Analysis
-
max time kernel
150s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 04:53
Behavioral task
behavioral1
Sample
c600781fde274aaae3e3cc8d8182c96a_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c600781fde274aaae3e3cc8d8182c96a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
c600781fde274aaae3e3cc8d8182c96a_JaffaCakes118.exe
-
Size
214KB
-
MD5
c600781fde274aaae3e3cc8d8182c96a
-
SHA1
01826294aba79842e5d3e8c5379ebc49072764aa
-
SHA256
f31d7d76860d41aae3b486113685349d00e0bd70d0f39239136df87e144e0c8d
-
SHA512
a40614b0df4929f8d0d73de0c1de06b670b4787bd803d0c7134715524c90d9d6b4bc74d41653cf97c182c9dc9e66a7e1776a3de40537bc8841a5eb1f1ddacfe8
-
SSDEEP
3072:B6eYiCbQmQQaCZWF7QhDXkJVJ8XFRGS9XhKaE74nk2le1wdQLeKzb1/d6+d+GB/o:X2c2XqJ82S9Ql75strq3HBez0Y5
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 11 IoCs
resource yara_rule behavioral1/memory/2684-5-0x0000000010000000-0x000000001003C000-memory.dmp modiloader_stage2 behavioral1/files/0x00080000000120fd-12.dat modiloader_stage2 behavioral1/memory/2756-27-0x0000000010000000-0x000000001003C000-memory.dmp modiloader_stage2 behavioral1/memory/1044-48-0x0000000010000000-0x000000001003C000-memory.dmp modiloader_stage2 behavioral1/memory/2680-70-0x0000000010000000-0x000000001003C000-memory.dmp modiloader_stage2 behavioral1/memory/1688-89-0x0000000010000000-0x000000001003C000-memory.dmp modiloader_stage2 behavioral1/memory/2856-107-0x0000000010000000-0x000000001003C000-memory.dmp modiloader_stage2 behavioral1/memory/496-124-0x0000000010000000-0x000000001003C000-memory.dmp modiloader_stage2 behavioral1/memory/1252-141-0x0000000010000000-0x000000001003C000-memory.dmp modiloader_stage2 behavioral1/memory/2208-158-0x0000000010000000-0x000000001003C000-memory.dmp modiloader_stage2 behavioral1/memory/1960-174-0x0000000010000000-0x000000001003C000-memory.dmp modiloader_stage2 -
Executes dropped EXE 64 IoCs
pid Process 2756 ezfsbphqi.exe 2872 ezfsbphqi.exe 1044 mdqfsasgd.exe 2140 mdqfsasgd.exe 2680 tookhuasp.exe 2240 tookhuasp.exe 1688 awkkbjklx.exe 1984 awkkbjklx.exe 2856 lozighmoy.exe 2704 lozighmoy.exe 496 bhwdqvofe.exe 2796 bhwdqvofe.exe 1252 kslnlyuzr.exe 2424 kslnlyuzr.exe 2208 xigiuyagr.exe 2104 xigiuyagr.exe 1960 hlwshbgie.exe 1444 hlwshbgie.exe 1464 ugnqnffns.exe 2360 ugnqnffns.exe 1756 hatyysrwy.exe 2032 hatyysrwy.exe 1068 rljitvyqs.exe 352 rljitvyqs.exe 2544 eyayzrwdz.exe 1656 eyayzrwdz.exe 2792 ombvpyjay.exe 2752 ombvpyjay.exe 2280 bcwyygphz.exe 2756 bcwyygphz.exe 2956 otqbggnoa.exe 1916 otqbggnoa.exe 2804 brtdppsva.exe 2808 brtdppsva.exe 2784 niogxxylt.exe 2616 niogxxylt.exe 828 xwpvvelha.exe 2156 xwpvvelha.exe 2708 kmjyeeiot.exe 3028 kmjyeeiot.exe 1064 xlmbnnovu.exe 1984 xlmbnnovu.exe 2484 kbhdvvtdv.exe 1276 kbhdvvtdv.exe 2276 uilbotbcv.exe 752 uilbotbcv.exe 2192 hcrqzyfmi.exe 324 hcrqzyfmi.exe 1540 ubutigdtb.exe 1684 ubutigdtb.exe 1084 ddjevjrno.exe 1808 ddjevjrno.exe 1464 qcegejpup.exe 1444 qcegejpup.exe 2160 dshjmsukq.exe 264 dshjmsukq.exe 2532 qjcmvaarq.exe 1500 qjcmvaarq.exe 1584 axcbthnnq.exe 1036 axcbthnnq.exe 2832 nkmrzdmsw.exe 2264 nkmrzdmsw.exe 2788 ajpthlrzx.exe 2280 ajpthlrzx.exe -
Loads dropped DLL 64 IoCs
pid Process 2896 c600781fde274aaae3e3cc8d8182c96a_JaffaCakes118.exe 2896 c600781fde274aaae3e3cc8d8182c96a_JaffaCakes118.exe 2756 ezfsbphqi.exe 2872 ezfsbphqi.exe 2872 ezfsbphqi.exe 1044 mdqfsasgd.exe 2140 mdqfsasgd.exe 2140 mdqfsasgd.exe 2680 tookhuasp.exe 2240 tookhuasp.exe 2240 tookhuasp.exe 1688 awkkbjklx.exe 1984 awkkbjklx.exe 1984 awkkbjklx.exe 2856 lozighmoy.exe 2704 lozighmoy.exe 2704 lozighmoy.exe 2796 bhwdqvofe.exe 2796 bhwdqvofe.exe 2424 kslnlyuzr.exe 2424 kslnlyuzr.exe 2104 xigiuyagr.exe 2104 xigiuyagr.exe 1444 hlwshbgie.exe 1444 hlwshbgie.exe 2360 ugnqnffns.exe 2360 ugnqnffns.exe 2032 hatyysrwy.exe 2032 hatyysrwy.exe 352 rljitvyqs.exe 352 rljitvyqs.exe 1656 eyayzrwdz.exe 1656 eyayzrwdz.exe 2752 ombvpyjay.exe 2752 ombvpyjay.exe 2756 bcwyygphz.exe 2756 bcwyygphz.exe 1916 otqbggnoa.exe 1916 otqbggnoa.exe 2808 brtdppsva.exe 2808 brtdppsva.exe 2616 niogxxylt.exe 2616 niogxxylt.exe 2156 xwpvvelha.exe 2156 xwpvvelha.exe 3028 kmjyeeiot.exe 3028 kmjyeeiot.exe 1984 xlmbnnovu.exe 1984 xlmbnnovu.exe 1276 kbhdvvtdv.exe 1276 kbhdvvtdv.exe 752 uilbotbcv.exe 752 uilbotbcv.exe 324 hcrqzyfmi.exe 324 hcrqzyfmi.exe 1684 ubutigdtb.exe 1684 ubutigdtb.exe 1808 ddjevjrno.exe 1808 ddjevjrno.exe 1444 qcegejpup.exe 1444 qcegejpup.exe 264 dshjmsukq.exe 264 dshjmsukq.exe 1500 qjcmvaarq.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\xigiuyagr.exe kslnlyuzr.exe File opened for modification C:\Windows\SysWOW64\fuspbpgoc.exe sdxmsgbhc.exe File opened for modification C:\Windows\SysWOW64\qgnqepkuz.exe Process not Found File created C:\Windows\SysWOW64\knorwqtfm.exe Process not Found File opened for modification C:\Windows\SysWOW64\zzahuvzsq.exe mifelnudp.exe File opened for modification C:\Windows\SysWOW64\fikjgkorc.exe Process not Found File created C:\Windows\SysWOW64\jthiuydco.exe wumfeqgvv.exe File created C:\Windows\SysWOW64\qkxjxbtri.exe dirtmxohc.exe File opened for modification C:\Windows\SysWOW64\frjsqkbaq.exe vdiuzcoer.exe File opened for modification C:\Windows\SysWOW64\mifelnudp.exe cyquqknjd.exe File opened for modification C:\Windows\SysWOW64\gveulwsui.exe Process not Found File opened for modification C:\Windows\SysWOW64\dfvpnyluz.exe Process not Found File created C:\Windows\SysWOW64\vzfyscoao.exe Process not Found File created C:\Windows\SysWOW64\axcbthnnq.exe qjcmvaarq.exe File created C:\Windows\SysWOW64\mbjdgzaiv.exe czutlwugi.exe File created C:\Windows\SysWOW64\dxozdfzew.exe qkxjxbtri.exe File created C:\Windows\SysWOW64\lnojrbojy.exe Process not Found File opened for modification C:\Windows\SysWOW64\swbaxakel.exe fghxpsexs.exe File created C:\Windows\SysWOW64\xrshmjddz.exe Process not Found File created C:\Windows\SysWOW64\xjmpakzjf.exe Process not Found File opened for modification C:\Windows\SysWOW64\tkekjliog.exe Process not Found File opened for modification C:\Windows\SysWOW64\leykpsywc.exe Process not Found File created C:\Windows\SysWOW64\iwtsrseer.exe yqtublris.exe File created C:\Windows\SysWOW64\ucogivudu.exe hairwrpbh.exe File created C:\Windows\SysWOW64\punpxoigi.exe cvsmogczp.exe File created C:\Windows\SysWOW64\aowpcscnf.exe mbfzwodir.exe File created C:\Windows\SysWOW64\bueyyutac.exe Process not Found File created C:\Windows\SysWOW64\eyayzrwdz.exe rljitvyqs.exe File created C:\Windows\SysWOW64\ffvkkyvzj.exe soahbyqki.exe File created C:\Windows\SysWOW64\ujfdwyzoq.exe htlboqthy.exe File opened for modification C:\Windows\SysWOW64\xsquvvhlz.exe neqwxwupr.exe File opened for modification C:\Windows\SysWOW64\bueyyutac.exe Process not Found File opened for modification C:\Windows\SysWOW64\oozldwrjk.exe bpwjuwtcs.exe File opened for modification C:\Windows\SysWOW64\epjyfgkte.exe rzgvpynel.exe File created C:\Windows\SysWOW64\abdopqqcm.exe nlalgqsvl.exe File opened for modification C:\Windows\SysWOW64\velacmhmq.exe Process not Found File opened for modification C:\Windows\SysWOW64\hymeebilx.exe Process not Found File created C:\Windows\SysWOW64\wnugyuyyb.exe Process not Found File created C:\Windows\SysWOW64\gwrymxneh.exe Process not Found File created C:\Windows\SysWOW64\kyxfhqkmd.exe xerxwegcp.exe File opened for modification C:\Windows\SysWOW64\lxqqkhhes.exe bjpsuztit.exe File created C:\Windows\SysWOW64\fkssogtfb.exe tlyqfxvya.exe File created C:\Windows\SysWOW64\zewdqhahi.exe pugsueunv.exe File opened for modification C:\Windows\SysWOW64\vpvvfqnpr.exe ivpfudbod.exe File created C:\Windows\SysWOW64\czskiqsni.exe qjqhzqngh.exe File created C:\Windows\SysWOW64\tvtcqrclu.exe gicmkvdgo.exe File opened for modification C:\Windows\SysWOW64\wuqzsnogq.exe Process not Found File opened for modification C:\Windows\SysWOW64\oegsypbpt.exe bglpqpwaa.exe File opened for modification C:\Windows\SysWOW64\imosrujxq.exe votxiudpx.exe File opened for modification C:\Windows\SysWOW64\xdnbtccla.exe kmsyktewz.exe File created C:\Windows\SysWOW64\oshtocrhd.exe Process not Found File created C:\Windows\SysWOW64\gfxjsmttl.exe touhkeomk.exe File opened for modification C:\Windows\SysWOW64\qlawwgoyt.exe dyqhqcptf.exe File created C:\Windows\SysWOW64\xbmeadins.exe kckbrvdgs.exe File opened for modification C:\Windows\SysWOW64\fvyigxyve.exe Process not Found File opened for modification C:\Windows\SysWOW64\goerjgixz.exe umyjybenm.exe File opened for modification C:\Windows\SysWOW64\cvsmogczp.exe pfxjggfsp.exe File opened for modification C:\Windows\SysWOW64\daviezczf.exe Process not Found File opened for modification C:\Windows\SysWOW64\khhsjsfqy.exe Process not Found File created C:\Windows\SysWOW64\gqdqwqvzn.exe wnoginhxa.exe File opened for modification C:\Windows\SysWOW64\ttipewqia.exe grcztkmhn.exe File opened for modification C:\Windows\SysWOW64\zibnxercd.exe msgkowmvd.exe File created C:\Windows\SysWOW64\xicjzmlkm.exe krhhimocl.exe File opened for modification C:\Windows\SysWOW64\gwrymxneh.exe Process not Found -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 2684 set thread context of 2896 2684 c600781fde274aaae3e3cc8d8182c96a_JaffaCakes118.exe 30 PID 2756 set thread context of 2872 2756 ezfsbphqi.exe 32 PID 1044 set thread context of 2140 1044 mdqfsasgd.exe 34 PID 2680 set thread context of 2240 2680 tookhuasp.exe 36 PID 1688 set thread context of 1984 1688 awkkbjklx.exe 38 PID 2856 set thread context of 2704 2856 lozighmoy.exe 40 PID 496 set thread context of 2796 496 bhwdqvofe.exe 42 PID 1252 set thread context of 2424 1252 kslnlyuzr.exe 44 PID 2208 set thread context of 2104 2208 xigiuyagr.exe 46 PID 1960 set thread context of 1444 1960 hlwshbgie.exe 48 PID 1464 set thread context of 2360 1464 ugnqnffns.exe 50 PID 1756 set thread context of 2032 1756 hatyysrwy.exe 52 PID 1068 set thread context of 352 1068 rljitvyqs.exe 54 PID 2544 set thread context of 1656 2544 eyayzrwdz.exe 56 PID 2792 set thread context of 2752 2792 ombvpyjay.exe 58 PID 2280 set thread context of 2756 2280 bcwyygphz.exe 60 PID 2956 set thread context of 1916 2956 otqbggnoa.exe 62 PID 2804 set thread context of 2808 2804 brtdppsva.exe 64 PID 2784 set thread context of 2616 2784 niogxxylt.exe 66 PID 828 set thread context of 2156 828 xwpvvelha.exe 68 PID 2708 set thread context of 3028 2708 kmjyeeiot.exe 70 PID 1064 set thread context of 1984 1064 xlmbnnovu.exe 72 PID 2484 set thread context of 1276 2484 kbhdvvtdv.exe 74 PID 2276 set thread context of 752 2276 uilbotbcv.exe 76 PID 2192 set thread context of 324 2192 hcrqzyfmi.exe 78 PID 1540 set thread context of 1684 1540 ubutigdtb.exe 80 PID 1084 set thread context of 1808 1084 ddjevjrno.exe 82 PID 1464 set thread context of 1444 1464 qcegejpup.exe 84 PID 2160 set thread context of 264 2160 dshjmsukq.exe 86 PID 2532 set thread context of 1500 2532 qjcmvaarq.exe 88 PID 1584 set thread context of 1036 1584 axcbthnnq.exe 90 PID 2832 set thread context of 2264 2832 nkmrzdmsw.exe 92 PID 2788 set thread context of 2280 2788 ajpthlrzx.exe 94 PID 2780 set thread context of 2692 2780 kleeuoybj.exe 96 PID 3044 set thread context of 2596 3044 xkzhdwdik.exe 98 PID 892 set thread context of 2888 892 kacjuxbql.exe 100 PID 2564 set thread context of 1816 2564 touhkeomk.exe 102 PID 2164 set thread context of 2924 2164 gfxjsmttl.exe 104 PID 820 set thread context of 816 820 tdsmbmzbe.exe 106 PID 2444 set thread context of 1192 2444 gunpkvwqf.exe 108 PID 236 set thread context of 1208 236 tkqjsdcxg.exe 110 PID 2128 set thread context of 2384 2128 dyqhqcptf.exe 112 PID 1936 set thread context of 1956 1936 qlawwgoyt.exe 114 PID 1084 set thread context of 824 1084 awphjjuag.exe 116 PID 1604 set thread context of 2224 1604 fmsjsrahz.exe 118 PID 1660 set thread context of 3020 1660 royzdwerm.exe 120 PID 1240 set thread context of 2540 1240 eftcuekyn.exe 122 PID 1584 set thread context of 608 1584 rdofcmpfo.exe 124 PID 2832 set thread context of 2544 2832 bglpqpwaa.exe 126 PID 2772 set thread context of 2792 2772 oegsypbpt.exe 128 PID 2780 set thread context of 2776 2780 bvbmhyzwu.exe 130 PID 3044 set thread context of 2920 3044 oleppgedv.exe 132 PID 1688 set thread context of 2596 1688 xawmnfrau.exe 134 PID 2180 set thread context of 2856 2180 knoctjqei.exe 136 PID 2164 set thread context of 2952 2164 aczkaaubc.exe 138 PID 1052 set thread context of 1200 1052 kfpunwavp.exe 140 PID 2236 set thread context of 2904 2236 xerxwegcp.exe 142 PID 2324 set thread context of 1788 2324 kyxfhqkmd.exe 144 PID 2504 set thread context of 628 2504 uinpdtqop.exe 146 PID 1936 set thread context of 2864 1936 jnnkhzvaw.exe 148 PID 592 set thread context of 2572 592 txkvucbcj.exe 150 PID 1716 set thread context of 1696 1716 gofxckhkk.exe 152 PID 2292 set thread context of 764 2292 tmaalkerl.exe 154 PID 2532 set thread context of 2524 2532 dppkynttx.exe 156 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language isvqrriqp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ombvpyjay.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tdsmbmzbe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uinpdtqop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xekohtzig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fpidkbxgx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pynnryqcj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ewlleyxcq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language awkkbjklx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dyceegvov.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language czskiqsni.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ifkyxbspc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language punpxoigi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfdfzcmka.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlmbfjmay.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xekohtzig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpvvfqnpr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iwckneeyd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kjbxffkir.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kslnlyuzr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bzmydrzwf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pslxkmekm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kckbrvdgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dyqhqcptf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pirqcwoyh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ojrebfhoy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tjaheukon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nkyffseob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rqutgthai.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language twgyrayet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iksgvghwq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnhfseslg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ymfrtmdfw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rwimkcfrk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ombvpyjay.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ivpfudbod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxqqkhhes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rugongvjr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tyxfvkvdg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhwdqvofe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fmsjsrahz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mancsvqpx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kqtwednsr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language veyvsngtk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2896 2684 c600781fde274aaae3e3cc8d8182c96a_JaffaCakes118.exe 30 PID 2684 wrote to memory of 2896 2684 c600781fde274aaae3e3cc8d8182c96a_JaffaCakes118.exe 30 PID 2684 wrote to memory of 2896 2684 c600781fde274aaae3e3cc8d8182c96a_JaffaCakes118.exe 30 PID 2684 wrote to memory of 2896 2684 c600781fde274aaae3e3cc8d8182c96a_JaffaCakes118.exe 30 PID 2684 wrote to memory of 2896 2684 c600781fde274aaae3e3cc8d8182c96a_JaffaCakes118.exe 30 PID 2684 wrote to memory of 2896 2684 c600781fde274aaae3e3cc8d8182c96a_JaffaCakes118.exe 30 PID 2896 wrote to memory of 2756 2896 c600781fde274aaae3e3cc8d8182c96a_JaffaCakes118.exe 31 PID 2896 wrote to memory of 2756 2896 c600781fde274aaae3e3cc8d8182c96a_JaffaCakes118.exe 31 PID 2896 wrote to memory of 2756 2896 c600781fde274aaae3e3cc8d8182c96a_JaffaCakes118.exe 31 PID 2896 wrote to memory of 2756 2896 c600781fde274aaae3e3cc8d8182c96a_JaffaCakes118.exe 31 PID 2756 wrote to memory of 2872 2756 ezfsbphqi.exe 32 PID 2756 wrote to memory of 2872 2756 ezfsbphqi.exe 32 PID 2756 wrote to memory of 2872 2756 ezfsbphqi.exe 32 PID 2756 wrote to memory of 2872 2756 ezfsbphqi.exe 32 PID 2756 wrote to memory of 2872 2756 ezfsbphqi.exe 32 PID 2756 wrote to memory of 2872 2756 ezfsbphqi.exe 32 PID 2872 wrote to memory of 1044 2872 ezfsbphqi.exe 33 PID 2872 wrote to memory of 1044 2872 ezfsbphqi.exe 33 PID 2872 wrote to memory of 1044 2872 ezfsbphqi.exe 33 PID 2872 wrote to memory of 1044 2872 ezfsbphqi.exe 33 PID 1044 wrote to memory of 2140 1044 mdqfsasgd.exe 34 PID 1044 wrote to memory of 2140 1044 mdqfsasgd.exe 34 PID 1044 wrote to memory of 2140 1044 mdqfsasgd.exe 34 PID 1044 wrote to memory of 2140 1044 mdqfsasgd.exe 34 PID 1044 wrote to memory of 2140 1044 mdqfsasgd.exe 34 PID 1044 wrote to memory of 2140 1044 mdqfsasgd.exe 34 PID 2140 wrote to memory of 2680 2140 mdqfsasgd.exe 35 PID 2140 wrote to memory of 2680 2140 mdqfsasgd.exe 35 PID 2140 wrote to memory of 2680 2140 mdqfsasgd.exe 35 PID 2140 wrote to memory of 2680 2140 mdqfsasgd.exe 35 PID 2680 wrote to memory of 2240 2680 tookhuasp.exe 36 PID 2680 wrote to memory of 2240 2680 tookhuasp.exe 36 PID 2680 wrote to memory of 2240 2680 tookhuasp.exe 36 PID 2680 wrote to memory of 2240 2680 tookhuasp.exe 36 PID 2680 wrote to memory of 2240 2680 tookhuasp.exe 36 PID 2680 wrote to memory of 2240 2680 tookhuasp.exe 36 PID 2240 wrote to memory of 1688 2240 tookhuasp.exe 37 PID 2240 wrote to memory of 1688 2240 tookhuasp.exe 37 PID 2240 wrote to memory of 1688 2240 tookhuasp.exe 37 PID 2240 wrote to memory of 1688 2240 tookhuasp.exe 37 PID 1688 wrote to memory of 1984 1688 awkkbjklx.exe 38 PID 1688 wrote to memory of 1984 1688 awkkbjklx.exe 38 PID 1688 wrote to memory of 1984 1688 awkkbjklx.exe 38 PID 1688 wrote to memory of 1984 1688 awkkbjklx.exe 38 PID 1688 wrote to memory of 1984 1688 awkkbjklx.exe 38 PID 1688 wrote to memory of 1984 1688 awkkbjklx.exe 38 PID 1984 wrote to memory of 2856 1984 awkkbjklx.exe 39 PID 1984 wrote to memory of 2856 1984 awkkbjklx.exe 39 PID 1984 wrote to memory of 2856 1984 awkkbjklx.exe 39 PID 1984 wrote to memory of 2856 1984 awkkbjklx.exe 39 PID 2856 wrote to memory of 2704 2856 lozighmoy.exe 40 PID 2856 wrote to memory of 2704 2856 lozighmoy.exe 40 PID 2856 wrote to memory of 2704 2856 lozighmoy.exe 40 PID 2856 wrote to memory of 2704 2856 lozighmoy.exe 40 PID 2856 wrote to memory of 2704 2856 lozighmoy.exe 40 PID 2856 wrote to memory of 2704 2856 lozighmoy.exe 40 PID 2704 wrote to memory of 496 2704 lozighmoy.exe 41 PID 2704 wrote to memory of 496 2704 lozighmoy.exe 41 PID 2704 wrote to memory of 496 2704 lozighmoy.exe 41 PID 2704 wrote to memory of 496 2704 lozighmoy.exe 41 PID 496 wrote to memory of 2796 496 bhwdqvofe.exe 42 PID 496 wrote to memory of 2796 496 bhwdqvofe.exe 42 PID 496 wrote to memory of 2796 496 bhwdqvofe.exe 42 PID 496 wrote to memory of 2796 496 bhwdqvofe.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\c600781fde274aaae3e3cc8d8182c96a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c600781fde274aaae3e3cc8d8182c96a_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\c600781fde274aaae3e3cc8d8182c96a_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c600781fde274aaae3e3cc8d8182c96a_JaffaCakes118.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\ezfsbphqi.exeC:\Windows\system32\ezfsbphqi.exe 476 "C:\Users\Admin\AppData\Local\Temp\c600781fde274aaae3e3cc8d8182c96a_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\ezfsbphqi.exeC:\Windows\SysWOW64\ezfsbphqi.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\mdqfsasgd.exeC:\Windows\system32\mdqfsasgd.exe 520 "C:\Windows\SysWOW64\ezfsbphqi.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\mdqfsasgd.exeC:\Windows\SysWOW64\mdqfsasgd.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\tookhuasp.exeC:\Windows\system32\tookhuasp.exe 516 "C:\Windows\SysWOW64\mdqfsasgd.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\tookhuasp.exeC:\Windows\SysWOW64\tookhuasp.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\awkkbjklx.exeC:\Windows\system32\awkkbjklx.exe 524 "C:\Windows\SysWOW64\tookhuasp.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\awkkbjklx.exeC:\Windows\SysWOW64\awkkbjklx.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\lozighmoy.exeC:\Windows\system32\lozighmoy.exe 532 "C:\Windows\SysWOW64\awkkbjklx.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\lozighmoy.exeC:\Windows\SysWOW64\lozighmoy.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\bhwdqvofe.exeC:\Windows\system32\bhwdqvofe.exe 524 "C:\Windows\SysWOW64\lozighmoy.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:496 -
C:\Windows\SysWOW64\bhwdqvofe.exeC:\Windows\SysWOW64\bhwdqvofe.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2796 -
C:\Windows\SysWOW64\kslnlyuzr.exeC:\Windows\system32\kslnlyuzr.exe 520 "C:\Windows\SysWOW64\bhwdqvofe.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1252 -
C:\Windows\SysWOW64\kslnlyuzr.exeC:\Windows\SysWOW64\kslnlyuzr.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2424 -
C:\Windows\SysWOW64\xigiuyagr.exeC:\Windows\system32\xigiuyagr.exe 528 "C:\Windows\SysWOW64\kslnlyuzr.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2208 -
C:\Windows\SysWOW64\xigiuyagr.exeC:\Windows\SysWOW64\xigiuyagr.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2104 -
C:\Windows\SysWOW64\hlwshbgie.exeC:\Windows\system32\hlwshbgie.exe 524 "C:\Windows\SysWOW64\xigiuyagr.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1960 -
C:\Windows\SysWOW64\hlwshbgie.exeC:\Windows\SysWOW64\hlwshbgie.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1444 -
C:\Windows\SysWOW64\ugnqnffns.exeC:\Windows\system32\ugnqnffns.exe 516 "C:\Windows\SysWOW64\hlwshbgie.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1464 -
C:\Windows\SysWOW64\ugnqnffns.exeC:\Windows\SysWOW64\ugnqnffns.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2360 -
C:\Windows\SysWOW64\hatyysrwy.exeC:\Windows\system32\hatyysrwy.exe 524 "C:\Windows\SysWOW64\ugnqnffns.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1756 -
C:\Windows\SysWOW64\hatyysrwy.exeC:\Windows\SysWOW64\hatyysrwy.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2032 -
C:\Windows\SysWOW64\rljitvyqs.exeC:\Windows\system32\rljitvyqs.exe 524 "C:\Windows\SysWOW64\hatyysrwy.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1068 -
C:\Windows\SysWOW64\rljitvyqs.exeC:\Windows\SysWOW64\rljitvyqs.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:352 -
C:\Windows\SysWOW64\eyayzrwdz.exeC:\Windows\system32\eyayzrwdz.exe 520 "C:\Windows\SysWOW64\rljitvyqs.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2544 -
C:\Windows\SysWOW64\eyayzrwdz.exeC:\Windows\SysWOW64\eyayzrwdz.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1656 -
C:\Windows\SysWOW64\ombvpyjay.exeC:\Windows\system32\ombvpyjay.exe 516 "C:\Windows\SysWOW64\eyayzrwdz.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2792 -
C:\Windows\SysWOW64\ombvpyjay.exeC:\Windows\SysWOW64\ombvpyjay.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2752 -
C:\Windows\SysWOW64\bcwyygphz.exeC:\Windows\system32\bcwyygphz.exe 524 "C:\Windows\SysWOW64\ombvpyjay.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2280 -
C:\Windows\SysWOW64\bcwyygphz.exeC:\Windows\SysWOW64\bcwyygphz.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2756 -
C:\Windows\SysWOW64\otqbggnoa.exeC:\Windows\system32\otqbggnoa.exe 516 "C:\Windows\SysWOW64\bcwyygphz.exe"33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2956 -
C:\Windows\SysWOW64\otqbggnoa.exeC:\Windows\SysWOW64\otqbggnoa.exe34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1916 -
C:\Windows\SysWOW64\brtdppsva.exeC:\Windows\system32\brtdppsva.exe 524 "C:\Windows\SysWOW64\otqbggnoa.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2804 -
C:\Windows\SysWOW64\brtdppsva.exeC:\Windows\SysWOW64\brtdppsva.exe36⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2808 -
C:\Windows\SysWOW64\niogxxylt.exeC:\Windows\system32\niogxxylt.exe 520 "C:\Windows\SysWOW64\brtdppsva.exe"37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2784 -
C:\Windows\SysWOW64\niogxxylt.exeC:\Windows\SysWOW64\niogxxylt.exe38⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2616 -
C:\Windows\SysWOW64\xwpvvelha.exeC:\Windows\system32\xwpvvelha.exe 524 "C:\Windows\SysWOW64\niogxxylt.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:828 -
C:\Windows\SysWOW64\xwpvvelha.exeC:\Windows\SysWOW64\xwpvvelha.exe40⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2156 -
C:\Windows\SysWOW64\kmjyeeiot.exeC:\Windows\system32\kmjyeeiot.exe 524 "C:\Windows\SysWOW64\xwpvvelha.exe"41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2708 -
C:\Windows\SysWOW64\kmjyeeiot.exeC:\Windows\SysWOW64\kmjyeeiot.exe42⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3028 -
C:\Windows\SysWOW64\xlmbnnovu.exeC:\Windows\system32\xlmbnnovu.exe 516 "C:\Windows\SysWOW64\kmjyeeiot.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1064 -
C:\Windows\SysWOW64\xlmbnnovu.exeC:\Windows\SysWOW64\xlmbnnovu.exe44⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1984 -
C:\Windows\SysWOW64\kbhdvvtdv.exeC:\Windows\system32\kbhdvvtdv.exe 524 "C:\Windows\SysWOW64\xlmbnnovu.exe"45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2484 -
C:\Windows\SysWOW64\kbhdvvtdv.exeC:\Windows\SysWOW64\kbhdvvtdv.exe46⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1276 -
C:\Windows\SysWOW64\uilbotbcv.exeC:\Windows\system32\uilbotbcv.exe 520 "C:\Windows\SysWOW64\kbhdvvtdv.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2276 -
C:\Windows\SysWOW64\uilbotbcv.exeC:\Windows\SysWOW64\uilbotbcv.exe48⤵
- Executes dropped EXE
- Loads dropped DLL
PID:752 -
C:\Windows\SysWOW64\hcrqzyfmi.exeC:\Windows\system32\hcrqzyfmi.exe 516 "C:\Windows\SysWOW64\uilbotbcv.exe"49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2192 -
C:\Windows\SysWOW64\hcrqzyfmi.exeC:\Windows\SysWOW64\hcrqzyfmi.exe50⤵
- Executes dropped EXE
- Loads dropped DLL
PID:324 -
C:\Windows\SysWOW64\ubutigdtb.exeC:\Windows\system32\ubutigdtb.exe 520 "C:\Windows\SysWOW64\hcrqzyfmi.exe"51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1540 -
C:\Windows\SysWOW64\ubutigdtb.exeC:\Windows\SysWOW64\ubutigdtb.exe52⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1684 -
C:\Windows\SysWOW64\ddjevjrno.exeC:\Windows\system32\ddjevjrno.exe 532 "C:\Windows\SysWOW64\ubutigdtb.exe"53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1084 -
C:\Windows\SysWOW64\ddjevjrno.exeC:\Windows\SysWOW64\ddjevjrno.exe54⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1808 -
C:\Windows\SysWOW64\qcegejpup.exeC:\Windows\system32\qcegejpup.exe 524 "C:\Windows\SysWOW64\ddjevjrno.exe"55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1464 -
C:\Windows\SysWOW64\qcegejpup.exeC:\Windows\SysWOW64\qcegejpup.exe56⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1444 -
C:\Windows\SysWOW64\dshjmsukq.exeC:\Windows\system32\dshjmsukq.exe 520 "C:\Windows\SysWOW64\qcegejpup.exe"57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2160 -
C:\Windows\SysWOW64\dshjmsukq.exeC:\Windows\SysWOW64\dshjmsukq.exe58⤵
- Executes dropped EXE
- Loads dropped DLL
PID:264 -
C:\Windows\SysWOW64\qjcmvaarq.exeC:\Windows\system32\qjcmvaarq.exe 516 "C:\Windows\SysWOW64\dshjmsukq.exe"59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2532 -
C:\Windows\SysWOW64\qjcmvaarq.exeC:\Windows\SysWOW64\qjcmvaarq.exe60⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1500 -
C:\Windows\SysWOW64\axcbthnnq.exeC:\Windows\system32\axcbthnnq.exe 516 "C:\Windows\SysWOW64\qjcmvaarq.exe"61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1584 -
C:\Windows\SysWOW64\axcbthnnq.exeC:\Windows\SysWOW64\axcbthnnq.exe62⤵
- Executes dropped EXE
PID:1036 -
C:\Windows\SysWOW64\nkmrzdmsw.exeC:\Windows\system32\nkmrzdmsw.exe 528 "C:\Windows\SysWOW64\axcbthnnq.exe"63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2832 -
C:\Windows\SysWOW64\nkmrzdmsw.exeC:\Windows\SysWOW64\nkmrzdmsw.exe64⤵
- Executes dropped EXE
PID:2264 -
C:\Windows\SysWOW64\ajpthlrzx.exeC:\Windows\system32\ajpthlrzx.exe 524 "C:\Windows\SysWOW64\nkmrzdmsw.exe"65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2788 -
C:\Windows\SysWOW64\ajpthlrzx.exeC:\Windows\SysWOW64\ajpthlrzx.exe66⤵
- Executes dropped EXE
PID:2280 -
C:\Windows\SysWOW64\kleeuoybj.exeC:\Windows\system32\kleeuoybj.exe 532 "C:\Windows\SysWOW64\ajpthlrzx.exe"67⤵
- Suspicious use of SetThreadContext
PID:2780 -
C:\Windows\SysWOW64\kleeuoybj.exeC:\Windows\SysWOW64\kleeuoybj.exe68⤵PID:2692
-
C:\Windows\SysWOW64\xkzhdwdik.exeC:\Windows\system32\xkzhdwdik.exe 516 "C:\Windows\SysWOW64\kleeuoybj.exe"69⤵
- Suspicious use of SetThreadContext
PID:3044 -
C:\Windows\SysWOW64\xkzhdwdik.exeC:\Windows\SysWOW64\xkzhdwdik.exe70⤵PID:2596
-
C:\Windows\SysWOW64\kacjuxbql.exeC:\Windows\system32\kacjuxbql.exe 524 "C:\Windows\SysWOW64\xkzhdwdik.exe"71⤵
- Suspicious use of SetThreadContext
PID:892 -
C:\Windows\SysWOW64\kacjuxbql.exeC:\Windows\SysWOW64\kacjuxbql.exe72⤵PID:2888
-
C:\Windows\SysWOW64\touhkeomk.exeC:\Windows\system32\touhkeomk.exe 516 "C:\Windows\SysWOW64\kacjuxbql.exe"73⤵
- Suspicious use of SetThreadContext
PID:2564 -
C:\Windows\SysWOW64\touhkeomk.exeC:\Windows\SysWOW64\touhkeomk.exe74⤵
- Drops file in System32 directory
PID:1816 -
C:\Windows\SysWOW64\gfxjsmttl.exeC:\Windows\system32\gfxjsmttl.exe 528 "C:\Windows\SysWOW64\touhkeomk.exe"75⤵
- Suspicious use of SetThreadContext
PID:2164 -
C:\Windows\SysWOW64\gfxjsmttl.exeC:\Windows\SysWOW64\gfxjsmttl.exe76⤵PID:2924
-
C:\Windows\SysWOW64\tdsmbmzbe.exeC:\Windows\system32\tdsmbmzbe.exe 520 "C:\Windows\SysWOW64\gfxjsmttl.exe"77⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:820 -
C:\Windows\SysWOW64\tdsmbmzbe.exeC:\Windows\SysWOW64\tdsmbmzbe.exe78⤵PID:816
-
C:\Windows\SysWOW64\gunpkvwqf.exeC:\Windows\system32\gunpkvwqf.exe 516 "C:\Windows\SysWOW64\tdsmbmzbe.exe"79⤵
- Suspicious use of SetThreadContext
PID:2444 -
C:\Windows\SysWOW64\gunpkvwqf.exeC:\Windows\SysWOW64\gunpkvwqf.exe80⤵PID:1192
-
C:\Windows\SysWOW64\tkqjsdcxg.exeC:\Windows\system32\tkqjsdcxg.exe 524 "C:\Windows\SysWOW64\gunpkvwqf.exe"81⤵
- Suspicious use of SetThreadContext
PID:236 -
C:\Windows\SysWOW64\tkqjsdcxg.exeC:\Windows\SysWOW64\tkqjsdcxg.exe82⤵PID:1208
-
C:\Windows\SysWOW64\dyqhqcptf.exeC:\Windows\system32\dyqhqcptf.exe 524 "C:\Windows\SysWOW64\tkqjsdcxg.exe"83⤵
- Suspicious use of SetThreadContext
PID:2128 -
C:\Windows\SysWOW64\dyqhqcptf.exeC:\Windows\SysWOW64\dyqhqcptf.exe84⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2384 -
C:\Windows\SysWOW64\qlawwgoyt.exeC:\Windows\system32\qlawwgoyt.exe 532 "C:\Windows\SysWOW64\dyqhqcptf.exe"85⤵
- Suspicious use of SetThreadContext
PID:1936 -
C:\Windows\SysWOW64\qlawwgoyt.exeC:\Windows\SysWOW64\qlawwgoyt.exe86⤵PID:1956
-
C:\Windows\SysWOW64\awphjjuag.exeC:\Windows\system32\awphjjuag.exe 520 "C:\Windows\SysWOW64\qlawwgoyt.exe"87⤵
- Suspicious use of SetThreadContext
PID:1084 -
C:\Windows\SysWOW64\awphjjuag.exeC:\Windows\SysWOW64\awphjjuag.exe88⤵PID:824
-
C:\Windows\SysWOW64\fmsjsrahz.exeC:\Windows\system32\fmsjsrahz.exe 520 "C:\Windows\SysWOW64\awphjjuag.exe"89⤵
- Suspicious use of SetThreadContext
PID:1604 -
C:\Windows\SysWOW64\fmsjsrahz.exeC:\Windows\SysWOW64\fmsjsrahz.exe90⤵
- System Location Discovery: System Language Discovery
PID:2224 -
C:\Windows\SysWOW64\royzdwerm.exeC:\Windows\system32\royzdwerm.exe 516 "C:\Windows\SysWOW64\fmsjsrahz.exe"91⤵
- Suspicious use of SetThreadContext
PID:1660 -
C:\Windows\SysWOW64\royzdwerm.exeC:\Windows\SysWOW64\royzdwerm.exe92⤵PID:3020
-
C:\Windows\SysWOW64\eftcuekyn.exeC:\Windows\system32\eftcuekyn.exe 516 "C:\Windows\SysWOW64\royzdwerm.exe"93⤵
- Suspicious use of SetThreadContext
PID:1240 -
C:\Windows\SysWOW64\eftcuekyn.exeC:\Windows\SysWOW64\eftcuekyn.exe94⤵PID:2540
-
C:\Windows\SysWOW64\rdofcmpfo.exeC:\Windows\system32\rdofcmpfo.exe 532 "C:\Windows\SysWOW64\eftcuekyn.exe"95⤵
- Suspicious use of SetThreadContext
PID:1584 -
C:\Windows\SysWOW64\rdofcmpfo.exeC:\Windows\SysWOW64\rdofcmpfo.exe96⤵PID:608
-
C:\Windows\SysWOW64\bglpqpwaa.exeC:\Windows\system32\bglpqpwaa.exe 536 "C:\Windows\SysWOW64\rdofcmpfo.exe"97⤵
- Suspicious use of SetThreadContext
PID:2832 -
C:\Windows\SysWOW64\bglpqpwaa.exeC:\Windows\SysWOW64\bglpqpwaa.exe98⤵
- Drops file in System32 directory
PID:2544 -
C:\Windows\SysWOW64\oegsypbpt.exeC:\Windows\system32\oegsypbpt.exe 532 "C:\Windows\SysWOW64\bglpqpwaa.exe"99⤵
- Suspicious use of SetThreadContext
PID:2772 -
C:\Windows\SysWOW64\oegsypbpt.exeC:\Windows\SysWOW64\oegsypbpt.exe100⤵PID:2792
-
C:\Windows\SysWOW64\bvbmhyzwu.exeC:\Windows\system32\bvbmhyzwu.exe 528 "C:\Windows\SysWOW64\oegsypbpt.exe"101⤵
- Suspicious use of SetThreadContext
PID:2780 -
C:\Windows\SysWOW64\bvbmhyzwu.exeC:\Windows\SysWOW64\bvbmhyzwu.exe102⤵PID:2776
-
C:\Windows\SysWOW64\oleppgedv.exeC:\Windows\system32\oleppgedv.exe 528 "C:\Windows\SysWOW64\bvbmhyzwu.exe"103⤵
- Suspicious use of SetThreadContext
PID:3044 -
C:\Windows\SysWOW64\oleppgedv.exeC:\Windows\SysWOW64\oleppgedv.exe104⤵PID:2920
-
C:\Windows\SysWOW64\xawmnfrau.exeC:\Windows\system32\xawmnfrau.exe 516 "C:\Windows\SysWOW64\oleppgedv.exe"105⤵
- Suspicious use of SetThreadContext
PID:1688 -
C:\Windows\SysWOW64\xawmnfrau.exeC:\Windows\SysWOW64\xawmnfrau.exe106⤵PID:2596
-
C:\Windows\SysWOW64\knoctjqei.exeC:\Windows\system32\knoctjqei.exe 524 "C:\Windows\SysWOW64\xawmnfrau.exe"107⤵
- Suspicious use of SetThreadContext
PID:2180 -
C:\Windows\SysWOW64\knoctjqei.exeC:\Windows\SysWOW64\knoctjqei.exe108⤵PID:2856
-
C:\Windows\SysWOW64\aczkaaubc.exeC:\Windows\system32\aczkaaubc.exe 524 "C:\Windows\SysWOW64\knoctjqei.exe"109⤵
- Suspicious use of SetThreadContext
PID:2164 -
C:\Windows\SysWOW64\aczkaaubc.exeC:\Windows\SysWOW64\aczkaaubc.exe110⤵PID:2952
-
C:\Windows\SysWOW64\kfpunwavp.exeC:\Windows\system32\kfpunwavp.exe 524 "C:\Windows\SysWOW64\aczkaaubc.exe"111⤵
- Suspicious use of SetThreadContext
PID:1052 -
C:\Windows\SysWOW64\kfpunwavp.exeC:\Windows\SysWOW64\kfpunwavp.exe112⤵PID:1200
-
C:\Windows\SysWOW64\xerxwegcp.exeC:\Windows\system32\xerxwegcp.exe 520 "C:\Windows\SysWOW64\kfpunwavp.exe"113⤵
- Suspicious use of SetThreadContext
PID:2236 -
C:\Windows\SysWOW64\xerxwegcp.exeC:\Windows\SysWOW64\xerxwegcp.exe114⤵
- Drops file in System32 directory
PID:2904 -
C:\Windows\SysWOW64\kyxfhqkmd.exeC:\Windows\system32\kyxfhqkmd.exe 528 "C:\Windows\SysWOW64\xerxwegcp.exe"115⤵
- Suspicious use of SetThreadContext
PID:2324 -
C:\Windows\SysWOW64\kyxfhqkmd.exeC:\Windows\SysWOW64\kyxfhqkmd.exe116⤵PID:1788
-
C:\Windows\SysWOW64\uinpdtqop.exeC:\Windows\system32\uinpdtqop.exe 528 "C:\Windows\SysWOW64\kyxfhqkmd.exe"117⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2504 -
C:\Windows\SysWOW64\uinpdtqop.exeC:\Windows\SysWOW64\uinpdtqop.exe118⤵PID:628
-
C:\Windows\SysWOW64\jnnkhzvaw.exeC:\Windows\system32\jnnkhzvaw.exe 524 "C:\Windows\SysWOW64\uinpdtqop.exe"119⤵
- Suspicious use of SetThreadContext
PID:1936 -
C:\Windows\SysWOW64\jnnkhzvaw.exeC:\Windows\SysWOW64\jnnkhzvaw.exe120⤵PID:2864
-
C:\Windows\SysWOW64\txkvucbcj.exeC:\Windows\system32\txkvucbcj.exe 528 "C:\Windows\SysWOW64\jnnkhzvaw.exe"121⤵
- Suspicious use of SetThreadContext
PID:592 -
C:\Windows\SysWOW64\txkvucbcj.exeC:\Windows\SysWOW64\txkvucbcj.exe122⤵PID:2572
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-