Analysis
-
max time kernel
14s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2024 09:52
Static task
static1
Behavioral task
behavioral1
Sample
d90a33ac1d1845428baec0765efe1796_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d90a33ac1d1845428baec0765efe1796_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
d90a33ac1d1845428baec0765efe1796_JaffaCakes118.exe
-
Size
484KB
-
MD5
d90a33ac1d1845428baec0765efe1796
-
SHA1
41d4d07095aee2ffe20497a4d1621f764a33ee73
-
SHA256
ad4cc7d0639d95613f2c3a7b26c644e4bcbd5c4d9325a1dd48b7280124923a7a
-
SHA512
f98d8ce2efa86f41e6eec39cae9f95064f5e154cc03543960236f77407146e0e35470cdbf9e4bd503fd8ca8ededb4468ee3b06eeeed858e846d96dd0cc3c0d2a
-
SSDEEP
12288:YRQmDsgDPIAnsJ8Q19/vA80Tk+Lf2hgQmUQj3MFgb0ZCznzMs14AEoeli:yk+Lf27mUJFBunzz4AEoe
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies security service 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" reg.exe -
Executes dropped EXE 64 IoCs
pid Process 2864 vggecxi.exe 4044 vggecxi.exe 1168 orukvug.exe 1540 orukvug.exe 1236 jionsjp.exe 2760 jionsjp.exe 1968 ixlsjzs.exe 1744 ixlsjzs.exe 3324 jxnyvzy.exe 3620 jxnyvzy.exe 2300 ohvslee.exe 2768 ohvslee.exe 4040 oosydnh.exe 4724 oosydnh.exe 3692 ozfqrzl.exe 4028 ozfqrzl.exe 4772 qgtbgqm.exe 4156 qgtbgqm.exe 3704 qyulidw.exe 2740 qyulidw.exe 1188 txmwkma.exe 2260 txmwkma.exe 1760 afhwekb.exe 1676 afhwekb.exe 2840 dmpmfbi.exe 4888 dmpmfbi.exe 3252 ohpxnvj.exe 4728 ohpxnvj.exe 2536 dqafiuq.exe 3220 dqafiuq.exe 924 gazubqy.exe 640 gazubqy.exe 2112 isrstmg.exe 2440 isrstmg.exe 3856 tchpyca.exe 5108 tchpyca.exe 3356 yzefldh.exe 4060 yzefldh.exe 3152 dmxnffm.exe 2008 dmxnffm.exe 3660 iwninks.exe 3104 iwninks.exe 4920 qomiczw.exe 2368 qomiczw.exe 3652 yplbiga.exe 1564 yplbiga.exe 972 lfgdrox.exe 1628 lfgdrox.exe 668 vbhwgig.exe 3048 vbhwgig.exe 2892 iknyjiy.exe 756 iknyjiy.exe 4344 vbibsie.exe 2356 vbibsie.exe 1932 gxjtace.exe 2232 gxjtace.exe 2028 qscehxf.exe 324 qscehxf.exe 1492 ywmrzqq.exe 396 ywmrzqq.exe 4576 ljdhemp.exe 1292 ljdhemp.exe 2248 vqheplw.exe 4748 vqheplw.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\tchpyca.exe isrstmg.exe File created C:\Windows\SysWOW64\qomiczw.exe iwninks.exe File created C:\Windows\SysWOW64\lzdkjph.exe dvtxsdx.exe File opened for modification C:\Windows\SysWOW64\txmwkma.exe qyulidw.exe File opened for modification C:\Windows\SysWOW64\afhwekb.exe txmwkma.exe File opened for modification C:\Windows\SysWOW64\dqafiuq.exe ohpxnvj.exe File opened for modification C:\Windows\SysWOW64\qlmmpef.exe fquchje.exe File opened for modification C:\Windows\SysWOW64\qpkqcko.exe ilaclzl.exe File opened for modification C:\Windows\SysWOW64\qomiczw.exe iwninks.exe File created C:\Windows\SysWOW64\ywmrzqq.exe qscehxf.exe File created C:\Windows\SysWOW64\ljdhemp.exe ywmrzqq.exe File opened for modification C:\Windows\SysWOW64\qscehxf.exe gxjtace.exe File opened for modification C:\Windows\SysWOW64\ywmrzqq.exe qscehxf.exe File opened for modification C:\Windows\SysWOW64\dmpmfbi.exe afhwekb.exe File opened for modification C:\Windows\SysWOW64\yplbiga.exe qomiczw.exe File created C:\Windows\SysWOW64\vbhwgig.exe lfgdrox.exe File created C:\Windows\SysWOW64\ilaclzl.exe dzoiacl.exe File created C:\Windows\SysWOW64\jionsjp.exe orukvug.exe File created C:\Windows\SysWOW64\ixlsjzs.exe jionsjp.exe File created C:\Windows\SysWOW64\dqafiuq.exe ohpxnvj.exe File opened for modification C:\Windows\SysWOW64\dmxnffm.exe yzefldh.exe File opened for modification C:\Windows\SysWOW64\iwninks.exe dmxnffm.exe File opened for modification C:\Windows\SysWOW64\ljdhemp.exe ywmrzqq.exe File created C:\Windows\SysWOW64\jxnyvzy.exe ixlsjzs.exe File created C:\Windows\SysWOW64\ozfqrzl.exe oosydnh.exe File created C:\Windows\SysWOW64\qgtbgqm.exe ozfqrzl.exe File opened for modification C:\Windows\SysWOW64\dvtxsdx.exe qlmmpef.exe File opened for modification C:\Windows\SysWOW64\jxnyvzy.exe ixlsjzs.exe File opened for modification C:\Windows\SysWOW64\qgtbgqm.exe ozfqrzl.exe File created C:\Windows\SysWOW64\qyulidw.exe qgtbgqm.exe File created C:\Windows\SysWOW64\isrstmg.exe gazubqy.exe File opened for modification C:\Windows\SysWOW64\yzefldh.exe tchpyca.exe File opened for modification C:\Windows\SysWOW64\orukvug.exe vggecxi.exe File opened for modification C:\Windows\SysWOW64\jionsjp.exe orukvug.exe File opened for modification C:\Windows\SysWOW64\ixlsjzs.exe jionsjp.exe File opened for modification C:\Windows\SysWOW64\lzdkjph.exe dvtxsdx.exe File created C:\Windows\SysWOW64\dmpmfbi.exe afhwekb.exe File created C:\Windows\SysWOW64\lfgdrox.exe yplbiga.exe File created C:\Windows\SysWOW64\qlmmpef.exe fquchje.exe File created C:\Windows\SysWOW64\gxjtace.exe vbibsie.exe File opened for modification C:\Windows\SysWOW64\gxjtace.exe vbibsie.exe File created C:\Windows\SysWOW64\fquchje.exe vqheplw.exe File created C:\Windows\SysWOW64\qpkqcko.exe ilaclzl.exe File created C:\Windows\SysWOW64\ohpxnvj.exe dmpmfbi.exe File opened for modification C:\Windows\SysWOW64\gazubqy.exe dqafiuq.exe File created C:\Windows\SysWOW64\yzefldh.exe tchpyca.exe File created C:\Windows\SysWOW64\dmxnffm.exe yzefldh.exe File created C:\Windows\SysWOW64\iwninks.exe dmxnffm.exe File created C:\Windows\SysWOW64\vbibsie.exe iknyjiy.exe File created C:\Windows\SysWOW64\qscehxf.exe gxjtace.exe File opened for modification C:\Windows\SysWOW64\vjthonb.exe lzdkjph.exe File opened for modification C:\Windows\SysWOW64\vggecxi.exe d90a33ac1d1845428baec0765efe1796_JaffaCakes118.exe File created C:\Windows\SysWOW64\oosydnh.exe ohvslee.exe File opened for modification C:\Windows\SysWOW64\qyulidw.exe qgtbgqm.exe File opened for modification C:\Windows\SysWOW64\dzoiacl.exe vjthonb.exe File created C:\Windows\SysWOW64\xtudmvz.exe qpkqcko.exe File created C:\Windows\SysWOW64\yplbiga.exe qomiczw.exe File created C:\Windows\SysWOW64\vqheplw.exe ljdhemp.exe File opened for modification C:\Windows\SysWOW64\futvakd.exe xtudmvz.exe File created C:\Windows\SysWOW64\vggecxi.exe d90a33ac1d1845428baec0765efe1796_JaffaCakes118.exe File created C:\Windows\SysWOW64\ohvslee.exe jxnyvzy.exe File opened for modification C:\Windows\SysWOW64\oosydnh.exe ohvslee.exe File opened for modification C:\Windows\SysWOW64\vbhwgig.exe lfgdrox.exe File created C:\Windows\SysWOW64\iknyjiy.exe vbhwgig.exe -
Suspicious use of SetThreadContext 41 IoCs
description pid Process procid_target PID 4532 set thread context of 892 4532 d90a33ac1d1845428baec0765efe1796_JaffaCakes118.exe 82 PID 2864 set thread context of 4044 2864 vggecxi.exe 95 PID 1168 set thread context of 1540 1168 orukvug.exe 112 PID 1236 set thread context of 2760 1236 jionsjp.exe 130 PID 1968 set thread context of 1744 1968 ixlsjzs.exe 151 PID 3324 set thread context of 3620 3324 jxnyvzy.exe 166 PID 2300 set thread context of 2768 2300 ohvslee.exe 182 PID 4040 set thread context of 4724 4040 oosydnh.exe 201 PID 3692 set thread context of 4028 3692 ozfqrzl.exe 222 PID 4772 set thread context of 4156 4772 qgtbgqm.exe 242 PID 3704 set thread context of 2740 3704 qyulidw.exe 257 PID 1188 set thread context of 2260 1188 txmwkma.exe 273 PID 1760 set thread context of 1676 1760 afhwekb.exe 294 PID 2840 set thread context of 4888 2840 dmpmfbi.exe 309 PID 3252 set thread context of 4728 3252 ohpxnvj.exe 334 PID 2536 set thread context of 3220 2536 dqafiuq.exe 348 PID 924 set thread context of 640 924 gazubqy.exe 364 PID 2112 set thread context of 2440 2112 isrstmg.exe 382 PID 3856 set thread context of 5108 3856 tchpyca.exe 399 PID 3356 set thread context of 4060 3356 yzefldh.exe 417 PID 3152 set thread context of 2008 3152 dmxnffm.exe 436 PID 3660 set thread context of 3104 3660 iwninks.exe 454 PID 4920 set thread context of 2368 4920 qomiczw.exe 476 PID 3652 set thread context of 1564 3652 yplbiga.exe 490 PID 972 set thread context of 1628 972 lfgdrox.exe 508 PID 2892 set thread context of 756 2892 iknyjiy.exe 544 PID 4344 set thread context of 2356 4344 vbibsie.exe 562 PID 1932 set thread context of 2232 1932 gxjtace.exe 585 PID 2028 set thread context of 324 2028 qscehxf.exe 601 PID 1492 set thread context of 396 1492 ywmrzqq.exe 618 PID 4576 set thread context of 1292 4576 ljdhemp.exe 636 PID 2248 set thread context of 4748 2248 vqheplw.exe 654 PID 1480 set thread context of 1748 1480 fquchje.exe 673 PID 3348 set thread context of 860 3348 qlmmpef.exe 691 PID 2016 set thread context of 2224 2016 dvtxsdx.exe 709 PID 4864 set thread context of 1228 4864 lzdkjph.exe 723 PID 1096 set thread context of 768 1096 vjthonb.exe 742 PID 3360 set thread context of 4324 3360 dzoiacl.exe 759 PID 4440 set thread context of 3580 4440 ilaclzl.exe 778 PID 3520 set thread context of 4260 3520 qpkqcko.exe 796 PID 3204 set thread context of 3904 3204 xtudmvz.exe 814 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qgtbgqm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ixlsjzs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qscehxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfgdrox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfgdrox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dmxnffm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vqheplw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qpkqcko.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qomiczw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qlmmpef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dzoiacl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 42 IoCs
pid Process 4532 d90a33ac1d1845428baec0765efe1796_JaffaCakes118.exe 2864 vggecxi.exe 1168 orukvug.exe 1236 jionsjp.exe 1968 ixlsjzs.exe 3324 jxnyvzy.exe 2300 ohvslee.exe 4040 oosydnh.exe 3692 ozfqrzl.exe 4772 qgtbgqm.exe 3704 qyulidw.exe 1188 txmwkma.exe 1760 afhwekb.exe 2840 dmpmfbi.exe 3252 ohpxnvj.exe 2536 dqafiuq.exe 924 gazubqy.exe 2112 isrstmg.exe 3856 tchpyca.exe 3356 yzefldh.exe 3152 dmxnffm.exe 3660 iwninks.exe 4920 qomiczw.exe 3652 yplbiga.exe 972 lfgdrox.exe 2892 iknyjiy.exe 4344 vbibsie.exe 1932 gxjtace.exe 2028 qscehxf.exe 1492 ywmrzqq.exe 4576 ljdhemp.exe 2248 vqheplw.exe 1480 fquchje.exe 3348 qlmmpef.exe 2016 dvtxsdx.exe 4864 lzdkjph.exe 1096 vjthonb.exe 3360 dzoiacl.exe 4440 ilaclzl.exe 3520 qpkqcko.exe 3204 xtudmvz.exe 3020 futvakd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4532 wrote to memory of 892 4532 d90a33ac1d1845428baec0765efe1796_JaffaCakes118.exe 82 PID 4532 wrote to memory of 892 4532 d90a33ac1d1845428baec0765efe1796_JaffaCakes118.exe 82 PID 4532 wrote to memory of 892 4532 d90a33ac1d1845428baec0765efe1796_JaffaCakes118.exe 82 PID 4532 wrote to memory of 892 4532 d90a33ac1d1845428baec0765efe1796_JaffaCakes118.exe 82 PID 4532 wrote to memory of 892 4532 d90a33ac1d1845428baec0765efe1796_JaffaCakes118.exe 82 PID 4532 wrote to memory of 892 4532 d90a33ac1d1845428baec0765efe1796_JaffaCakes118.exe 82 PID 4532 wrote to memory of 892 4532 d90a33ac1d1845428baec0765efe1796_JaffaCakes118.exe 82 PID 4532 wrote to memory of 892 4532 d90a33ac1d1845428baec0765efe1796_JaffaCakes118.exe 82 PID 4532 wrote to memory of 892 4532 d90a33ac1d1845428baec0765efe1796_JaffaCakes118.exe 82 PID 4532 wrote to memory of 892 4532 d90a33ac1d1845428baec0765efe1796_JaffaCakes118.exe 82 PID 4532 wrote to memory of 4104 4532 d90a33ac1d1845428baec0765efe1796_JaffaCakes118.exe 83 PID 4532 wrote to memory of 4104 4532 d90a33ac1d1845428baec0765efe1796_JaffaCakes118.exe 83 PID 4532 wrote to memory of 4104 4532 d90a33ac1d1845428baec0765efe1796_JaffaCakes118.exe 83 PID 4532 wrote to memory of 3256 4532 d90a33ac1d1845428baec0765efe1796_JaffaCakes118.exe 84 PID 4532 wrote to memory of 3256 4532 d90a33ac1d1845428baec0765efe1796_JaffaCakes118.exe 84 PID 4532 wrote to memory of 3256 4532 d90a33ac1d1845428baec0765efe1796_JaffaCakes118.exe 84 PID 4532 wrote to memory of 448 4532 d90a33ac1d1845428baec0765efe1796_JaffaCakes118.exe 85 PID 4532 wrote to memory of 448 4532 d90a33ac1d1845428baec0765efe1796_JaffaCakes118.exe 85 PID 4532 wrote to memory of 448 4532 d90a33ac1d1845428baec0765efe1796_JaffaCakes118.exe 85 PID 4532 wrote to memory of 4576 4532 d90a33ac1d1845428baec0765efe1796_JaffaCakes118.exe 86 PID 4532 wrote to memory of 4576 4532 d90a33ac1d1845428baec0765efe1796_JaffaCakes118.exe 86 PID 4532 wrote to memory of 4576 4532 d90a33ac1d1845428baec0765efe1796_JaffaCakes118.exe 86 PID 4532 wrote to memory of 1648 4532 d90a33ac1d1845428baec0765efe1796_JaffaCakes118.exe 87 PID 4532 wrote to memory of 1648 4532 d90a33ac1d1845428baec0765efe1796_JaffaCakes118.exe 87 PID 4532 wrote to memory of 1648 4532 d90a33ac1d1845428baec0765efe1796_JaffaCakes118.exe 87 PID 892 wrote to memory of 2864 892 d90a33ac1d1845428baec0765efe1796_JaffaCakes118.exe 93 PID 892 wrote to memory of 2864 892 d90a33ac1d1845428baec0765efe1796_JaffaCakes118.exe 93 PID 892 wrote to memory of 2864 892 d90a33ac1d1845428baec0765efe1796_JaffaCakes118.exe 93 PID 3256 wrote to memory of 1184 3256 cmd.exe 254 PID 3256 wrote to memory of 1184 3256 cmd.exe 254 PID 3256 wrote to memory of 1184 3256 cmd.exe 254 PID 2864 wrote to memory of 4044 2864 vggecxi.exe 95 PID 2864 wrote to memory of 4044 2864 vggecxi.exe 95 PID 2864 wrote to memory of 4044 2864 vggecxi.exe 95 PID 2864 wrote to memory of 4044 2864 vggecxi.exe 95 PID 2864 wrote to memory of 4044 2864 vggecxi.exe 95 PID 2864 wrote to memory of 4044 2864 vggecxi.exe 95 PID 2864 wrote to memory of 4044 2864 vggecxi.exe 95 PID 2864 wrote to memory of 4044 2864 vggecxi.exe 95 PID 2864 wrote to memory of 4044 2864 vggecxi.exe 95 PID 2864 wrote to memory of 4044 2864 vggecxi.exe 95 PID 2864 wrote to memory of 3200 2864 vggecxi.exe 96 PID 2864 wrote to memory of 3200 2864 vggecxi.exe 96 PID 2864 wrote to memory of 3200 2864 vggecxi.exe 96 PID 2864 wrote to memory of 544 2864 vggecxi.exe 97 PID 2864 wrote to memory of 544 2864 vggecxi.exe 97 PID 2864 wrote to memory of 544 2864 vggecxi.exe 97 PID 2864 wrote to memory of 4540 2864 vggecxi.exe 379 PID 2864 wrote to memory of 4540 2864 vggecxi.exe 379 PID 2864 wrote to memory of 4540 2864 vggecxi.exe 379 PID 2864 wrote to memory of 2264 2864 vggecxi.exe 99 PID 2864 wrote to memory of 2264 2864 vggecxi.exe 99 PID 2864 wrote to memory of 2264 2864 vggecxi.exe 99 PID 2864 wrote to memory of 3304 2864 vggecxi.exe 266 PID 2864 wrote to memory of 3304 2864 vggecxi.exe 266 PID 2864 wrote to memory of 3304 2864 vggecxi.exe 266 PID 1184 wrote to memory of 1020 1184 net.exe 101 PID 1184 wrote to memory of 1020 1184 net.exe 101 PID 1184 wrote to memory of 1020 1184 net.exe 101 PID 4104 wrote to memory of 5072 4104 cmd.exe 104 PID 4104 wrote to memory of 5072 4104 cmd.exe 104 PID 4104 wrote to memory of 5072 4104 cmd.exe 104 PID 1648 wrote to memory of 5068 1648 cmd.exe 105 PID 1648 wrote to memory of 5068 1648 cmd.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\d90a33ac1d1845428baec0765efe1796_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d90a33ac1d1845428baec0765efe1796_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\d90a33ac1d1845428baec0765efe1796_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d90a33ac1d1845428baec0765efe1796_JaffaCakes1182⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\vggecxi.exeC:\Windows\system32\vggecxi.exe 988 "C:\Users\Admin\AppData\Local\Temp\d90a33ac1d1845428baec0765efe1796_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\vggecxi.exeC:\Windows\SysWOW64\vggecxi4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4044 -
C:\Windows\SysWOW64\orukvug.exeC:\Windows\system32\orukvug.exe 1016 "C:\Windows\SysWOW64\vggecxi.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1168 -
C:\Windows\SysWOW64\orukvug.exeC:\Windows\SysWOW64\orukvug6⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1540 -
C:\Windows\SysWOW64\jionsjp.exeC:\Windows\system32\jionsjp.exe 1016 "C:\Windows\SysWOW64\orukvug.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1236 -
C:\Windows\SysWOW64\jionsjp.exeC:\Windows\SysWOW64\jionsjp8⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2760 -
C:\Windows\SysWOW64\ixlsjzs.exeC:\Windows\system32\ixlsjzs.exe 1016 "C:\Windows\SysWOW64\jionsjp.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1968 -
C:\Windows\SysWOW64\ixlsjzs.exeC:\Windows\SysWOW64\ixlsjzs10⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1744 -
C:\Windows\SysWOW64\jxnyvzy.exeC:\Windows\system32\jxnyvzy.exe 1016 "C:\Windows\SysWOW64\ixlsjzs.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3324 -
C:\Windows\SysWOW64\jxnyvzy.exeC:\Windows\SysWOW64\jxnyvzy12⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3620 -
C:\Windows\SysWOW64\ohvslee.exeC:\Windows\system32\ohvslee.exe 1016 "C:\Windows\SysWOW64\jxnyvzy.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2300 -
C:\Windows\SysWOW64\ohvslee.exeC:\Windows\SysWOW64\ohvslee14⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2768 -
C:\Windows\SysWOW64\oosydnh.exeC:\Windows\system32\oosydnh.exe 1020 "C:\Windows\SysWOW64\ohvslee.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4040 -
C:\Windows\SysWOW64\oosydnh.exeC:\Windows\SysWOW64\oosydnh16⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4724 -
C:\Windows\SysWOW64\ozfqrzl.exeC:\Windows\system32\ozfqrzl.exe 1044 "C:\Windows\SysWOW64\oosydnh.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3692 -
C:\Windows\SysWOW64\ozfqrzl.exeC:\Windows\SysWOW64\ozfqrzl18⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4028 -
C:\Windows\SysWOW64\qgtbgqm.exeC:\Windows\system32\qgtbgqm.exe 1044 "C:\Windows\SysWOW64\ozfqrzl.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4772 -
C:\Windows\SysWOW64\qgtbgqm.exeC:\Windows\SysWOW64\qgtbgqm20⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4156 -
C:\Windows\SysWOW64\qyulidw.exeC:\Windows\system32\qyulidw.exe 1016 "C:\Windows\SysWOW64\qgtbgqm.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3704 -
C:\Windows\SysWOW64\qyulidw.exeC:\Windows\SysWOW64\qyulidw22⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2740 -
C:\Windows\SysWOW64\txmwkma.exeC:\Windows\system32\txmwkma.exe 1044 "C:\Windows\SysWOW64\qyulidw.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1188 -
C:\Windows\SysWOW64\txmwkma.exeC:\Windows\SysWOW64\txmwkma24⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2260 -
C:\Windows\SysWOW64\afhwekb.exeC:\Windows\system32\afhwekb.exe 1016 "C:\Windows\SysWOW64\txmwkma.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1760 -
C:\Windows\SysWOW64\afhwekb.exeC:\Windows\SysWOW64\afhwekb26⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1676 -
C:\Windows\SysWOW64\dmpmfbi.exeC:\Windows\system32\dmpmfbi.exe 1016 "C:\Windows\SysWOW64\afhwekb.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2840 -
C:\Windows\SysWOW64\dmpmfbi.exeC:\Windows\SysWOW64\dmpmfbi28⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4888 -
C:\Windows\SysWOW64\ohpxnvj.exeC:\Windows\system32\ohpxnvj.exe 1044 "C:\Windows\SysWOW64\dmpmfbi.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3252 -
C:\Windows\SysWOW64\ohpxnvj.exeC:\Windows\SysWOW64\ohpxnvj30⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4728 -
C:\Windows\SysWOW64\dqafiuq.exeC:\Windows\system32\dqafiuq.exe 1088 "C:\Windows\SysWOW64\ohpxnvj.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2536 -
C:\Windows\SysWOW64\dqafiuq.exeC:\Windows\SysWOW64\dqafiuq32⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3220 -
C:\Windows\SysWOW64\gazubqy.exeC:\Windows\system32\gazubqy.exe 1056 "C:\Windows\SysWOW64\dqafiuq.exe"33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:924 -
C:\Windows\SysWOW64\gazubqy.exeC:\Windows\SysWOW64\gazubqy34⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:640 -
C:\Windows\SysWOW64\isrstmg.exeC:\Windows\system32\isrstmg.exe 1016 "C:\Windows\SysWOW64\gazubqy.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2112 -
C:\Windows\SysWOW64\isrstmg.exeC:\Windows\SysWOW64\isrstmg36⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2440 -
C:\Windows\SysWOW64\tchpyca.exeC:\Windows\system32\tchpyca.exe 1016 "C:\Windows\SysWOW64\isrstmg.exe"37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3856 -
C:\Windows\SysWOW64\tchpyca.exeC:\Windows\SysWOW64\tchpyca38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5108 -
C:\Windows\SysWOW64\yzefldh.exeC:\Windows\system32\yzefldh.exe 1016 "C:\Windows\SysWOW64\tchpyca.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3356 -
C:\Windows\SysWOW64\yzefldh.exeC:\Windows\SysWOW64\yzefldh40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4060 -
C:\Windows\SysWOW64\dmxnffm.exeC:\Windows\system32\dmxnffm.exe 1028 "C:\Windows\SysWOW64\yzefldh.exe"41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3152 -
C:\Windows\SysWOW64\dmxnffm.exeC:\Windows\SysWOW64\dmxnffm42⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2008 -
C:\Windows\SysWOW64\iwninks.exeC:\Windows\system32\iwninks.exe 1044 "C:\Windows\SysWOW64\dmxnffm.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3660 -
C:\Windows\SysWOW64\iwninks.exeC:\Windows\SysWOW64\iwninks44⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3104 -
C:\Windows\SysWOW64\qomiczw.exeC:\Windows\system32\qomiczw.exe 1044 "C:\Windows\SysWOW64\iwninks.exe"45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4920 -
C:\Windows\SysWOW64\qomiczw.exeC:\Windows\SysWOW64\qomiczw46⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2368 -
C:\Windows\SysWOW64\yplbiga.exeC:\Windows\system32\yplbiga.exe 1016 "C:\Windows\SysWOW64\qomiczw.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3652 -
C:\Windows\SysWOW64\yplbiga.exeC:\Windows\SysWOW64\yplbiga48⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1564 -
C:\Windows\SysWOW64\lfgdrox.exeC:\Windows\system32\lfgdrox.exe 1148 "C:\Windows\SysWOW64\yplbiga.exe"49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:972 -
C:\Windows\SysWOW64\lfgdrox.exeC:\Windows\SysWOW64\lfgdrox50⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1628 -
C:\Windows\SysWOW64\vbhwgig.exeC:\Windows\system32\vbhwgig.exe 1056 "C:\Windows\SysWOW64\lfgdrox.exe"51⤵
- Executes dropped EXE
PID:668 -
C:\Windows\SysWOW64\vbhwgig.exeC:\Windows\SysWOW64\vbhwgig52⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3048 -
C:\Windows\SysWOW64\iknyjiy.exeC:\Windows\system32\iknyjiy.exe 1044 "C:\Windows\SysWOW64\vbhwgig.exe"53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2892 -
C:\Windows\SysWOW64\iknyjiy.exeC:\Windows\SysWOW64\iknyjiy54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:756 -
C:\Windows\SysWOW64\vbibsie.exeC:\Windows\system32\vbibsie.exe 1052 "C:\Windows\SysWOW64\iknyjiy.exe"55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4344 -
C:\Windows\SysWOW64\vbibsie.exeC:\Windows\SysWOW64\vbibsie56⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2356 -
C:\Windows\SysWOW64\gxjtace.exeC:\Windows\system32\gxjtace.exe 1052 "C:\Windows\SysWOW64\vbibsie.exe"57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1932 -
C:\Windows\SysWOW64\gxjtace.exeC:\Windows\SysWOW64\gxjtace58⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2232 -
C:\Windows\SysWOW64\qscehxf.exeC:\Windows\system32\qscehxf.exe 1192 "C:\Windows\SysWOW64\gxjtace.exe"59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2028 -
C:\Windows\SysWOW64\qscehxf.exeC:\Windows\SysWOW64\qscehxf60⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:324 -
C:\Windows\SysWOW64\ywmrzqq.exeC:\Windows\system32\ywmrzqq.exe 1052 "C:\Windows\SysWOW64\qscehxf.exe"61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1492 -
C:\Windows\SysWOW64\ywmrzqq.exeC:\Windows\SysWOW64\ywmrzqq62⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:396 -
C:\Windows\SysWOW64\ljdhemp.exeC:\Windows\system32\ljdhemp.exe 1148 "C:\Windows\SysWOW64\ywmrzqq.exe"63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4576 -
C:\Windows\SysWOW64\ljdhemp.exeC:\Windows\SysWOW64\ljdhemp64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1292 -
C:\Windows\SysWOW64\vqheplw.exeC:\Windows\system32\vqheplw.exe 1040 "C:\Windows\SysWOW64\ljdhemp.exe"65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2248 -
C:\Windows\SysWOW64\vqheplw.exeC:\Windows\SysWOW64\vqheplw66⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4748 -
C:\Windows\SysWOW64\fquchje.exeC:\Windows\system32\fquchje.exe 1092 "C:\Windows\SysWOW64\vqheplw.exe"67⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1480 -
C:\Windows\SysWOW64\fquchje.exeC:\Windows\SysWOW64\fquchje68⤵
- Drops file in System32 directory
PID:1748 -
C:\Windows\SysWOW64\qlmmpef.exeC:\Windows\system32\qlmmpef.exe 1148 "C:\Windows\SysWOW64\fquchje.exe"69⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3348 -
C:\Windows\SysWOW64\qlmmpef.exeC:\Windows\SysWOW64\qlmmpef70⤵
- Drops file in System32 directory
PID:860 -
C:\Windows\SysWOW64\dvtxsdx.exeC:\Windows\system32\dvtxsdx.exe 1148 "C:\Windows\SysWOW64\qlmmpef.exe"71⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2016 -
C:\Windows\SysWOW64\dvtxsdx.exeC:\Windows\SysWOW64\dvtxsdx72⤵
- Drops file in System32 directory
PID:2224 -
C:\Windows\SysWOW64\lzdkjph.exeC:\Windows\system32\lzdkjph.exe 1044 "C:\Windows\SysWOW64\dvtxsdx.exe"73⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4864 -
C:\Windows\SysWOW64\lzdkjph.exeC:\Windows\SysWOW64\lzdkjph74⤵
- Drops file in System32 directory
PID:1228 -
C:\Windows\SysWOW64\vjthonb.exeC:\Windows\system32\vjthonb.exe 1044 "C:\Windows\SysWOW64\lzdkjph.exe"75⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1096 -
C:\Windows\SysWOW64\vjthonb.exeC:\Windows\SysWOW64\vjthonb76⤵
- Drops file in System32 directory
PID:768 -
C:\Windows\SysWOW64\dzoiacl.exeC:\Windows\system32\dzoiacl.exe 1056 "C:\Windows\SysWOW64\vjthonb.exe"77⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3360 -
C:\Windows\SysWOW64\dzoiacl.exeC:\Windows\SysWOW64\dzoiacl78⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4324 -
C:\Windows\SysWOW64\ilaclzl.exeC:\Windows\system32\ilaclzl.exe 1044 "C:\Windows\SysWOW64\dzoiacl.exe"79⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4440 -
C:\Windows\SysWOW64\ilaclzl.exeC:\Windows\SysWOW64\ilaclzl80⤵
- Drops file in System32 directory
PID:3580 -
C:\Windows\SysWOW64\qpkqcko.exeC:\Windows\system32\qpkqcko.exe 1016 "C:\Windows\SysWOW64\ilaclzl.exe"81⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3520 -
C:\Windows\SysWOW64\qpkqcko.exeC:\Windows\SysWOW64\qpkqcko82⤵
- Drops file in System32 directory
PID:4260 -
C:\Windows\SysWOW64\xtudmvz.exeC:\Windows\system32\xtudmvz.exe 1020 "C:\Windows\SysWOW64\qpkqcko.exe"83⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3204 -
C:\Windows\SysWOW64\xtudmvz.exeC:\Windows\SysWOW64\xtudmvz84⤵
- Drops file in System32 directory
PID:3904 -
C:\Windows\SysWOW64\futvakd.exeC:\Windows\system32\futvakd.exe 1044 "C:\Windows\SysWOW64\xtudmvz.exe"85⤵
- Suspicious use of SetWindowsHookEx
PID:3020 -
C:\Windows\SysWOW64\futvakd.exeC:\Windows\SysWOW64\futvakd86⤵PID:1544
-
C:\Windows\SysWOW64\nnsvhry.exeC:\Windows\system32\nnsvhry.exe 1048 "C:\Windows\SysWOW64\futvakd.exe"87⤵PID:1092
-
C:\Windows\SysWOW64\nnsvhry.exeC:\Windows\SysWOW64\nnsvhry88⤵PID:4792
-
C:\Windows\SysWOW64\yfibuha.exeC:\Windows\system32\yfibuha.exe 1056 "C:\Windows\SysWOW64\nnsvhry.exe"89⤵PID:1224
-
C:\Windows\SysWOW64\yfibuha.exeC:\Windows\SysWOW64\yfibuha90⤵PID:4444
-
C:\Windows\SysWOW64\fjsodad.exeC:\Windows\system32\fjsodad.exe 1048 "C:\Windows\SysWOW64\yfibuha.exe"91⤵PID:1528
-
C:\Windows\SysWOW64\fjsodad.exeC:\Windows\SysWOW64\fjsodad92⤵PID:3516
-
C:\Windows\SysWOW64\nnctvlo.exeC:\Windows\system32\nnctvlo.exe 1016 "C:\Windows\SysWOW64\fjsodad.exe"93⤵PID:4516
-
C:\Windows\SysWOW64\nnctvlo.exeC:\Windows\SysWOW64\nnctvlo94⤵PID:1208
-
C:\Windows\SysWOW64\spkodqu.exeC:\Windows\system32\spkodqu.exe 1044 "C:\Windows\SysWOW64\nnctvlo.exe"95⤵PID:3588
-
C:\Windows\SysWOW64\spkodqu.exeC:\Windows\SysWOW64\spkodqu96⤵PID:4292
-
C:\Windows\SysWOW64\xqsrtos.exeC:\Windows\system32\xqsrtos.exe 1020 "C:\Windows\SysWOW64\spkodqu.exe"97⤵PID:624
-
C:\Windows\SysWOW64\xqsrtos.exeC:\Windows\SysWOW64\xqsrtos98⤵PID:4600
-
C:\Windows\SysWOW64\frrjicw.exeC:\Windows\system32\frrjicw.exe 1052 "C:\Windows\SysWOW64\xqsrtos.exe"99⤵PID:4972
-
C:\Windows\SysWOW64\frrjicw.exeC:\Windows\SysWOW64\frrjicw100⤵PID:4464
-
C:\Windows\SysWOW64\tayulcw.exeC:\Windows\system32\tayulcw.exe 1052 "C:\Windows\SysWOW64\frrjicw.exe"101⤵PID:5052
-
C:\Windows\SysWOW64\tayulcw.exeC:\Windows\SysWOW64\tayulcw102⤵PID:3008
-
C:\Windows\SysWOW64\pqcphih.exeC:\Windows\system32\pqcphih.exe 1020 "C:\Windows\SysWOW64\tayulcw.exe"103⤵PID:3696
-
C:\Windows\SysWOW64\pqcphih.exeC:\Windows\SysWOW64\pqcphih104⤵PID:2944
-
C:\Windows\SysWOW64\axhzjuc.exeC:\Windows\system32\axhzjuc.exe 1016 "C:\Windows\SysWOW64\pqcphih.exe"105⤵PID:4056
-
C:\Windows\SysWOW64\axhzjuc.exeC:\Windows\SysWOW64\axhzjuc106⤵PID:3804
-
C:\Windows\SysWOW64\fgpczzi.exeC:\Windows\system32\fgpczzi.exe 1048 "C:\Windows\SysWOW64\axhzjuc.exe"107⤵PID:3684
-
C:\Windows\SysWOW64\fgpczzi.exeC:\Windows\SysWOW64\fgpczzi108⤵PID:2616
-
C:\Windows\SysWOW64\klicljn.exeC:\Windows\system32\klicljn.exe 1052 "C:\Windows\SysWOW64\fgpczzi.exe"109⤵PID:4020
-
C:\Windows\SysWOW64\klicljn.exeC:\Windows\SysWOW64\klicljn110⤵PID:1520
-
C:\Windows\SysWOW64\smhczqr.exeC:\Windows\system32\smhczqr.exe 1044 "C:\Windows\SysWOW64\klicljn.exe"111⤵PID:4364
-
C:\Windows\SysWOW64\smhczqr.exeC:\Windows\SysWOW64\smhczqr112⤵PID:1536
-
C:\Windows\SysWOW64\aqspjbu.exeC:\Windows\system32\aqspjbu.exe 1016 "C:\Windows\SysWOW64\smhczqr.exe"113⤵PID:468
-
C:\Windows\SysWOW64\aqspjbu.exeC:\Windows\SysWOW64\aqspjbu114⤵PID:3920
-
C:\Windows\SysWOW64\nzysmau.exeC:\Windows\system32\nzysmau.exe 1056 "C:\Windows\SysWOW64\aqspjbu.exe"115⤵PID:1596
-
C:\Windows\SysWOW64\nzysmau.exeC:\Windows\SysWOW64\nzysmau116⤵PID:4052
-
C:\Windows\SysWOW64\sxvizbt.exeC:\Windows\system32\sxvizbt.exe 1056 "C:\Windows\SysWOW64\nzysmau.exe"117⤵PID:5316
-
C:\Windows\SysWOW64\sxvizbt.exeC:\Windows\SysWOW64\sxvizbt118⤵PID:5372
-
C:\Windows\SysWOW64\afqaurc.exeC:\Windows\system32\afqaurc.exe 1016 "C:\Windows\SysWOW64\sxvizbt.exe"119⤵PID:5724
-
C:\Windows\SysWOW64\afqaurc.exeC:\Windows\SysWOW64\afqaurc120⤵PID:5800
-
C:\Windows\SysWOW64\kxgfyhe.exeC:\Windows\system32\kxgfyhe.exe 1044 "C:\Windows\SysWOW64\afqaurc.exe"121⤵PID:6072
-
C:\Windows\SysWOW64\kxgfyhe.exeC:\Windows\SysWOW64\kxgfyhe122⤵PID:2136
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-