Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 17:52
Static task
static1
Behavioral task
behavioral1
Sample
ce46eb95fece1606dc284b8c04b493d2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce46eb95fece1606dc284b8c04b493d2_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
ce46eb95fece1606dc284b8c04b493d2_JaffaCakes118.exe
-
Size
274KB
-
MD5
ce46eb95fece1606dc284b8c04b493d2
-
SHA1
ddf05e9185be47fa1cf11cf3d296ec66f81f6477
-
SHA256
5db97f76d33bf29c3ddabd323840e6456afd92014059b39e809575a4b6d2f290
-
SHA512
751ea1f43bab69d63151b076f4c689018743a8c5a3adcc162429718c1891de64e1c4953440eab7b5c55242f0dd2dbba0d4e4f91ae84be6e807af679e004daa16
-
SSDEEP
6144:oW95WO18EFJpK/rBjccRiyhQEl3oCXLfRTR19K4L76JDNbewMAAGy9:oAzFvc79oCbv6DJDNa+u
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 64 IoCs
pid Process 2768 qctjqoj.exe 2584 lsyuyss.exe 2872 yaofaow.exe 2816 vluibzc.exe 2912 qtktdug.exe 2972 omroenm.exe 2140 ineucqo.exe 2432 ogjfxuo.exe 2488 rhplvxy.exe 1616 zcvgjpv.exe 2144 wcojkkb.exe 2096 erymbtb.exe 2452 mexhqty.exe 2296 wyiaqvg.exe 2840 asaniyd.exe 2704 mlqdkzl.exe 2624 mskyhwq.exe 2068 ptpeezs.exe 2100 ajqkcfu.exe 1048 foepnhv.exe 2932 lgaaauw.exe 2960 niogxxy.exe 912 tmewwfx.exe 2120 szejyli.exe 2156 yahcgkc.exe 1804 gofxckh.exe 2204 msnnbtg.exe 968 zwbtmdh.exe 1068 jqftenh.exe 1732 mgfzbtj.exe 576 xirulqf.exe 2324 iyrabwh.exe 1060 pxbiasl.exe 1608 vnsbozl.exe 648 ikyyzkm.exe 2608 woeekvf.exe 2684 gqqxcfn.exe 2252 uuvcnig.exe 2236 wozdnsp.exe 2288 kpcowyj.exe 2884 ugcblel.exe 2976 fwcobkn.exe 3060 pmdcyqp.exe 1408 vrjajsi.exe 2352 izasxii.exe 2388 wdgqisb.exe 3036 gxrracj.exe 2544 jnseqil.exe 1652 wsycale.exe 2284 kwditwf.exe 1168 unevjbh.exe 2480 fatvwdc.exe 2328 iqtblje.exe 1688 skfbltm.exe 1772 glauurg.exe 3040 qbaajxi.exe 2136 bopawyd.exe 776 dibawim.exe 2304 rjetepg.exe 680 bdhmxzh.exe 2952 mqwmjak.exe 536 pgxahgl.exe 2428 atuauhg.exe 1336 nqayeki.exe -
Loads dropped DLL 64 IoCs
pid Process 2788 ce46eb95fece1606dc284b8c04b493d2_JaffaCakes118.exe 2788 ce46eb95fece1606dc284b8c04b493d2_JaffaCakes118.exe 2768 qctjqoj.exe 2768 qctjqoj.exe 2584 lsyuyss.exe 2584 lsyuyss.exe 2872 yaofaow.exe 2872 yaofaow.exe 2816 vluibzc.exe 2816 vluibzc.exe 2912 qtktdug.exe 2912 qtktdug.exe 2972 omroenm.exe 2972 omroenm.exe 2140 ineucqo.exe 2140 ineucqo.exe 2432 ogjfxuo.exe 2432 ogjfxuo.exe 2488 rhplvxy.exe 2488 rhplvxy.exe 1616 zcvgjpv.exe 1616 zcvgjpv.exe 2144 wcojkkb.exe 2144 wcojkkb.exe 2096 erymbtb.exe 2096 erymbtb.exe 2452 mexhqty.exe 2452 mexhqty.exe 2296 wyiaqvg.exe 2296 wyiaqvg.exe 2840 asaniyd.exe 2840 asaniyd.exe 2704 mlqdkzl.exe 2704 mlqdkzl.exe 2624 mskyhwq.exe 2624 mskyhwq.exe 2068 ptpeezs.exe 2068 ptpeezs.exe 2100 ajqkcfu.exe 2100 ajqkcfu.exe 1048 foepnhv.exe 1048 foepnhv.exe 2932 lgaaauw.exe 2932 lgaaauw.exe 2960 niogxxy.exe 2960 niogxxy.exe 912 tmewwfx.exe 912 tmewwfx.exe 2120 szejyli.exe 2120 szejyli.exe 2156 yahcgkc.exe 2156 yahcgkc.exe 1804 gofxckh.exe 1804 gofxckh.exe 2204 msnnbtg.exe 2204 msnnbtg.exe 968 zwbtmdh.exe 968 zwbtmdh.exe 1068 jqftenh.exe 1068 jqftenh.exe 1732 mgfzbtj.exe 1732 mgfzbtj.exe 576 xirulqf.exe 576 xirulqf.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\yaofaow.exe lsyuyss.exe File created C:\Windows\SysWOW64\ptpeezs.exe mskyhwq.exe File created C:\Windows\SysWOW64\pxbiasl.exe iyrabwh.exe File created C:\Windows\SysWOW64\fwcobkn.exe ugcblel.exe File created C:\Windows\SysWOW64\bopawyd.exe qbaajxi.exe File created C:\Windows\SysWOW64\nqayeki.exe atuauhg.exe File opened for modification C:\Windows\SysWOW64\tmewwfx.exe niogxxy.exe File created C:\Windows\SysWOW64\gqqxcfn.exe woeekvf.exe File opened for modification C:\Windows\SysWOW64\jnseqil.exe gxrracj.exe File opened for modification C:\Windows\SysWOW64\qbaajxi.exe glauurg.exe File opened for modification C:\Windows\SysWOW64\xslyxui.exe nqayeki.exe File created C:\Windows\SysWOW64\qctjqoj.exe ce46eb95fece1606dc284b8c04b493d2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\qtktdug.exe vluibzc.exe File created C:\Windows\SysWOW64\xirulqf.exe mgfzbtj.exe File created C:\Windows\SysWOW64\uuvcnig.exe gqqxcfn.exe File opened for modification C:\Windows\SysWOW64\ptpeezs.exe mskyhwq.exe File created C:\Windows\SysWOW64\niogxxy.exe lgaaauw.exe File opened for modification C:\Windows\SysWOW64\glauurg.exe skfbltm.exe File created C:\Windows\SysWOW64\lsyuyss.exe qctjqoj.exe File opened for modification C:\Windows\SysWOW64\ajqkcfu.exe ptpeezs.exe File created C:\Windows\SysWOW64\iyrabwh.exe xirulqf.exe File opened for modification C:\Windows\SysWOW64\dibawim.exe bopawyd.exe File opened for modification C:\Windows\SysWOW64\rjetepg.exe dibawim.exe File opened for modification C:\Windows\SysWOW64\mqwmjak.exe bdhmxzh.exe File opened for modification C:\Windows\SysWOW64\ugcblel.exe kpcowyj.exe File opened for modification C:\Windows\SysWOW64\rhplvxy.exe ogjfxuo.exe File created C:\Windows\SysWOW64\mskyhwq.exe mlqdkzl.exe File created C:\Windows\SysWOW64\lgaaauw.exe foepnhv.exe File opened for modification C:\Windows\SysWOW64\lgaaauw.exe foepnhv.exe File created C:\Windows\SysWOW64\szejyli.exe tmewwfx.exe File opened for modification C:\Windows\SysWOW64\szejyli.exe tmewwfx.exe File opened for modification C:\Windows\SysWOW64\mgfzbtj.exe jqftenh.exe File opened for modification C:\Windows\SysWOW64\kpcowyj.exe wozdnsp.exe File created C:\Windows\SysWOW64\wcojkkb.exe zcvgjpv.exe File opened for modification C:\Windows\SysWOW64\mlqdkzl.exe asaniyd.exe File created C:\Windows\SysWOW64\gofxckh.exe yahcgkc.exe File created C:\Windows\SysWOW64\kpcowyj.exe wozdnsp.exe File created C:\Windows\SysWOW64\ineucqo.exe omroenm.exe File created C:\Windows\SysWOW64\mexhqty.exe erymbtb.exe File opened for modification C:\Windows\SysWOW64\uuvcnig.exe gqqxcfn.exe File opened for modification C:\Windows\SysWOW64\bdhmxzh.exe rjetepg.exe File created C:\Windows\SysWOW64\vluibzc.exe yaofaow.exe File opened for modification C:\Windows\SysWOW64\erymbtb.exe wcojkkb.exe File opened for modification C:\Windows\SysWOW64\iyrabwh.exe xirulqf.exe File opened for modification C:\Windows\SysWOW64\kwditwf.exe wsycale.exe File created C:\Windows\SysWOW64\iqtblje.exe fatvwdc.exe File created C:\Windows\SysWOW64\bubctal.exe qeipduj.exe File opened for modification C:\Windows\SysWOW64\lsyuyss.exe qctjqoj.exe File created C:\Windows\SysWOW64\msnnbtg.exe gofxckh.exe File created C:\Windows\SysWOW64\jqftenh.exe zwbtmdh.exe File opened for modification C:\Windows\SysWOW64\xirulqf.exe mgfzbtj.exe File created C:\Windows\SysWOW64\wdgqisb.exe izasxii.exe File opened for modification C:\Windows\SysWOW64\iqtblje.exe fatvwdc.exe File created C:\Windows\SysWOW64\dibawim.exe bopawyd.exe File opened for modification C:\Windows\SysWOW64\omroenm.exe qtktdug.exe File opened for modification C:\Windows\SysWOW64\niogxxy.exe lgaaauw.exe File created C:\Windows\SysWOW64\yahcgkc.exe szejyli.exe File created C:\Windows\SysWOW64\vnsbozl.exe pxbiasl.exe File opened for modification C:\Windows\SysWOW64\skfbltm.exe iqtblje.exe File created C:\Windows\SysWOW64\atuauhg.exe pgxahgl.exe File created C:\Windows\SysWOW64\qtktdug.exe vluibzc.exe File opened for modification C:\Windows\SysWOW64\pxbiasl.exe iyrabwh.exe File opened for modification C:\Windows\SysWOW64\woeekvf.exe ikyyzkm.exe File opened for modification C:\Windows\SysWOW64\gqqxcfn.exe woeekvf.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jnseqil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wsycale.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bubctal.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mlqdkzl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ptpeezs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gofxckh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msnnbtg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iyrabwh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ugcblel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qeipduj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vluibzc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rhplvxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zcvgjpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce46eb95fece1606dc284b8c04b493d2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unevjbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rjetepg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lzvjtji.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erymbtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zwbtmdh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mgfzbtj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gxrracj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iqtblje.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skfbltm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bopawyd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdhmxzh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ogjfxuo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wozdnsp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vrjajsi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language izasxii.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmewwfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xirulqf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language glauurg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nqayeki.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsyuyss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dibawim.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language foepnhv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahcgkc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kpcowyj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wdgqisb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kwditwf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qbaajxi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pgxahgl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qtktdug.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ineucqo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jqftenh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uuvcnig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xslyxui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omroenm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woeekvf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mqwmjak.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language atuauhg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language szejyli.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asaniyd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ajqkcfu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pxbiasl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fatvwdc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcojkkb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pmdcyqp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language niogxxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vnsbozl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ikyyzkm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qctjqoj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mexhqty.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lgaaauw.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2788 wrote to memory of 2768 2788 ce46eb95fece1606dc284b8c04b493d2_JaffaCakes118.exe 31 PID 2788 wrote to memory of 2768 2788 ce46eb95fece1606dc284b8c04b493d2_JaffaCakes118.exe 31 PID 2788 wrote to memory of 2768 2788 ce46eb95fece1606dc284b8c04b493d2_JaffaCakes118.exe 31 PID 2788 wrote to memory of 2768 2788 ce46eb95fece1606dc284b8c04b493d2_JaffaCakes118.exe 31 PID 2768 wrote to memory of 2584 2768 qctjqoj.exe 32 PID 2768 wrote to memory of 2584 2768 qctjqoj.exe 32 PID 2768 wrote to memory of 2584 2768 qctjqoj.exe 32 PID 2768 wrote to memory of 2584 2768 qctjqoj.exe 32 PID 2584 wrote to memory of 2872 2584 lsyuyss.exe 33 PID 2584 wrote to memory of 2872 2584 lsyuyss.exe 33 PID 2584 wrote to memory of 2872 2584 lsyuyss.exe 33 PID 2584 wrote to memory of 2872 2584 lsyuyss.exe 33 PID 2872 wrote to memory of 2816 2872 yaofaow.exe 34 PID 2872 wrote to memory of 2816 2872 yaofaow.exe 34 PID 2872 wrote to memory of 2816 2872 yaofaow.exe 34 PID 2872 wrote to memory of 2816 2872 yaofaow.exe 34 PID 2816 wrote to memory of 2912 2816 vluibzc.exe 35 PID 2816 wrote to memory of 2912 2816 vluibzc.exe 35 PID 2816 wrote to memory of 2912 2816 vluibzc.exe 35 PID 2816 wrote to memory of 2912 2816 vluibzc.exe 35 PID 2912 wrote to memory of 2972 2912 qtktdug.exe 36 PID 2912 wrote to memory of 2972 2912 qtktdug.exe 36 PID 2912 wrote to memory of 2972 2912 qtktdug.exe 36 PID 2912 wrote to memory of 2972 2912 qtktdug.exe 36 PID 2972 wrote to memory of 2140 2972 omroenm.exe 37 PID 2972 wrote to memory of 2140 2972 omroenm.exe 37 PID 2972 wrote to memory of 2140 2972 omroenm.exe 37 PID 2972 wrote to memory of 2140 2972 omroenm.exe 37 PID 2140 wrote to memory of 2432 2140 ineucqo.exe 38 PID 2140 wrote to memory of 2432 2140 ineucqo.exe 38 PID 2140 wrote to memory of 2432 2140 ineucqo.exe 38 PID 2140 wrote to memory of 2432 2140 ineucqo.exe 38 PID 2432 wrote to memory of 2488 2432 ogjfxuo.exe 39 PID 2432 wrote to memory of 2488 2432 ogjfxuo.exe 39 PID 2432 wrote to memory of 2488 2432 ogjfxuo.exe 39 PID 2432 wrote to memory of 2488 2432 ogjfxuo.exe 39 PID 2488 wrote to memory of 1616 2488 rhplvxy.exe 40 PID 2488 wrote to memory of 1616 2488 rhplvxy.exe 40 PID 2488 wrote to memory of 1616 2488 rhplvxy.exe 40 PID 2488 wrote to memory of 1616 2488 rhplvxy.exe 40 PID 1616 wrote to memory of 2144 1616 zcvgjpv.exe 41 PID 1616 wrote to memory of 2144 1616 zcvgjpv.exe 41 PID 1616 wrote to memory of 2144 1616 zcvgjpv.exe 41 PID 1616 wrote to memory of 2144 1616 zcvgjpv.exe 41 PID 2144 wrote to memory of 2096 2144 wcojkkb.exe 42 PID 2144 wrote to memory of 2096 2144 wcojkkb.exe 42 PID 2144 wrote to memory of 2096 2144 wcojkkb.exe 42 PID 2144 wrote to memory of 2096 2144 wcojkkb.exe 42 PID 2096 wrote to memory of 2452 2096 erymbtb.exe 43 PID 2096 wrote to memory of 2452 2096 erymbtb.exe 43 PID 2096 wrote to memory of 2452 2096 erymbtb.exe 43 PID 2096 wrote to memory of 2452 2096 erymbtb.exe 43 PID 2452 wrote to memory of 2296 2452 mexhqty.exe 44 PID 2452 wrote to memory of 2296 2452 mexhqty.exe 44 PID 2452 wrote to memory of 2296 2452 mexhqty.exe 44 PID 2452 wrote to memory of 2296 2452 mexhqty.exe 44 PID 2296 wrote to memory of 2840 2296 wyiaqvg.exe 45 PID 2296 wrote to memory of 2840 2296 wyiaqvg.exe 45 PID 2296 wrote to memory of 2840 2296 wyiaqvg.exe 45 PID 2296 wrote to memory of 2840 2296 wyiaqvg.exe 45 PID 2840 wrote to memory of 2704 2840 asaniyd.exe 46 PID 2840 wrote to memory of 2704 2840 asaniyd.exe 46 PID 2840 wrote to memory of 2704 2840 asaniyd.exe 46 PID 2840 wrote to memory of 2704 2840 asaniyd.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce46eb95fece1606dc284b8c04b493d2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ce46eb95fece1606dc284b8c04b493d2_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\qctjqoj.exeC:\Windows\system32\qctjqoj.exe 576 "C:\Users\Admin\AppData\Local\Temp\ce46eb95fece1606dc284b8c04b493d2_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\lsyuyss.exeC:\Windows\system32\lsyuyss.exe 548 "C:\Windows\SysWOW64\qctjqoj.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\yaofaow.exeC:\Windows\system32\yaofaow.exe 568 "C:\Windows\SysWOW64\lsyuyss.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\vluibzc.exeC:\Windows\system32\vluibzc.exe 536 "C:\Windows\SysWOW64\yaofaow.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\qtktdug.exeC:\Windows\system32\qtktdug.exe 540 "C:\Windows\SysWOW64\vluibzc.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\omroenm.exeC:\Windows\system32\omroenm.exe 564 "C:\Windows\SysWOW64\qtktdug.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\ineucqo.exeC:\Windows\system32\ineucqo.exe 552 "C:\Windows\SysWOW64\omroenm.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\ogjfxuo.exeC:\Windows\system32\ogjfxuo.exe 600 "C:\Windows\SysWOW64\ineucqo.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\rhplvxy.exeC:\Windows\system32\rhplvxy.exe 544 "C:\Windows\SysWOW64\ogjfxuo.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\zcvgjpv.exeC:\Windows\system32\zcvgjpv.exe 556 "C:\Windows\SysWOW64\rhplvxy.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\wcojkkb.exeC:\Windows\system32\wcojkkb.exe 560 "C:\Windows\SysWOW64\zcvgjpv.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\erymbtb.exeC:\Windows\system32\erymbtb.exe 596 "C:\Windows\SysWOW64\wcojkkb.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\mexhqty.exeC:\Windows\system32\mexhqty.exe 572 "C:\Windows\SysWOW64\erymbtb.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\wyiaqvg.exeC:\Windows\system32\wyiaqvg.exe 628 "C:\Windows\SysWOW64\mexhqty.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\asaniyd.exeC:\Windows\system32\asaniyd.exe 584 "C:\Windows\SysWOW64\wyiaqvg.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\mlqdkzl.exeC:\Windows\system32\mlqdkzl.exe 612 "C:\Windows\SysWOW64\asaniyd.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2704 -
C:\Windows\SysWOW64\mskyhwq.exeC:\Windows\system32\mskyhwq.exe 616 "C:\Windows\SysWOW64\mlqdkzl.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2624 -
C:\Windows\SysWOW64\ptpeezs.exeC:\Windows\system32\ptpeezs.exe 580 "C:\Windows\SysWOW64\mskyhwq.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2068 -
C:\Windows\SysWOW64\ajqkcfu.exeC:\Windows\system32\ajqkcfu.exe 588 "C:\Windows\SysWOW64\ptpeezs.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2100 -
C:\Windows\SysWOW64\foepnhv.exeC:\Windows\system32\foepnhv.exe 592 "C:\Windows\SysWOW64\ajqkcfu.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1048 -
C:\Windows\SysWOW64\lgaaauw.exeC:\Windows\system32\lgaaauw.exe 608 "C:\Windows\SysWOW64\foepnhv.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2932 -
C:\Windows\SysWOW64\niogxxy.exeC:\Windows\system32\niogxxy.exe 668 "C:\Windows\SysWOW64\lgaaauw.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2960 -
C:\Windows\SysWOW64\tmewwfx.exeC:\Windows\system32\tmewwfx.exe 604 "C:\Windows\SysWOW64\niogxxy.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:912 -
C:\Windows\SysWOW64\szejyli.exeC:\Windows\system32\szejyli.exe 648 "C:\Windows\SysWOW64\tmewwfx.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2120 -
C:\Windows\SysWOW64\yahcgkc.exeC:\Windows\system32\yahcgkc.exe 620 "C:\Windows\SysWOW64\szejyli.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2156 -
C:\Windows\SysWOW64\gofxckh.exeC:\Windows\system32\gofxckh.exe 656 "C:\Windows\SysWOW64\yahcgkc.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1804 -
C:\Windows\SysWOW64\msnnbtg.exeC:\Windows\system32\msnnbtg.exe 624 "C:\Windows\SysWOW64\gofxckh.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2204 -
C:\Windows\SysWOW64\zwbtmdh.exeC:\Windows\system32\zwbtmdh.exe 632 "C:\Windows\SysWOW64\msnnbtg.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:968 -
C:\Windows\SysWOW64\jqftenh.exeC:\Windows\system32\jqftenh.exe 636 "C:\Windows\SysWOW64\zwbtmdh.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1068 -
C:\Windows\SysWOW64\mgfzbtj.exeC:\Windows\system32\mgfzbtj.exe 684 "C:\Windows\SysWOW64\jqftenh.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1732 -
C:\Windows\SysWOW64\xirulqf.exeC:\Windows\system32\xirulqf.exe 640 "C:\Windows\SysWOW64\mgfzbtj.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:576 -
C:\Windows\SysWOW64\iyrabwh.exeC:\Windows\system32\iyrabwh.exe 688 "C:\Windows\SysWOW64\xirulqf.exe"33⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2324 -
C:\Windows\SysWOW64\pxbiasl.exeC:\Windows\system32\pxbiasl.exe 696 "C:\Windows\SysWOW64\iyrabwh.exe"34⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1060 -
C:\Windows\SysWOW64\vnsbozl.exeC:\Windows\system32\vnsbozl.exe 712 "C:\Windows\SysWOW64\pxbiasl.exe"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1608 -
C:\Windows\SysWOW64\ikyyzkm.exeC:\Windows\system32\ikyyzkm.exe 644 "C:\Windows\SysWOW64\vnsbozl.exe"36⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:648 -
C:\Windows\SysWOW64\woeekvf.exeC:\Windows\system32\woeekvf.exe 652 "C:\Windows\SysWOW64\ikyyzkm.exe"37⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2608 -
C:\Windows\SysWOW64\gqqxcfn.exeC:\Windows\system32\gqqxcfn.exe 660 "C:\Windows\SysWOW64\woeekvf.exe"38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2684 -
C:\Windows\SysWOW64\uuvcnig.exeC:\Windows\system32\uuvcnig.exe 676 "C:\Windows\SysWOW64\gqqxcfn.exe"39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2252 -
C:\Windows\SysWOW64\wozdnsp.exeC:\Windows\system32\wozdnsp.exe 664 "C:\Windows\SysWOW64\uuvcnig.exe"40⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2236 -
C:\Windows\SysWOW64\kpcowyj.exeC:\Windows\system32\kpcowyj.exe 672 "C:\Windows\SysWOW64\wozdnsp.exe"41⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2288 -
C:\Windows\SysWOW64\ugcblel.exeC:\Windows\system32\ugcblel.exe 680 "C:\Windows\SysWOW64\kpcowyj.exe"42⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2884 -
C:\Windows\SysWOW64\fwcobkn.exeC:\Windows\system32\fwcobkn.exe 692 "C:\Windows\SysWOW64\ugcblel.exe"43⤵
- Executes dropped EXE
PID:2976 -
C:\Windows\SysWOW64\pmdcyqp.exeC:\Windows\system32\pmdcyqp.exe 756 "C:\Windows\SysWOW64\fwcobkn.exe"44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3060 -
C:\Windows\SysWOW64\vrjajsi.exeC:\Windows\system32\vrjajsi.exe 704 "C:\Windows\SysWOW64\pmdcyqp.exe"45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1408 -
C:\Windows\SysWOW64\izasxii.exeC:\Windows\system32\izasxii.exe 700 "C:\Windows\SysWOW64\vrjajsi.exe"46⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2352 -
C:\Windows\SysWOW64\wdgqisb.exeC:\Windows\system32\wdgqisb.exe 716 "C:\Windows\SysWOW64\izasxii.exe"47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2388 -
C:\Windows\SysWOW64\gxrracj.exeC:\Windows\system32\gxrracj.exe 708 "C:\Windows\SysWOW64\wdgqisb.exe"48⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3036 -
C:\Windows\SysWOW64\jnseqil.exeC:\Windows\system32\jnseqil.exe 720 "C:\Windows\SysWOW64\gxrracj.exe"49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2544 -
C:\Windows\SysWOW64\wsycale.exeC:\Windows\system32\wsycale.exe 724 "C:\Windows\SysWOW64\jnseqil.exe"50⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1652 -
C:\Windows\SysWOW64\kwditwf.exeC:\Windows\system32\kwditwf.exe 728 "C:\Windows\SysWOW64\wsycale.exe"51⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2284 -
C:\Windows\SysWOW64\unevjbh.exeC:\Windows\system32\unevjbh.exe 784 "C:\Windows\SysWOW64\kwditwf.exe"52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1168 -
C:\Windows\SysWOW64\fatvwdc.exeC:\Windows\system32\fatvwdc.exe 732 "C:\Windows\SysWOW64\unevjbh.exe"53⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2480 -
C:\Windows\SysWOW64\iqtblje.exeC:\Windows\system32\iqtblje.exe 736 "C:\Windows\SysWOW64\fatvwdc.exe"54⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2328 -
C:\Windows\SysWOW64\skfbltm.exeC:\Windows\system32\skfbltm.exe 740 "C:\Windows\SysWOW64\iqtblje.exe"55⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1688 -
C:\Windows\SysWOW64\glauurg.exeC:\Windows\system32\glauurg.exe 764 "C:\Windows\SysWOW64\skfbltm.exe"56⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1772 -
C:\Windows\SysWOW64\qbaajxi.exeC:\Windows\system32\qbaajxi.exe 748 "C:\Windows\SysWOW64\glauurg.exe"57⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3040 -
C:\Windows\SysWOW64\bopawyd.exeC:\Windows\system32\bopawyd.exe 744 "C:\Windows\SysWOW64\qbaajxi.exe"58⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2136 -
C:\Windows\SysWOW64\dibawim.exeC:\Windows\system32\dibawim.exe 752 "C:\Windows\SysWOW64\bopawyd.exe"59⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:776 -
C:\Windows\SysWOW64\rjetepg.exeC:\Windows\system32\rjetepg.exe 796 "C:\Windows\SysWOW64\dibawim.exe"60⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2304 -
C:\Windows\SysWOW64\bdhmxzh.exeC:\Windows\system32\bdhmxzh.exe 760 "C:\Windows\SysWOW64\rjetepg.exe"61⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:680 -
C:\Windows\SysWOW64\mqwmjak.exeC:\Windows\system32\mqwmjak.exe 768 "C:\Windows\SysWOW64\bdhmxzh.exe"62⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2952 -
C:\Windows\SysWOW64\pgxahgl.exeC:\Windows\system32\pgxahgl.exe 772 "C:\Windows\SysWOW64\mqwmjak.exe"63⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:536 -
C:\Windows\SysWOW64\atuauhg.exeC:\Windows\system32\atuauhg.exe 776 "C:\Windows\SysWOW64\pgxahgl.exe"64⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2428 -
C:\Windows\SysWOW64\nqayeki.exeC:\Windows\system32\nqayeki.exe 780 "C:\Windows\SysWOW64\atuauhg.exe"65⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1336 -
C:\Windows\SysWOW64\xslyxui.exeC:\Windows\system32\xslyxui.exe 788 "C:\Windows\SysWOW64\nqayeki.exe"66⤵
- System Location Discovery: System Language Discovery
PID:812 -
C:\Windows\SysWOW64\lzvjtji.exeC:\Windows\system32\lzvjtji.exe 792 "C:\Windows\SysWOW64\xslyxui.exe"67⤵
- System Location Discovery: System Language Discovery
PID:1676 -
C:\Windows\SysWOW64\qeipduj.exeC:\Windows\system32\qeipduj.exe 800 "C:\Windows\SysWOW64\lzvjtji.exe"68⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2028 -
C:\Windows\SysWOW64\bubctal.exeC:\Windows\system32\bubctal.exe 804 "C:\Windows\SysWOW64\qeipduj.exe"69⤵
- System Location Discovery: System Language Discovery
PID:960
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274KB
MD5ce46eb95fece1606dc284b8c04b493d2
SHA1ddf05e9185be47fa1cf11cf3d296ec66f81f6477
SHA2565db97f76d33bf29c3ddabd323840e6456afd92014059b39e809575a4b6d2f290
SHA512751ea1f43bab69d63151b076f4c689018743a8c5a3adcc162429718c1891de64e1c4953440eab7b5c55242f0dd2dbba0d4e4f91ae84be6e807af679e004daa16