC:\Windows\system32\uqgcn.exe 948 "C:\Windows\SysWOW64\hrdzw.exe"69⤵PID:1600
-
C:\Windows\SysWOW64\eezzd.exeC:\Windows\system32\eezzd.exe 952 "C:\Windows\SysWOW64\uqgcn.exe"70⤵PID:2140
-
C:\Windows\SysWOW64\ruccm.exeC:\Windows\system32\ruccm.exe 964 "C:\Windows\SysWOW64\eezzd.exe"71⤵PID:2736
-
C:\Windows\SysWOW64\elwfu.exeC:\Windows\system32\elwfu.exe 956 "C:\Windows\SysWOW64\ruccm.exe"72⤵
- System Location Discovery: System Language Discovery
PID:1260 -
C:\Windows\SysWOW64\rjrhd.exeC:\Windows\system32\rjrhd.exe 960 "C:\Windows\SysWOW64\elwfu.exe"73⤵PID:1964
-
C:\Windows\SysWOW64\bmpky.exeC:\Windows\system32\bmpky.exe 968 "C:\Windows\SysWOW64\rjrhd.exe"74⤵PID:2696
-
C:\Windows\SysWOW64\nljmh.exeC:\Windows\system32\nljmh.exe 976 "C:\Windows\SysWOW64\bmpky.exe"75⤵PID:2356
-
C:\Windows\SysWOW64\abepp.exeC:\Windows\system32\abepp.exe 972 "C:\Windows\SysWOW64\nljmh.exe"76⤵PID:2420
-
C:\Windows\SysWOW64\nahsy.exeC:\Windows\system32\nahsy.exe 980 "C:\Windows\SysWOW64\abepp.exe"77⤵
- Identifies Wine through registry keys
PID:2276 -
C:\Windows\SysWOW64\xgapo.exeC:\Windows\system32\xgapo.exe 984 "C:\Windows\SysWOW64\nahsy.exe"78⤵PID:1476
-
C:\Windows\SysWOW64\ktrfu.exeC:\Windows\system32\ktrfu.exe 988 "C:\Windows\SysWOW64\xgapo.exe"79⤵PID:1968
-
C:\Windows\SysWOW64\xvxvn.exeC:\Windows\system32\xvxvn.exe 992 "C:\Windows\SysWOW64\ktrfu.exe"80⤵PID:2144
-
C:\Windows\SysWOW64\ktsxw.exeC:\Windows\system32\ktsxw.exe 996 "C:\Windows\SysWOW64\xvxvn.exe"81⤵PID:2560
-
C:\Windows\SysWOW64\xkvae.exeC:\Windows\system32\xkvae.exe 1000 "C:\Windows\SysWOW64\ktsxw.exe"82⤵PID:2228
-
C:\Windows\SysWOW64\gyvpu.exeC:\Windows\system32\gyvpu.exe 1008 "C:\Windows\SysWOW64\xkvae.exe"83⤵PID:876
-
C:\Windows\SysWOW64\toqsd.exeC:\Windows\system32\toqsd.exe 1016 "C:\Windows\SysWOW64\gyvpu.exe"84⤵PID:3000
-
C:\Windows\SysWOW64\gnlvm.exeC:\Windows\system32\gnlvm.exe 1004 "C:\Windows\SysWOW64\toqsd.exe"85⤵PID:2432
-
C:\Windows\SysWOW64\tdoxu.exeC:\Windows\system32\tdoxu.exe 1012 "C:\Windows\SysWOW64\gnlvm.exe"86⤵PID:2932
-
C:\Windows\SysWOW64\gujal.exeC:\Windows\system32\gujal.exe 1020 "C:\Windows\SysWOW64\tdoxu.exe"87⤵PID:1488
-
C:\Windows\SysWOW64\pijxb.exeC:\Windows\system32\pijxb.exe 936 "C:\Windows\SysWOW64\gujal.exe"88⤵PID:2160
-
C:\Windows\SysWOW64\dvbnh.exeC:\Windows\system32\dvbnh.exe 1032 "C:\Windows\SysWOW64\pijxb.exe"89⤵
- Identifies Wine through registry keys
PID:2132 -
C:\Windows\SysWOW64\qtwqp.exeC:\Windows\system32\qtwqp.exe 1036 "C:\Windows\SysWOW64\dvbnh.exe"90⤵PID:1124
-
C:\Windows\SysWOW64\zwlal.exeC:\Windows\system32\zwlal.exe 1044 "C:\Windows\SysWOW64\qtwqp.exe"91⤵
- Drops file in System32 directory
PID:2224 -
C:\Windows\SysWOW64\mugdt.exeC:\Windows\system32\mugdt.exe 1040 "C:\Windows\SysWOW64\zwlal.exe"92⤵PID:2040
-
C:\Windows\SysWOW64\xtsae.exeC:\Windows\system32\xtsae.exe 1060 "C:\Windows\SysWOW64\mugdt.exe"93⤵PID:1272
-
C:\Windows\SysWOW64\jnyip.exeC:\Windows\system32\jnyip.exe 1048 "C:\Windows\SysWOW64\xtsae.exe"94⤵
- Identifies Wine through registry keys
- Drops file in System32 directory
PID:2108 -
C:\Windows\SysWOW64\wmtly.exeC:\Windows\system32\wmtly.exe 1052 "C:\Windows\SysWOW64\jnyip.exe"95⤵PID:2000
-
C:\Windows\SysWOW64\bcong.exeC:\Windows\system32\bcong.exe 1056 "C:\Windows\SysWOW64\wmtly.exe"96⤵PID:1608
-
C:\Windows\SysWOW64\lrole.exeC:\Windows\system32\lrole.exe 1064 "C:\Windows\SysWOW64\bcong.exe"97⤵PID:1044
-
C:\Windows\SysWOW64\yhrnn.exeC:\Windows\system32\yhrnn.exe 1068 "C:\Windows\SysWOW64\lrole.exe"98⤵
- Identifies Wine through registry keys
PID:780 -
C:\Windows\SysWOW64\kgmqv.exeC:\Windows\system32\kgmqv.exe 1076 "C:\Windows\SysWOW64\yhrnn.exe"99⤵PID:2920
-
C:\Windows\SysWOW64\xwhte.exeC:\Windows\system32\xwhte.exe 1072 "C:\Windows\SysWOW64\kgmqv.exe"100⤵PID:1228
-
C:\Windows\SysWOW64\kvkvn.exeC:\Windows\system32\kvkvn.exe 1080 "C:\Windows\SysWOW64\xwhte.exe"101⤵
- Identifies Wine through registry keys
PID:1136 -
C:\Windows\SysWOW64\ubkll.exeC:\Windows\system32\ubkll.exe 1084 "C:\Windows\SysWOW64\kvkvn.exe"102⤵
- System Location Discovery: System Language Discovery
PID:2848 -
C:\Windows\SysWOW64\hzfot.exeC:\Windows\system32\hzfot.exe 1088 "C:\Windows\SysWOW64\ubkll.exe"103⤵PID:1520
-
C:\Windows\SysWOW64\uqaqc.exeC:\Windows\system32\uqaqc.exe 1092 "C:\Windows\SysWOW64\hzfot.exe"104⤵
- System Location Discovery: System Language Discovery
PID:844 -
C:\Windows\SysWOW64\hodtl.exeC:\Windows\system32\hodtl.exe 1096 "C:\Windows\SysWOW64\uqaqc.exe"105⤵PID:2120
-
C:\Windows\SysWOW64\ufxwt.exeC:\Windows\system32\ufxwt.exe 1100 "C:\Windows\SysWOW64\hodtl.exe"106⤵PID:2396
-
C:\Windows\SysWOW64\dtytj.exeC:\Windows\system32\dtytj.exe 1104 "C:\Windows\SysWOW64\ufxwt.exe"107⤵PID:2264
-
C:\Windows\SysWOW64\qjtws.exeC:\Windows\system32\qjtws.exe 1108 "C:\Windows\SysWOW64\dtytj.exe"108⤵PID:2732
-
C:\Windows\SysWOW64\dioqi.exeC:\Windows\system32\dioqi.exe 1112 "C:\Windows\SysWOW64\qjtws.exe"109⤵PID:2832
-
C:\Windows\SysWOW64\qyqtr.exeC:\Windows\system32\qyqtr.exe 1116 "C:\Windows\SysWOW64\dioqi.exe"110⤵PID:2632
-
C:\Windows\SysWOW64\dxlwa.exeC:\Windows\system32\dxlwa.exe 1120 "C:\Windows\SysWOW64\qyqtr.exe"111⤵PID:320
-
C:\Windows\SysWOW64\ndmtq.exeC:\Windows\system32\ndmtq.exe 1124 "C:\Windows\SysWOW64\dxlwa.exe"112⤵PID:2672
-
C:\Windows\SysWOW64\zbhwy.exeC:\Windows\system32\zbhwy.exe 1128 "C:\Windows\SysWOW64\ndmtq.exe"113⤵PID:3016
-
C:\Windows\SysWOW64\mskyh.exeC:\Windows\system32\mskyh.exe 1132 "C:\Windows\SysWOW64\zbhwy.exe"114⤵PID:2136
-
C:\Windows\SysWOW64\ziebp.exeC:\Windows\system32\ziebp.exe 1148 "C:\Windows\SysWOW64\mskyh.exe"115⤵
- Identifies Wine through registry keys
PID:1716 -
C:\Windows\SysWOW64\mhzeg.exeC:\Windows\system32\mhzeg.exe 1136 "C:\Windows\SysWOW64\ziebp.exe"116⤵PID:1904
-
C:\Windows\SysWOW64\wvatw.exeC:\Windows\system32\wvatw.exe 1144 "C:\Windows\SysWOW64\mhzeg.exe"117⤵PID:2196
-
C:\Windows\SysWOW64\jlvwf.exeC:\Windows\system32\jlvwf.exe 1140 "C:\Windows\SysWOW64\wvatw.exe"118⤵PID:1576
-
C:\Windows\SysWOW64\wcxzn.exeC:\Windows\system32\wcxzn.exe 1168 "C:\Windows\SysWOW64\jlvwf.exe"119⤵
- System Location Discovery: System Language Discovery
PID:2388 -
C:\Windows\SysWOW64\jasbw.exeC:\Windows\system32\jasbw.exe 1028 "C:\Windows\SysWOW64\wcxzn.exe"120⤵
- Drops file in System32 directory
PID:2480 -
C:\Windows\SysWOW64\vrnee.exeC:\Windows\system32\vrnee.exe 1172 "C:\Windows\SysWOW64\jasbw.exe"121⤵PID:2520
-
C:\Windows\SysWOW64\ffobd.exeC:\Windows\system32\ffobd.exe 1156 "C:\Windows\SysWOW64\vrnee.exe"122⤵PID:632
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-