Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 03:53
Static task
static1
Behavioral task
behavioral1
Sample
c5c7337e1cc43922cb5c9e312dc07aec_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c5c7337e1cc43922cb5c9e312dc07aec_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
c5c7337e1cc43922cb5c9e312dc07aec_JaffaCakes118.exe
-
Size
406KB
-
MD5
c5c7337e1cc43922cb5c9e312dc07aec
-
SHA1
106f6fe7724580d32782c16e914df82b6c94dae6
-
SHA256
0e4cc5443850aa4ae804edf9e38364bf66a352934222a9f183a0f818433c0b0b
-
SHA512
23a7f7a74ad54239a4f25fc0d6145217a1555dcb2181aad5ed7448dad62ab016944c5d213285d137d0c86ac106f4ca09a797fcc7178abfd68850e719dafcea16
-
SSDEEP
6144:0OXbPDYSa4EllnQRWjLFup4aocXIxcg4g+gwoM9i3Uxc8hn2S7eW3Muu/:hL0LfnQELVaoNCg47gEz+8hnrl3MP/
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 64 IoCs
pid Process 2680 ohqhvoc.exe 2744 ohqhvoc.exe 2560 ozrzxam.exe 3000 ozrzxam.exe 3052 yydwhzu.exe 2128 yydwhzu.exe 1724 cpajdnf.exe 984 cpajdnf.exe 1148 fhshwbf.exe 604 fhshwbf.exe 2180 rbyxhor.exe 1444 rbyxhor.exe 1132 fopmnrq.exe 1968 fopmnrq.exe 2448 jajugtv.exe 712 jajugtv.exe 1380 wgapukg.exe 1036 wgapukg.exe 2964 gbtzceh.exe 2388 gbtzceh.exe 2340 qbffudo.exe 2908 qbffudo.exe 2792 twgpcyp.exe 2800 twgpcyp.exe 2916 dvknmww.exe 2884 dvknmww.exe 1204 pbbpafi.exe 800 pbbpafi.exe 2564 cwlfojg.exe 2976 cwlfojg.exe 1648 myipcmn.exe 620 myipcmn.exe 1580 xubajhv.exe 2860 xubajhv.exe 2076 heqkekc.exe 536 heqkekc.exe 3064 rhovsni.exe 2272 rhovsni.exe 2172 dyjxavo.exe 444 dyjxavo.exe 1792 rtangrm.exe 2176 rtangrm.exe 1864 bsekqqu.exe 2512 bsekqqu.exe 1776 kgfioxh.exe 1516 kgfioxh.exe 2092 ytoxubg.exe 2408 ytoxubg.exe 2300 isbvfan.exe 880 isbvfan.exe 2984 suqfadu.exe 1560 suqfadu.exe 2820 ftliidz.exe 2136 ftliidz.exe 2656 rjolrlx.exe 2692 rjolrlx.exe 1280 eiinatc.exe 1096 eiinatc.exe 1996 olyynwj.exe 1152 olyynwj.exe 816 bjbavxo.exe 2204 bjbavxo.exe 1580 lmqlrav.exe 1484 lmqlrav.exe -
Loads dropped DLL 64 IoCs
pid Process 2692 c5c7337e1cc43922cb5c9e312dc07aec_JaffaCakes118.exe 2692 c5c7337e1cc43922cb5c9e312dc07aec_JaffaCakes118.exe 2680 ohqhvoc.exe 2744 ohqhvoc.exe 2744 ohqhvoc.exe 2560 ozrzxam.exe 3000 ozrzxam.exe 3000 ozrzxam.exe 3052 yydwhzu.exe 2128 yydwhzu.exe 2128 yydwhzu.exe 1724 cpajdnf.exe 984 cpajdnf.exe 984 cpajdnf.exe 1148 fhshwbf.exe 604 fhshwbf.exe 604 fhshwbf.exe 1444 rbyxhor.exe 1444 rbyxhor.exe 1968 fopmnrq.exe 1968 fopmnrq.exe 712 jajugtv.exe 712 jajugtv.exe 1036 wgapukg.exe 1036 wgapukg.exe 2388 gbtzceh.exe 2388 gbtzceh.exe 2908 qbffudo.exe 2908 qbffudo.exe 2800 twgpcyp.exe 2800 twgpcyp.exe 2884 dvknmww.exe 2884 dvknmww.exe 800 pbbpafi.exe 800 pbbpafi.exe 2976 cwlfojg.exe 2976 cwlfojg.exe 620 myipcmn.exe 620 myipcmn.exe 2860 xubajhv.exe 2860 xubajhv.exe 536 heqkekc.exe 536 heqkekc.exe 2272 rhovsni.exe 2272 rhovsni.exe 444 dyjxavo.exe 444 dyjxavo.exe 2176 rtangrm.exe 2176 rtangrm.exe 2512 bsekqqu.exe 2512 bsekqqu.exe 1516 kgfioxh.exe 1516 kgfioxh.exe 2408 ytoxubg.exe 2408 ytoxubg.exe 880 isbvfan.exe 880 isbvfan.exe 1560 suqfadu.exe 1560 suqfadu.exe 2136 ftliidz.exe 2136 ftliidz.exe 2692 rjolrlx.exe 2692 rjolrlx.exe 1096 eiinatc.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\kqwbwns.exe Process not Found File created C:\Windows\SysWOW64\pqfjugy.exe dortjuu.exe File opened for modification C:\Windows\SysWOW64\aqxqrfh.exe ndobmbi.exe File created C:\Windows\SysWOW64\lggpdej.exe yimmuwe.exe File created C:\Windows\SysWOW64\zruarem.exe marxiwp.exe File opened for modification C:\Windows\SysWOW64\nsjyhax.exe xojddub.exe File created C:\Windows\SysWOW64\vsxkobj.exe Process not Found File opened for modification C:\Windows\SysWOW64\iycxprn.exe Process not Found File created C:\Windows\SysWOW64\ettxlku.exe Process not Found File opened for modification C:\Windows\SysWOW64\mfjvvfh.exe zhgsmfb.exe File created C:\Windows\SysWOW64\oyobglg.exe bilzyli.exe File opened for modification C:\Windows\SysWOW64\ekpdxob.exe rtuaood.exe File opened for modification C:\Windows\SysWOW64\hlnbegy.exe unlyvyb.exe File created C:\Windows\SysWOW64\eeyoijs.exe rodlzjn.exe File opened for modification C:\Windows\SysWOW64\rutdlds.exe fwqacvu.exe File created C:\Windows\SysWOW64\vitbisj.exe igntwgf.exe File opened for modification C:\Windows\SysWOW64\zhgsmfb.exe mnakbsx.exe File opened for modification C:\Windows\SysWOW64\rmfzwap.exe dznkrej.exe File opened for modification C:\Windows\SysWOW64\gvlyhov.exe xswnmlp.exe File created C:\Windows\SysWOW64\bsekqqu.exe rtangrm.exe File created C:\Windows\SysWOW64\yimmuwe.exe lsrrmoy.exe File opened for modification C:\Windows\SysWOW64\lsudgil.exe ytsbxaf.exe File opened for modification C:\Windows\SysWOW64\mcqoerp.exe zdnlvqj.exe File created C:\Windows\SysWOW64\hcjrqco.exe ueowhti.exe File created C:\Windows\SysWOW64\bqxqfzs.exe Process not Found File opened for modification C:\Windows\SysWOW64\mkdicun.exe caoyhrz.exe File opened for modification C:\Windows\SysWOW64\xbewwbe.exe kdktnbz.exe File opened for modification C:\Windows\SysWOW64\htrmauo.exe uvxjsmq.exe File opened for modification C:\Windows\SysWOW64\fdbfvaj.exe seydnae.exe File opened for modification C:\Windows\SysWOW64\oqxwupr.exe eohmyml.exe File created C:\Windows\SysWOW64\zdnlvqj.exe paybind.exe File created C:\Windows\SysWOW64\tuvjomj.exe oaptuie.exe File created C:\Windows\SysWOW64\rousjjy.exe Process not Found File created C:\Windows\SysWOW64\qisnjzl.exe Process not Found File created C:\Windows\SysWOW64\ipldggt.exe vnfnnbo.exe File opened for modification C:\Windows\SysWOW64\agnfzav.exe negpnoj.exe File created C:\Windows\SysWOW64\zhxzsli.exe mruxjcc.exe File opened for modification C:\Windows\SysWOW64\eeyoijs.exe rodlzjn.exe File created C:\Windows\SysWOW64\qfyikcg.exe dlsaryc.exe File created C:\Windows\SysWOW64\gbtzceh.exe wgapukg.exe File opened for modification C:\Windows\SysWOW64\typxjhr.exe giuuahl.exe File created C:\Windows\SysWOW64\dlsaryc.exe tavqevv.exe File created C:\Windows\SysWOW64\cxgqsrf.exe Process not Found File created C:\Windows\SysWOW64\mjpwyjk.exe zsutqbn.exe File created C:\Windows\SysWOW64\tavqevv.exe gkanvmq.exe File opened for modification C:\Windows\SysWOW64\xpxviuu.exe Process not Found File created C:\Windows\SysWOW64\iaarvmy.exe Process not Found File created C:\Windows\SysWOW64\ftliidz.exe suqfadu.exe File opened for modification C:\Windows\SysWOW64\qkayxbx.exe dufvpts.exe File opened for modification C:\Windows\SysWOW64\jqrpcog.exe wwlzjcc.exe File opened for modification C:\Windows\SysWOW64\jqafxyp.exe wagcpqr.exe File created C:\Windows\SysWOW64\ydejmqx.exe iywoida.exe File opened for modification C:\Windows\SysWOW64\pdunecf.exe Process not Found File created C:\Windows\SysWOW64\ndobmbi.exe amlydbd.exe File created C:\Windows\SysWOW64\eohmyml.exe rpmjqef.exe File opened for modification C:\Windows\SysWOW64\ukycooc.exe gxhmike.exe File created C:\Windows\SysWOW64\nidujed.exe dfnjoao.exe File created C:\Windows\SysWOW64\phcwdbl.exe cqztntg.exe File opened for modification C:\Windows\SysWOW64\bfhljbt.exe oomiabo.exe File opened for modification C:\Windows\SysWOW64\iywoida.exe ywgemat.exe File opened for modification C:\Windows\SysWOW64\vxfzxat.exe Process not Found File opened for modification C:\Windows\SysWOW64\upmnnbs.exe Process not Found File opened for modification C:\Windows\SysWOW64\gigjvuj.exe wfrzaqd.exe File opened for modification C:\Windows\SysWOW64\jahnkya.exe wnxpecb.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 2212 set thread context of 2692 2212 c5c7337e1cc43922cb5c9e312dc07aec_JaffaCakes118.exe 30 PID 2680 set thread context of 2744 2680 ohqhvoc.exe 32 PID 2560 set thread context of 3000 2560 ozrzxam.exe 34 PID 3052 set thread context of 2128 3052 yydwhzu.exe 36 PID 1724 set thread context of 984 1724 cpajdnf.exe 38 PID 1148 set thread context of 604 1148 fhshwbf.exe 40 PID 2180 set thread context of 1444 2180 rbyxhor.exe 42 PID 1132 set thread context of 1968 1132 fopmnrq.exe 44 PID 2448 set thread context of 712 2448 jajugtv.exe 46 PID 1380 set thread context of 1036 1380 wgapukg.exe 48 PID 2964 set thread context of 2388 2964 gbtzceh.exe 50 PID 2340 set thread context of 2908 2340 qbffudo.exe 52 PID 2792 set thread context of 2800 2792 twgpcyp.exe 54 PID 2916 set thread context of 2884 2916 dvknmww.exe 56 PID 1204 set thread context of 800 1204 pbbpafi.exe 58 PID 2564 set thread context of 2976 2564 cwlfojg.exe 60 PID 1648 set thread context of 620 1648 myipcmn.exe 62 PID 1580 set thread context of 2860 1580 xubajhv.exe 64 PID 2076 set thread context of 536 2076 heqkekc.exe 66 PID 3064 set thread context of 2272 3064 rhovsni.exe 68 PID 2172 set thread context of 444 2172 dyjxavo.exe 70 PID 1792 set thread context of 2176 1792 rtangrm.exe 72 PID 1864 set thread context of 2512 1864 bsekqqu.exe 74 PID 1776 set thread context of 1516 1776 kgfioxh.exe 76 PID 2092 set thread context of 2408 2092 ytoxubg.exe 78 PID 2300 set thread context of 880 2300 isbvfan.exe 80 PID 2984 set thread context of 1560 2984 suqfadu.exe 82 PID 2820 set thread context of 2136 2820 ftliidz.exe 84 PID 2656 set thread context of 2692 2656 rjolrlx.exe 86 PID 1280 set thread context of 1096 1280 eiinatc.exe 88 PID 1996 set thread context of 1152 1996 olyynwj.exe 90 PID 816 set thread context of 2204 816 bjbavxo.exe 92 PID 1580 set thread context of 1484 1580 lmqlrav.exe 94 PID 1148 set thread context of 2844 1148 yzabxeb.exe 96 PID 2492 set thread context of 2316 2492 inaqnlg.exe 98 PID 2172 set thread context of 2272 2172 vasoshn.exe 100 PID 624 set thread context of 1716 624 fkhyokt.exe 102 PID 1524 set thread context of 1324 1524 sxzotos.exe 104 PID 712 set thread context of 1048 712 caoyhrz.exe 106 PID 2476 set thread context of 2348 2476 mkdicun.exe 108 PID 2300 set thread context of 2408 2300 zxnyiym.exe 110 PID 2984 set thread context of 2704 2984 moqbqyr.exe 112 PID 2804 set thread context of 2680 2804 wcqqgfw.exe 114 PID 2656 set thread context of 2812 2656 jpagmjd.exe 116 PID 1280 set thread context of 2564 1280 wodjvjb.exe 118 PID 1996 set thread context of 340 1996 gqstqnp.exe 120 PID 816 set thread context of 2308 816 pbiddqv.exe 122 PID 2280 set thread context of 1800 2280 dortjuu.exe 124 PID 1156 set thread context of 1200 1156 pqfjugy.exe 126 PID 1920 set thread context of 1084 1920 zsutqbn.exe 128 PID 2100 set thread context of 1368 2100 mjpwyjk.exe 130 PID 1984 set thread context of 760 1984 zhkzhrq.exe 132 PID 1092 set thread context of 1816 1092 jkzjuvw.exe 134 PID 2240 set thread context of 1824 2240 wfrzaqd.exe 136 PID 992 set thread context of 272 992 gigjvuj.exe 138 PID 2056 set thread context of 1752 2056 tvyzbxi.exe 140 PID 2796 set thread context of 2676 2796 dfnjoao.exe 142 PID 2576 set thread context of 2872 2576 nidujed.exe 144 PID 2592 set thread context of 2020 2592 agywsea.exe 146 PID 2808 set thread context of 2216 2808 ftpmyih.exe 148 PID 2160 set thread context of 1152 2160 pwewlln.exe 150 PID 2876 set thread context of 2204 2876 cuhzttt.exe 152 PID 1028 set thread context of 3064 1028 plccctq.exe 154 PID 1788 set thread context of 2844 1788 yzdraad.exe 156 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrqktp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language itmjesf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pwewlln.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wwkxcfp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ixlketj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c5c7337e1cc43922cb5c9e312dc07aec_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dyjxavo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfhljbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bebrttt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fkhyokt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ysljmzu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dznkrej.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yegzvwc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lhjlwfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quxdeda.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mkdicun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lvleuye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwhhhat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jbdzgqm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language phcwdbl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dortjuu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bkpnapa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language naxbrus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oeswocs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rkcfzqd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wndzhmn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hpnrvgq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ekpdxob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zelhdze.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uvbxxgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language onpfcgl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ytoxubg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lmqlrav.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language krqafoj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language npjkofg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pyymoqc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language daqgwlk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yvjzwdy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vasoshn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oucgbfi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yupwgqa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htrmauo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmspxye.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2692 2212 c5c7337e1cc43922cb5c9e312dc07aec_JaffaCakes118.exe 30 PID 2212 wrote to memory of 2692 2212 c5c7337e1cc43922cb5c9e312dc07aec_JaffaCakes118.exe 30 PID 2212 wrote to memory of 2692 2212 c5c7337e1cc43922cb5c9e312dc07aec_JaffaCakes118.exe 30 PID 2212 wrote to memory of 2692 2212 c5c7337e1cc43922cb5c9e312dc07aec_JaffaCakes118.exe 30 PID 2212 wrote to memory of 2692 2212 c5c7337e1cc43922cb5c9e312dc07aec_JaffaCakes118.exe 30 PID 2212 wrote to memory of 2692 2212 c5c7337e1cc43922cb5c9e312dc07aec_JaffaCakes118.exe 30 PID 2692 wrote to memory of 2680 2692 c5c7337e1cc43922cb5c9e312dc07aec_JaffaCakes118.exe 31 PID 2692 wrote to memory of 2680 2692 c5c7337e1cc43922cb5c9e312dc07aec_JaffaCakes118.exe 31 PID 2692 wrote to memory of 2680 2692 c5c7337e1cc43922cb5c9e312dc07aec_JaffaCakes118.exe 31 PID 2692 wrote to memory of 2680 2692 c5c7337e1cc43922cb5c9e312dc07aec_JaffaCakes118.exe 31 PID 2680 wrote to memory of 2744 2680 ohqhvoc.exe 32 PID 2680 wrote to memory of 2744 2680 ohqhvoc.exe 32 PID 2680 wrote to memory of 2744 2680 ohqhvoc.exe 32 PID 2680 wrote to memory of 2744 2680 ohqhvoc.exe 32 PID 2680 wrote to memory of 2744 2680 ohqhvoc.exe 32 PID 2680 wrote to memory of 2744 2680 ohqhvoc.exe 32 PID 2744 wrote to memory of 2560 2744 ohqhvoc.exe 33 PID 2744 wrote to memory of 2560 2744 ohqhvoc.exe 33 PID 2744 wrote to memory of 2560 2744 ohqhvoc.exe 33 PID 2744 wrote to memory of 2560 2744 ohqhvoc.exe 33 PID 2560 wrote to memory of 3000 2560 ozrzxam.exe 34 PID 2560 wrote to memory of 3000 2560 ozrzxam.exe 34 PID 2560 wrote to memory of 3000 2560 ozrzxam.exe 34 PID 2560 wrote to memory of 3000 2560 ozrzxam.exe 34 PID 2560 wrote to memory of 3000 2560 ozrzxam.exe 34 PID 2560 wrote to memory of 3000 2560 ozrzxam.exe 34 PID 3000 wrote to memory of 3052 3000 ozrzxam.exe 35 PID 3000 wrote to memory of 3052 3000 ozrzxam.exe 35 PID 3000 wrote to memory of 3052 3000 ozrzxam.exe 35 PID 3000 wrote to memory of 3052 3000 ozrzxam.exe 35 PID 3052 wrote to memory of 2128 3052 yydwhzu.exe 36 PID 3052 wrote to memory of 2128 3052 yydwhzu.exe 36 PID 3052 wrote to memory of 2128 3052 yydwhzu.exe 36 PID 3052 wrote to memory of 2128 3052 yydwhzu.exe 36 PID 3052 wrote to memory of 2128 3052 yydwhzu.exe 36 PID 3052 wrote to memory of 2128 3052 yydwhzu.exe 36 PID 2128 wrote to memory of 1724 2128 yydwhzu.exe 37 PID 2128 wrote to memory of 1724 2128 yydwhzu.exe 37 PID 2128 wrote to memory of 1724 2128 yydwhzu.exe 37 PID 2128 wrote to memory of 1724 2128 yydwhzu.exe 37 PID 1724 wrote to memory of 984 1724 cpajdnf.exe 38 PID 1724 wrote to memory of 984 1724 cpajdnf.exe 38 PID 1724 wrote to memory of 984 1724 cpajdnf.exe 38 PID 1724 wrote to memory of 984 1724 cpajdnf.exe 38 PID 1724 wrote to memory of 984 1724 cpajdnf.exe 38 PID 1724 wrote to memory of 984 1724 cpajdnf.exe 38 PID 984 wrote to memory of 1148 984 cpajdnf.exe 39 PID 984 wrote to memory of 1148 984 cpajdnf.exe 39 PID 984 wrote to memory of 1148 984 cpajdnf.exe 39 PID 984 wrote to memory of 1148 984 cpajdnf.exe 39 PID 1148 wrote to memory of 604 1148 fhshwbf.exe 40 PID 1148 wrote to memory of 604 1148 fhshwbf.exe 40 PID 1148 wrote to memory of 604 1148 fhshwbf.exe 40 PID 1148 wrote to memory of 604 1148 fhshwbf.exe 40 PID 1148 wrote to memory of 604 1148 fhshwbf.exe 40 PID 1148 wrote to memory of 604 1148 fhshwbf.exe 40 PID 604 wrote to memory of 2180 604 fhshwbf.exe 41 PID 604 wrote to memory of 2180 604 fhshwbf.exe 41 PID 604 wrote to memory of 2180 604 fhshwbf.exe 41 PID 604 wrote to memory of 2180 604 fhshwbf.exe 41 PID 2180 wrote to memory of 1444 2180 rbyxhor.exe 42 PID 2180 wrote to memory of 1444 2180 rbyxhor.exe 42 PID 2180 wrote to memory of 1444 2180 rbyxhor.exe 42 PID 2180 wrote to memory of 1444 2180 rbyxhor.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5c7337e1cc43922cb5c9e312dc07aec_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c5c7337e1cc43922cb5c9e312dc07aec_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\c5c7337e1cc43922cb5c9e312dc07aec_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c5c7337e1cc43922cb5c9e312dc07aec_JaffaCakes118.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\ohqhvoc.exeC:\Windows\system32\ohqhvoc.exe 468 "C:\Users\Admin\AppData\Local\Temp\c5c7337e1cc43922cb5c9e312dc07aec_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\ohqhvoc.exeC:\Windows\SysWOW64\ohqhvoc.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\ozrzxam.exeC:\Windows\system32\ozrzxam.exe 528 "C:\Windows\SysWOW64\ohqhvoc.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\ozrzxam.exeC:\Windows\SysWOW64\ozrzxam.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\yydwhzu.exeC:\Windows\system32\yydwhzu.exe 528 "C:\Windows\SysWOW64\ozrzxam.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\yydwhzu.exeC:\Windows\SysWOW64\yydwhzu.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\cpajdnf.exeC:\Windows\system32\cpajdnf.exe 528 "C:\Windows\SysWOW64\yydwhzu.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\cpajdnf.exeC:\Windows\SysWOW64\cpajdnf.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Windows\SysWOW64\fhshwbf.exeC:\Windows\system32\fhshwbf.exe 472 "C:\Windows\SysWOW64\cpajdnf.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\fhshwbf.exeC:\Windows\SysWOW64\fhshwbf.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Windows\SysWOW64\rbyxhor.exeC:\Windows\system32\rbyxhor.exe 532 "C:\Windows\SysWOW64\fhshwbf.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\rbyxhor.exeC:\Windows\SysWOW64\rbyxhor.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1444 -
C:\Windows\SysWOW64\fopmnrq.exeC:\Windows\system32\fopmnrq.exe 528 "C:\Windows\SysWOW64\rbyxhor.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1132 -
C:\Windows\SysWOW64\fopmnrq.exeC:\Windows\SysWOW64\fopmnrq.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1968 -
C:\Windows\SysWOW64\jajugtv.exeC:\Windows\system32\jajugtv.exe 532 "C:\Windows\SysWOW64\fopmnrq.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2448 -
C:\Windows\SysWOW64\jajugtv.exeC:\Windows\SysWOW64\jajugtv.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:712 -
C:\Windows\SysWOW64\wgapukg.exeC:\Windows\system32\wgapukg.exe 532 "C:\Windows\SysWOW64\jajugtv.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1380 -
C:\Windows\SysWOW64\wgapukg.exeC:\Windows\SysWOW64\wgapukg.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1036 -
C:\Windows\SysWOW64\gbtzceh.exeC:\Windows\system32\gbtzceh.exe 532 "C:\Windows\SysWOW64\wgapukg.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2964 -
C:\Windows\SysWOW64\gbtzceh.exeC:\Windows\SysWOW64\gbtzceh.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2388 -
C:\Windows\SysWOW64\qbffudo.exeC:\Windows\system32\qbffudo.exe 528 "C:\Windows\SysWOW64\gbtzceh.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2340 -
C:\Windows\SysWOW64\qbffudo.exeC:\Windows\SysWOW64\qbffudo.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2908 -
C:\Windows\SysWOW64\twgpcyp.exeC:\Windows\system32\twgpcyp.exe 532 "C:\Windows\SysWOW64\qbffudo.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2792 -
C:\Windows\SysWOW64\twgpcyp.exeC:\Windows\SysWOW64\twgpcyp.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2800 -
C:\Windows\SysWOW64\dvknmww.exeC:\Windows\system32\dvknmww.exe 528 "C:\Windows\SysWOW64\twgpcyp.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2916 -
C:\Windows\SysWOW64\dvknmww.exeC:\Windows\SysWOW64\dvknmww.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2884 -
C:\Windows\SysWOW64\pbbpafi.exeC:\Windows\system32\pbbpafi.exe 528 "C:\Windows\SysWOW64\dvknmww.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1204 -
C:\Windows\SysWOW64\pbbpafi.exeC:\Windows\SysWOW64\pbbpafi.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:800 -
C:\Windows\SysWOW64\cwlfojg.exeC:\Windows\system32\cwlfojg.exe 528 "C:\Windows\SysWOW64\pbbpafi.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2564 -
C:\Windows\SysWOW64\cwlfojg.exeC:\Windows\SysWOW64\cwlfojg.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2976 -
C:\Windows\SysWOW64\myipcmn.exeC:\Windows\system32\myipcmn.exe 536 "C:\Windows\SysWOW64\cwlfojg.exe"33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1648 -
C:\Windows\SysWOW64\myipcmn.exeC:\Windows\SysWOW64\myipcmn.exe34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:620 -
C:\Windows\SysWOW64\xubajhv.exeC:\Windows\system32\xubajhv.exe 540 "C:\Windows\SysWOW64\myipcmn.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1580 -
C:\Windows\SysWOW64\xubajhv.exeC:\Windows\SysWOW64\xubajhv.exe36⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2860 -
C:\Windows\SysWOW64\heqkekc.exeC:\Windows\system32\heqkekc.exe 528 "C:\Windows\SysWOW64\xubajhv.exe"37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2076 -
C:\Windows\SysWOW64\heqkekc.exeC:\Windows\SysWOW64\heqkekc.exe38⤵
- Executes dropped EXE
- Loads dropped DLL
PID:536 -
C:\Windows\SysWOW64\rhovsni.exeC:\Windows\system32\rhovsni.exe 528 "C:\Windows\SysWOW64\heqkekc.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3064 -
C:\Windows\SysWOW64\rhovsni.exeC:\Windows\SysWOW64\rhovsni.exe40⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2272 -
C:\Windows\SysWOW64\dyjxavo.exeC:\Windows\system32\dyjxavo.exe 544 "C:\Windows\SysWOW64\rhovsni.exe"41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2172 -
C:\Windows\SysWOW64\dyjxavo.exeC:\Windows\SysWOW64\dyjxavo.exe42⤵
- Executes dropped EXE
- Loads dropped DLL
PID:444 -
C:\Windows\SysWOW64\rtangrm.exeC:\Windows\system32\rtangrm.exe 528 "C:\Windows\SysWOW64\dyjxavo.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1792 -
C:\Windows\SysWOW64\rtangrm.exeC:\Windows\SysWOW64\rtangrm.exe44⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2176 -
C:\Windows\SysWOW64\bsekqqu.exeC:\Windows\system32\bsekqqu.exe 528 "C:\Windows\SysWOW64\rtangrm.exe"45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1864 -
C:\Windows\SysWOW64\bsekqqu.exeC:\Windows\SysWOW64\bsekqqu.exe46⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2512 -
C:\Windows\SysWOW64\kgfioxh.exeC:\Windows\system32\kgfioxh.exe 528 "C:\Windows\SysWOW64\bsekqqu.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1776 -
C:\Windows\SysWOW64\kgfioxh.exeC:\Windows\SysWOW64\kgfioxh.exe48⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1516 -
C:\Windows\SysWOW64\ytoxubg.exeC:\Windows\system32\ytoxubg.exe 536 "C:\Windows\SysWOW64\kgfioxh.exe"49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2092 -
C:\Windows\SysWOW64\ytoxubg.exeC:\Windows\SysWOW64\ytoxubg.exe50⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2408 -
C:\Windows\SysWOW64\isbvfan.exeC:\Windows\system32\isbvfan.exe 532 "C:\Windows\SysWOW64\ytoxubg.exe"51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2300 -
C:\Windows\SysWOW64\isbvfan.exeC:\Windows\SysWOW64\isbvfan.exe52⤵
- Executes dropped EXE
- Loads dropped DLL
PID:880 -
C:\Windows\SysWOW64\suqfadu.exeC:\Windows\system32\suqfadu.exe 544 "C:\Windows\SysWOW64\isbvfan.exe"53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2984 -
C:\Windows\SysWOW64\suqfadu.exeC:\Windows\SysWOW64\suqfadu.exe54⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1560 -
C:\Windows\SysWOW64\ftliidz.exeC:\Windows\system32\ftliidz.exe 536 "C:\Windows\SysWOW64\suqfadu.exe"55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2820 -
C:\Windows\SysWOW64\ftliidz.exeC:\Windows\SysWOW64\ftliidz.exe56⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2136 -
C:\Windows\SysWOW64\rjolrlx.exeC:\Windows\system32\rjolrlx.exe 528 "C:\Windows\SysWOW64\ftliidz.exe"57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2656 -
C:\Windows\SysWOW64\rjolrlx.exeC:\Windows\SysWOW64\rjolrlx.exe58⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2692 -
C:\Windows\SysWOW64\eiinatc.exeC:\Windows\system32\eiinatc.exe 536 "C:\Windows\SysWOW64\rjolrlx.exe"59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1280 -
C:\Windows\SysWOW64\eiinatc.exeC:\Windows\SysWOW64\eiinatc.exe60⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1096 -
C:\Windows\SysWOW64\olyynwj.exeC:\Windows\system32\olyynwj.exe 540 "C:\Windows\SysWOW64\eiinatc.exe"61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1996 -
C:\Windows\SysWOW64\olyynwj.exeC:\Windows\SysWOW64\olyynwj.exe62⤵
- Executes dropped EXE
PID:1152 -
C:\Windows\SysWOW64\bjbavxo.exeC:\Windows\system32\bjbavxo.exe 536 "C:\Windows\SysWOW64\olyynwj.exe"63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:816 -
C:\Windows\SysWOW64\bjbavxo.exeC:\Windows\SysWOW64\bjbavxo.exe64⤵
- Executes dropped EXE
PID:2204 -
C:\Windows\SysWOW64\lmqlrav.exeC:\Windows\system32\lmqlrav.exe 528 "C:\Windows\SysWOW64\bjbavxo.exe"65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1580 -
C:\Windows\SysWOW64\lmqlrav.exeC:\Windows\SysWOW64\lmqlrav.exe66⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1484 -
C:\Windows\SysWOW64\yzabxeb.exeC:\Windows\system32\yzabxeb.exe 536 "C:\Windows\SysWOW64\lmqlrav.exe"67⤵
- Suspicious use of SetThreadContext
PID:1148 -
C:\Windows\SysWOW64\yzabxeb.exeC:\Windows\SysWOW64\yzabxeb.exe68⤵PID:2844
-
C:\Windows\SysWOW64\inaqnlg.exeC:\Windows\system32\inaqnlg.exe 528 "C:\Windows\SysWOW64\yzabxeb.exe"69⤵
- Suspicious use of SetThreadContext
PID:2492 -
C:\Windows\SysWOW64\inaqnlg.exeC:\Windows\SysWOW64\inaqnlg.exe70⤵PID:2316
-
C:\Windows\SysWOW64\vasoshn.exeC:\Windows\system32\vasoshn.exe 528 "C:\Windows\SysWOW64\inaqnlg.exe"71⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2172 -
C:\Windows\SysWOW64\vasoshn.exeC:\Windows\SysWOW64\vasoshn.exe72⤵PID:2272
-
C:\Windows\SysWOW64\fkhyokt.exeC:\Windows\system32\fkhyokt.exe 528 "C:\Windows\SysWOW64\vasoshn.exe"73⤵
- Suspicious use of SetThreadContext
PID:624 -
C:\Windows\SysWOW64\fkhyokt.exeC:\Windows\SysWOW64\fkhyokt.exe74⤵
- System Location Discovery: System Language Discovery
PID:1716 -
C:\Windows\SysWOW64\sxzotos.exeC:\Windows\system32\sxzotos.exe 540 "C:\Windows\SysWOW64\fkhyokt.exe"75⤵
- Suspicious use of SetThreadContext
PID:1524 -
C:\Windows\SysWOW64\sxzotos.exeC:\Windows\SysWOW64\sxzotos.exe76⤵PID:1324
-
C:\Windows\SysWOW64\caoyhrz.exeC:\Windows\system32\caoyhrz.exe 528 "C:\Windows\SysWOW64\sxzotos.exe"77⤵
- Suspicious use of SetThreadContext
PID:712 -
C:\Windows\SysWOW64\caoyhrz.exeC:\Windows\SysWOW64\caoyhrz.exe78⤵
- Drops file in System32 directory
PID:1048 -
C:\Windows\SysWOW64\mkdicun.exeC:\Windows\system32\mkdicun.exe 528 "C:\Windows\SysWOW64\caoyhrz.exe"79⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2476 -
C:\Windows\SysWOW64\mkdicun.exeC:\Windows\SysWOW64\mkdicun.exe80⤵PID:2348
-
C:\Windows\SysWOW64\zxnyiym.exeC:\Windows\system32\zxnyiym.exe 532 "C:\Windows\SysWOW64\mkdicun.exe"81⤵
- Suspicious use of SetThreadContext
PID:2300 -
C:\Windows\SysWOW64\zxnyiym.exeC:\Windows\SysWOW64\zxnyiym.exe82⤵PID:2408
-
C:\Windows\SysWOW64\moqbqyr.exeC:\Windows\system32\moqbqyr.exe 532 "C:\Windows\SysWOW64\zxnyiym.exe"83⤵
- Suspicious use of SetThreadContext
PID:2984 -
C:\Windows\SysWOW64\moqbqyr.exeC:\Windows\SysWOW64\moqbqyr.exe84⤵PID:2704
-
C:\Windows\SysWOW64\wcqqgfw.exeC:\Windows\system32\wcqqgfw.exe 540 "C:\Windows\SysWOW64\moqbqyr.exe"85⤵
- Suspicious use of SetThreadContext
PID:2804 -
C:\Windows\SysWOW64\wcqqgfw.exeC:\Windows\SysWOW64\wcqqgfw.exe86⤵PID:2680
-
C:\Windows\SysWOW64\jpagmjd.exeC:\Windows\system32\jpagmjd.exe 532 "C:\Windows\SysWOW64\wcqqgfw.exe"87⤵
- Suspicious use of SetThreadContext
PID:2656 -
C:\Windows\SysWOW64\jpagmjd.exeC:\Windows\SysWOW64\jpagmjd.exe88⤵PID:2812
-
C:\Windows\SysWOW64\wodjvjb.exeC:\Windows\system32\wodjvjb.exe 544 "C:\Windows\SysWOW64\jpagmjd.exe"89⤵
- Suspicious use of SetThreadContext
PID:1280 -
C:\Windows\SysWOW64\wodjvjb.exeC:\Windows\SysWOW64\wodjvjb.exe90⤵PID:2564
-
C:\Windows\SysWOW64\gqstqnp.exeC:\Windows\system32\gqstqnp.exe 540 "C:\Windows\SysWOW64\wodjvjb.exe"91⤵
- Suspicious use of SetThreadContext
PID:1996 -
C:\Windows\SysWOW64\gqstqnp.exeC:\Windows\SysWOW64\gqstqnp.exe92⤵PID:340
-
C:\Windows\SysWOW64\pbiddqv.exeC:\Windows\system32\pbiddqv.exe 532 "C:\Windows\SysWOW64\gqstqnp.exe"93⤵
- Suspicious use of SetThreadContext
PID:816 -
C:\Windows\SysWOW64\pbiddqv.exeC:\Windows\SysWOW64\pbiddqv.exe94⤵PID:2308
-
C:\Windows\SysWOW64\dortjuu.exeC:\Windows\system32\dortjuu.exe 528 "C:\Windows\SysWOW64\pbiddqv.exe"95⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2280 -
C:\Windows\SysWOW64\dortjuu.exeC:\Windows\SysWOW64\dortjuu.exe96⤵
- Drops file in System32 directory
PID:1800 -
C:\Windows\SysWOW64\pqfjugy.exeC:\Windows\system32\pqfjugy.exe 528 "C:\Windows\SysWOW64\dortjuu.exe"97⤵
- Suspicious use of SetThreadContext
PID:1156 -
C:\Windows\SysWOW64\pqfjugy.exeC:\Windows\SysWOW64\pqfjugy.exe98⤵PID:1200
-
C:\Windows\SysWOW64\zsutqbn.exeC:\Windows\system32\zsutqbn.exe 544 "C:\Windows\SysWOW64\pqfjugy.exe"99⤵
- Suspicious use of SetThreadContext
PID:1920 -
C:\Windows\SysWOW64\zsutqbn.exeC:\Windows\SysWOW64\zsutqbn.exe100⤵
- Drops file in System32 directory
PID:1084 -
C:\Windows\SysWOW64\mjpwyjk.exeC:\Windows\system32\mjpwyjk.exe 536 "C:\Windows\SysWOW64\zsutqbn.exe"101⤵
- Suspicious use of SetThreadContext
PID:2100 -
C:\Windows\SysWOW64\mjpwyjk.exeC:\Windows\SysWOW64\mjpwyjk.exe102⤵PID:1368
-
C:\Windows\SysWOW64\zhkzhrq.exeC:\Windows\system32\zhkzhrq.exe 536 "C:\Windows\SysWOW64\mjpwyjk.exe"103⤵
- Suspicious use of SetThreadContext
PID:1984 -
C:\Windows\SysWOW64\zhkzhrq.exeC:\Windows\SysWOW64\zhkzhrq.exe104⤵PID:760
-
C:\Windows\SysWOW64\jkzjuvw.exeC:\Windows\system32\jkzjuvw.exe 532 "C:\Windows\SysWOW64\zhkzhrq.exe"105⤵
- Suspicious use of SetThreadContext
PID:1092 -
C:\Windows\SysWOW64\jkzjuvw.exeC:\Windows\SysWOW64\jkzjuvw.exe106⤵PID:1816
-
C:\Windows\SysWOW64\wfrzaqd.exeC:\Windows\system32\wfrzaqd.exe 532 "C:\Windows\SysWOW64\jkzjuvw.exe"107⤵
- Suspicious use of SetThreadContext
PID:2240 -
C:\Windows\SysWOW64\wfrzaqd.exeC:\Windows\SysWOW64\wfrzaqd.exe108⤵
- Drops file in System32 directory
PID:1824 -
C:\Windows\SysWOW64\gigjvuj.exeC:\Windows\system32\gigjvuj.exe 536 "C:\Windows\SysWOW64\wfrzaqd.exe"109⤵
- Suspicious use of SetThreadContext
PID:992 -
C:\Windows\SysWOW64\gigjvuj.exeC:\Windows\SysWOW64\gigjvuj.exe110⤵PID:272
-
C:\Windows\SysWOW64\tvyzbxi.exeC:\Windows\system32\tvyzbxi.exe 532 "C:\Windows\SysWOW64\gigjvuj.exe"111⤵
- Suspicious use of SetThreadContext
PID:2056 -
C:\Windows\SysWOW64\tvyzbxi.exeC:\Windows\SysWOW64\tvyzbxi.exe112⤵PID:1752
-
C:\Windows\SysWOW64\dfnjoao.exeC:\Windows\system32\dfnjoao.exe 532 "C:\Windows\SysWOW64\tvyzbxi.exe"113⤵
- Suspicious use of SetThreadContext
PID:2796 -
C:\Windows\SysWOW64\dfnjoao.exeC:\Windows\SysWOW64\dfnjoao.exe114⤵
- Drops file in System32 directory
PID:2676 -
C:\Windows\SysWOW64\nidujed.exeC:\Windows\system32\nidujed.exe 528 "C:\Windows\SysWOW64\dfnjoao.exe"115⤵
- Suspicious use of SetThreadContext
PID:2576 -
C:\Windows\SysWOW64\nidujed.exeC:\Windows\SysWOW64\nidujed.exe116⤵PID:2872
-
C:\Windows\SysWOW64\agywsea.exeC:\Windows\system32\agywsea.exe 532 "C:\Windows\SysWOW64\nidujed.exe"117⤵
- Suspicious use of SetThreadContext
PID:2592 -
C:\Windows\SysWOW64\agywsea.exeC:\Windows\SysWOW64\agywsea.exe118⤵PID:2020
-
C:\Windows\SysWOW64\ftpmyih.exeC:\Windows\system32\ftpmyih.exe 544 "C:\Windows\SysWOW64\agywsea.exe"119⤵
- Suspicious use of SetThreadContext
PID:2808 -
C:\Windows\SysWOW64\ftpmyih.exeC:\Windows\SysWOW64\ftpmyih.exe120⤵PID:2216
-
C:\Windows\SysWOW64\pwewlln.exeC:\Windows\system32\pwewlln.exe 528 "C:\Windows\SysWOW64\ftpmyih.exe"121⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2160 -
C:\Windows\SysWOW64\pwewlln.exeC:\Windows\SysWOW64\pwewlln.exe122⤵PID:1152
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-