Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-12-2024 09:49
Behavioral task
behavioral1
Sample
e5d0650411b0b4c0e5989d62895a35af_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e5d0650411b0b4c0e5989d62895a35af_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e5d0650411b0b4c0e5989d62895a35af_JaffaCakes118.exe
-
Size
377KB
-
MD5
e5d0650411b0b4c0e5989d62895a35af
-
SHA1
0307a3a8827743c27079b3db4abb541126564cd9
-
SHA256
eb168aaf39c4926770e387f1b34bda57823b6afe7a26779856bf9391573b2a37
-
SHA512
10666e2fc8739c7fc6e1d0e6b6ddf63780f8ce823d946f1d8727a126c8741fec676a233c6f12aaef2bfec64260f6aeb92418640ac924a39a1f7579bbe749dadd
-
SSDEEP
6144:reVaO/iUJ4BrbvBJfK4PVCX23mGBWuMFvYoc9dRT+GDNmMzuMs6Cyv3kgg:reVT/iUJ45bvregmZ/Fgoc9bLX643
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 64 IoCs
pid Process 2272 ciu.exe 2696 kph.exe 2580 wok.exe 2700 jef.exe 2992 ovk.exe 536 vcx.exe 2764 gyy.exe 2812 qtz.exe 2240 vkw.exe 1916 fji.exe 2872 nnk.exe 1884 zpq.exe 3024 hxl.exe 904 rpb.exe 2196 ejh.exe 448 lrd.exe 2024 lyq.exe 1568 xaw.exe 2236 kno.exe 1976 xmi.exe 2300 iln.exe 2896 rnk.exe 1584 byz.exe 2952 opu.exe 1532 bnp.exe 1680 lqm.exe 2884 ydw.exe 2520 lbz.exe 2592 vpr.exe 2716 igu.exe 532 vte.exe 1404 ehe.exe 2796 rxh.exe 640 ewc.exe 840 rmx.exe 2484 ela.exe 1992 onp.exe 2660 bek.exe 1860 ocf.exe 3016 xqf.exe 1840 ldx.exe 2904 vgm.exe 2352 ite.exe 1508 rhw.exe 2768 egz.exe 1692 rtj.exe 744 bhj.exe 1852 rls.exe 2332 boh.exe 2020 omc.exe 1540 bdf.exe 2032 krx.exe 2608 xha.exe 2636 kgv.exe 2584 xwq.exe 624 kvs.exe 2960 uxi.exe 1012 hzo.exe 972 umf.exe 2748 dag.exe 320 rnq.exe 2664 aqf.exe 1984 odw.exe 1868 xrx.exe -
Loads dropped DLL 64 IoCs
pid Process 2184 e5d0650411b0b4c0e5989d62895a35af_JaffaCakes118.exe 2184 e5d0650411b0b4c0e5989d62895a35af_JaffaCakes118.exe 2272 ciu.exe 2272 ciu.exe 2696 kph.exe 2696 kph.exe 2580 wok.exe 2580 wok.exe 2700 jef.exe 2700 jef.exe 2992 ovk.exe 2992 ovk.exe 536 vcx.exe 536 vcx.exe 2764 gyy.exe 2764 gyy.exe 2812 qtz.exe 2812 qtz.exe 2240 vkw.exe 2240 vkw.exe 1916 fji.exe 1916 fji.exe 2872 nnk.exe 2872 nnk.exe 1884 zpq.exe 1884 zpq.exe 3024 hxl.exe 3024 hxl.exe 904 rpb.exe 904 rpb.exe 2196 ejh.exe 2196 ejh.exe 448 lrd.exe 448 lrd.exe 2024 lyq.exe 2024 lyq.exe 1568 xaw.exe 1568 xaw.exe 2236 kno.exe 2236 kno.exe 1976 xmi.exe 1976 xmi.exe 2300 iln.exe 2300 iln.exe 2896 rnk.exe 2896 rnk.exe 1584 byz.exe 1584 byz.exe 2952 opu.exe 2952 opu.exe 1532 bnp.exe 1532 bnp.exe 1680 lqm.exe 1680 lqm.exe 2884 ydw.exe 2884 ydw.exe 2520 lbz.exe 2520 lbz.exe 2592 vpr.exe 2592 vpr.exe 2716 igu.exe 2716 igu.exe 532 vte.exe 532 vte.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\vkw.exe qtz.exe File created C:\Windows\SysWOW64\jth.exe wyp.exe File opened for modification C:\Windows\SysWOW64\cvk.exe pxp.exe File opened for modification C:\Windows\SysWOW64\uek.exe hop.exe File created C:\Windows\SysWOW64\zio.exe mvx.exe File opened for modification C:\Windows\SysWOW64\igu.exe vpr.exe File opened for modification C:\Windows\SysWOW64\rpz.exe eye.exe File opened for modification C:\Windows\SysWOW64\rch.exe emn.exe File created C:\Windows\SysWOW64\rvi.exe etc.exe File opened for modification C:\Windows\SysWOW64\xha.exe krx.exe File opened for modification C:\Windows\SysWOW64\umf.exe hzo.exe File opened for modification C:\Windows\SysWOW64\hop.exe uxm.exe File created C:\Windows\SysWOW64\glw.exe tvt.exe File opened for modification C:\Windows\SysWOW64\nlq.exe amv.exe File created C:\Windows\SysWOW64\vte.exe igu.exe File opened for modification C:\Windows\SysWOW64\ela.exe rmx.exe File opened for modification C:\Windows\SysWOW64\jip.exe zuw.exe File opened for modification C:\Windows\SysWOW64\voi.exe iby.exe File created C:\Windows\SysWOW64\nlq.exe amv.exe File created C:\Windows\SysWOW64\kph.exe ciu.exe File opened for modification C:\Windows\SysWOW64\xwq.exe kgv.exe File created C:\Windows\SysWOW64\zhc.exe pfn.exe File created C:\Windows\SysWOW64\xpw.exe kyc.exe File opened for modification C:\Windows\SysWOW64\gap.exe tkm.exe File opened for modification C:\Windows\SysWOW64\hzr.exe ylr.exe File opened for modification C:\Windows\SysWOW64\sgi.exe fpf.exe File created C:\Windows\SysWOW64\jef.exe wok.exe File created C:\Windows\SysWOW64\rmx.exe ewc.exe File opened for modification C:\Windows\SysWOW64\eye.exe raj.exe File created C:\Windows\SysWOW64\bgm.exe oqr.exe File opened for modification C:\Windows\SysWOW64\jiy.exe wvp.exe File created C:\Windows\SysWOW64\xaw.exe lyq.exe File opened for modification C:\Windows\SysWOW64\srk.exe gap.exe File opened for modification C:\Windows\SysWOW64\egz.exe rhw.exe File created C:\Windows\SysWOW64\gfi.exe xdt.exe File created C:\Windows\SysWOW64\dzb.exe qiz.exe File opened for modification C:\Windows\SysWOW64\uma.exe lgz.exe File opened for modification C:\Windows\SysWOW64\zwc.exe qtn.exe File created C:\Windows\SysWOW64\abt.exe nlq.exe File created C:\Windows\SysWOW64\gsc.exe uyw.exe File created C:\Windows\SysWOW64\gbz.exe tlw.exe File opened for modification C:\Windows\SysWOW64\mvx.exe zwc.exe File created C:\Windows\SysWOW64\rls.exe bhj.exe File created C:\Windows\SysWOW64\pdj.exe ceh.exe File opened for modification C:\Windows\SysWOW64\amv.exe nwb.exe File created C:\Windows\SysWOW64\ylr.exe luw.exe File created C:\Windows\SysWOW64\uui.exe sgi.exe File opened for modification C:\Windows\SysWOW64\lrd.exe ejh.exe File created C:\Windows\SysWOW64\zjk.exe pdj.exe File opened for modification C:\Windows\SysWOW64\gur.exe wkc.exe File opened for modification C:\Windows\SysWOW64\zhc.exe pfn.exe File opened for modification C:\Windows\SysWOW64\dic.exe qji.exe File created C:\Windows\SysWOW64\gyy.exe vcx.exe File created C:\Windows\SysWOW64\bdf.exe omc.exe File created C:\Windows\SysWOW64\eia.exe rvi.exe File created C:\Windows\SysWOW64\amv.exe nwb.exe File created C:\Windows\SysWOW64\gyj.exe tho.exe File created C:\Windows\SysWOW64\awi.exe qpw.exe File created C:\Windows\SysWOW64\dyt.exe qzy.exe File opened for modification C:\Windows\SysWOW64\dtm.exe qcr.exe File opened for modification C:\Windows\SysWOW64\wok.exe kph.exe File created C:\Windows\SysWOW64\ite.exe vgm.exe File opened for modification C:\Windows\SysWOW64\rtj.exe egz.exe File created C:\Windows\SysWOW64\xrx.exe odw.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xha.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wzs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qyx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rmx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fji.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iyd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zwc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fyd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xaw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tlu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tyg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ovk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vkw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qme.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oql.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tho.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zpq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gqo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pxp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5d0650411b0b4c0e5989d62895a35af_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vgm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language krx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iqo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uma.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wqt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ydw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ssl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rpz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zbw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hkd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iln.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xwq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language etc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tfe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fcr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iyd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vcx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rtj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ghk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dtm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vte.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sdw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hzr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uxm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zhc.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2272 2184 e5d0650411b0b4c0e5989d62895a35af_JaffaCakes118.exe 28 PID 2184 wrote to memory of 2272 2184 e5d0650411b0b4c0e5989d62895a35af_JaffaCakes118.exe 28 PID 2184 wrote to memory of 2272 2184 e5d0650411b0b4c0e5989d62895a35af_JaffaCakes118.exe 28 PID 2184 wrote to memory of 2272 2184 e5d0650411b0b4c0e5989d62895a35af_JaffaCakes118.exe 28 PID 2272 wrote to memory of 2696 2272 ciu.exe 29 PID 2272 wrote to memory of 2696 2272 ciu.exe 29 PID 2272 wrote to memory of 2696 2272 ciu.exe 29 PID 2272 wrote to memory of 2696 2272 ciu.exe 29 PID 2696 wrote to memory of 2580 2696 kph.exe 30 PID 2696 wrote to memory of 2580 2696 kph.exe 30 PID 2696 wrote to memory of 2580 2696 kph.exe 30 PID 2696 wrote to memory of 2580 2696 kph.exe 30 PID 2580 wrote to memory of 2700 2580 wok.exe 31 PID 2580 wrote to memory of 2700 2580 wok.exe 31 PID 2580 wrote to memory of 2700 2580 wok.exe 31 PID 2580 wrote to memory of 2700 2580 wok.exe 31 PID 2700 wrote to memory of 2992 2700 jef.exe 32 PID 2700 wrote to memory of 2992 2700 jef.exe 32 PID 2700 wrote to memory of 2992 2700 jef.exe 32 PID 2700 wrote to memory of 2992 2700 jef.exe 32 PID 2992 wrote to memory of 536 2992 ovk.exe 33 PID 2992 wrote to memory of 536 2992 ovk.exe 33 PID 2992 wrote to memory of 536 2992 ovk.exe 33 PID 2992 wrote to memory of 536 2992 ovk.exe 33 PID 536 wrote to memory of 2764 536 vcx.exe 34 PID 536 wrote to memory of 2764 536 vcx.exe 34 PID 536 wrote to memory of 2764 536 vcx.exe 34 PID 536 wrote to memory of 2764 536 vcx.exe 34 PID 2764 wrote to memory of 2812 2764 gyy.exe 35 PID 2764 wrote to memory of 2812 2764 gyy.exe 35 PID 2764 wrote to memory of 2812 2764 gyy.exe 35 PID 2764 wrote to memory of 2812 2764 gyy.exe 35 PID 2812 wrote to memory of 2240 2812 qtz.exe 36 PID 2812 wrote to memory of 2240 2812 qtz.exe 36 PID 2812 wrote to memory of 2240 2812 qtz.exe 36 PID 2812 wrote to memory of 2240 2812 qtz.exe 36 PID 2240 wrote to memory of 1916 2240 vkw.exe 37 PID 2240 wrote to memory of 1916 2240 vkw.exe 37 PID 2240 wrote to memory of 1916 2240 vkw.exe 37 PID 2240 wrote to memory of 1916 2240 vkw.exe 37 PID 1916 wrote to memory of 2872 1916 fji.exe 38 PID 1916 wrote to memory of 2872 1916 fji.exe 38 PID 1916 wrote to memory of 2872 1916 fji.exe 38 PID 1916 wrote to memory of 2872 1916 fji.exe 38 PID 2872 wrote to memory of 1884 2872 nnk.exe 39 PID 2872 wrote to memory of 1884 2872 nnk.exe 39 PID 2872 wrote to memory of 1884 2872 nnk.exe 39 PID 2872 wrote to memory of 1884 2872 nnk.exe 39 PID 1884 wrote to memory of 3024 1884 zpq.exe 40 PID 1884 wrote to memory of 3024 1884 zpq.exe 40 PID 1884 wrote to memory of 3024 1884 zpq.exe 40 PID 1884 wrote to memory of 3024 1884 zpq.exe 40 PID 3024 wrote to memory of 904 3024 hxl.exe 41 PID 3024 wrote to memory of 904 3024 hxl.exe 41 PID 3024 wrote to memory of 904 3024 hxl.exe 41 PID 3024 wrote to memory of 904 3024 hxl.exe 41 PID 904 wrote to memory of 2196 904 rpb.exe 42 PID 904 wrote to memory of 2196 904 rpb.exe 42 PID 904 wrote to memory of 2196 904 rpb.exe 42 PID 904 wrote to memory of 2196 904 rpb.exe 42 PID 2196 wrote to memory of 448 2196 ejh.exe 43 PID 2196 wrote to memory of 448 2196 ejh.exe 43 PID 2196 wrote to memory of 448 2196 ejh.exe 43 PID 2196 wrote to memory of 448 2196 ejh.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5d0650411b0b4c0e5989d62895a35af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e5d0650411b0b4c0e5989d62895a35af_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\ciu.exeC:\Windows\system32\ciu.exe 468 "C:\Users\Admin\AppData\Local\Temp\e5d0650411b0b4c0e5989d62895a35af_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\kph.exeC:\Windows\system32\kph.exe 532 "C:\Windows\SysWOW64\ciu.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\wok.exeC:\Windows\system32\wok.exe 544 "C:\Windows\SysWOW64\kph.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\jef.exeC:\Windows\system32\jef.exe 552 "C:\Windows\SysWOW64\wok.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\ovk.exeC:\Windows\system32\ovk.exe 536 "C:\Windows\SysWOW64\jef.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\vcx.exeC:\Windows\system32\vcx.exe 540 "C:\Windows\SysWOW64\ovk.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\gyy.exeC:\Windows\system32\gyy.exe 568 "C:\Windows\SysWOW64\vcx.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\qtz.exeC:\Windows\system32\qtz.exe 556 "C:\Windows\SysWOW64\gyy.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\vkw.exeC:\Windows\system32\vkw.exe 548 "C:\Windows\SysWOW64\qtz.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\fji.exeC:\Windows\system32\fji.exe 560 "C:\Windows\SysWOW64\vkw.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\nnk.exeC:\Windows\system32\nnk.exe 564 "C:\Windows\SysWOW64\fji.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\zpq.exeC:\Windows\system32\zpq.exe 572 "C:\Windows\SysWOW64\nnk.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\hxl.exeC:\Windows\system32\hxl.exe 584 "C:\Windows\SysWOW64\zpq.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\rpb.exeC:\Windows\system32\rpb.exe 576 "C:\Windows\SysWOW64\hxl.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\ejh.exeC:\Windows\system32\ejh.exe 580 "C:\Windows\SysWOW64\rpb.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\lrd.exeC:\Windows\system32\lrd.exe 588 "C:\Windows\SysWOW64\ejh.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:448 -
C:\Windows\SysWOW64\lyq.exeC:\Windows\system32\lyq.exe 592 "C:\Windows\SysWOW64\lrd.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2024 -
C:\Windows\SysWOW64\xaw.exeC:\Windows\system32\xaw.exe 596 "C:\Windows\SysWOW64\lyq.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1568 -
C:\Windows\SysWOW64\kno.exeC:\Windows\system32\kno.exe 600 "C:\Windows\SysWOW64\xaw.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2236 -
C:\Windows\SysWOW64\xmi.exeC:\Windows\system32\xmi.exe 604 "C:\Windows\SysWOW64\kno.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1976 -
C:\Windows\SysWOW64\iln.exeC:\Windows\system32\iln.exe 608 "C:\Windows\SysWOW64\xmi.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2300 -
C:\Windows\SysWOW64\rnk.exeC:\Windows\system32\rnk.exe 612 "C:\Windows\SysWOW64\iln.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2896 -
C:\Windows\SysWOW64\byz.exeC:\Windows\system32\byz.exe 628 "C:\Windows\SysWOW64\rnk.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1584 -
C:\Windows\SysWOW64\opu.exeC:\Windows\system32\opu.exe 616 "C:\Windows\SysWOW64\byz.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2952 -
C:\Windows\SysWOW64\bnp.exeC:\Windows\system32\bnp.exe 620 "C:\Windows\SysWOW64\opu.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1532 -
C:\Windows\SysWOW64\lqm.exeC:\Windows\system32\lqm.exe 632 "C:\Windows\SysWOW64\bnp.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1680 -
C:\Windows\SysWOW64\ydw.exeC:\Windows\system32\ydw.exe 624 "C:\Windows\SysWOW64\lqm.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2884 -
C:\Windows\SysWOW64\lbz.exeC:\Windows\system32\lbz.exe 636 "C:\Windows\SysWOW64\ydw.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2520 -
C:\Windows\SysWOW64\vpr.exeC:\Windows\system32\vpr.exe 640 "C:\Windows\SysWOW64\lbz.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2592 -
C:\Windows\SysWOW64\igu.exeC:\Windows\system32\igu.exe 644 "C:\Windows\SysWOW64\vpr.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2716 -
C:\Windows\SysWOW64\vte.exeC:\Windows\system32\vte.exe 648 "C:\Windows\SysWOW64\igu.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:532 -
C:\Windows\SysWOW64\ehe.exeC:\Windows\system32\ehe.exe 652 "C:\Windows\SysWOW64\vte.exe"33⤵
- Executes dropped EXE
PID:1404 -
C:\Windows\SysWOW64\rxh.exeC:\Windows\system32\rxh.exe 656 "C:\Windows\SysWOW64\ehe.exe"34⤵
- Executes dropped EXE
PID:2796 -
C:\Windows\SysWOW64\ewc.exeC:\Windows\system32\ewc.exe 672 "C:\Windows\SysWOW64\rxh.exe"35⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:640 -
C:\Windows\SysWOW64\rmx.exeC:\Windows\system32\rmx.exe 660 "C:\Windows\SysWOW64\ewc.exe"36⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:840 -
C:\Windows\SysWOW64\ela.exeC:\Windows\system32\ela.exe 664 "C:\Windows\SysWOW64\rmx.exe"37⤵
- Executes dropped EXE
PID:2484 -
C:\Windows\SysWOW64\onp.exeC:\Windows\system32\onp.exe 684 "C:\Windows\SysWOW64\ela.exe"38⤵
- Executes dropped EXE
PID:1992 -
C:\Windows\SysWOW64\bek.exeC:\Windows\system32\bek.exe 668 "C:\Windows\SysWOW64\onp.exe"39⤵
- Executes dropped EXE
PID:2660 -
C:\Windows\SysWOW64\ocf.exeC:\Windows\system32\ocf.exe 676 "C:\Windows\SysWOW64\bek.exe"40⤵
- Executes dropped EXE
PID:1860 -
C:\Windows\SysWOW64\xqf.exeC:\Windows\system32\xqf.exe 680 "C:\Windows\SysWOW64\ocf.exe"41⤵
- Executes dropped EXE
PID:3016 -
C:\Windows\SysWOW64\ldx.exeC:\Windows\system32\ldx.exe 692 "C:\Windows\SysWOW64\xqf.exe"42⤵
- Executes dropped EXE
PID:1840 -
C:\Windows\SysWOW64\vgm.exeC:\Windows\system32\vgm.exe 696 "C:\Windows\SysWOW64\ldx.exe"43⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2904 -
C:\Windows\SysWOW64\ite.exeC:\Windows\system32\ite.exe 704 "C:\Windows\SysWOW64\vgm.exe"44⤵
- Executes dropped EXE
PID:2352 -
C:\Windows\SysWOW64\rhw.exeC:\Windows\system32\rhw.exe 688 "C:\Windows\SysWOW64\ite.exe"45⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1508 -
C:\Windows\SysWOW64\egz.exeC:\Windows\system32\egz.exe 712 "C:\Windows\SysWOW64\rhw.exe"46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2768 -
C:\Windows\SysWOW64\rtj.exeC:\Windows\system32\rtj.exe 700 "C:\Windows\SysWOW64\egz.exe"47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1692 -
C:\Windows\SysWOW64\bhj.exeC:\Windows\system32\bhj.exe 728 "C:\Windows\SysWOW64\rtj.exe"48⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:744 -
C:\Windows\SysWOW64\rls.exeC:\Windows\system32\rls.exe 708 "C:\Windows\SysWOW64\bhj.exe"49⤵
- Executes dropped EXE
PID:1852 -
C:\Windows\SysWOW64\boh.exeC:\Windows\system32\boh.exe 716 "C:\Windows\SysWOW64\rls.exe"50⤵
- Executes dropped EXE
PID:2332 -
C:\Windows\SysWOW64\omc.exeC:\Windows\system32\omc.exe 720 "C:\Windows\SysWOW64\boh.exe"51⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2020 -
C:\Windows\SysWOW64\bdf.exeC:\Windows\system32\bdf.exe 724 "C:\Windows\SysWOW64\omc.exe"52⤵
- Executes dropped EXE
PID:1540 -
C:\Windows\SysWOW64\krx.exeC:\Windows\system32\krx.exe 732 "C:\Windows\SysWOW64\bdf.exe"53⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2032 -
C:\Windows\SysWOW64\xha.exeC:\Windows\system32\xha.exe 736 "C:\Windows\SysWOW64\krx.exe"54⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2608 -
C:\Windows\SysWOW64\kgv.exeC:\Windows\system32\kgv.exe 740 "C:\Windows\SysWOW64\xha.exe"55⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2636 -
C:\Windows\SysWOW64\xwq.exeC:\Windows\system32\xwq.exe 748 "C:\Windows\SysWOW64\kgv.exe"56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2584 -
C:\Windows\SysWOW64\kvs.exeC:\Windows\system32\kvs.exe 744 "C:\Windows\SysWOW64\xwq.exe"57⤵
- Executes dropped EXE
PID:624 -
C:\Windows\SysWOW64\uxi.exeC:\Windows\system32\uxi.exe 752 "C:\Windows\SysWOW64\kvs.exe"58⤵
- Executes dropped EXE
PID:2960 -
C:\Windows\SysWOW64\hzo.exeC:\Windows\system32\hzo.exe 756 "C:\Windows\SysWOW64\uxi.exe"59⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1012 -
C:\Windows\SysWOW64\umf.exeC:\Windows\system32\umf.exe 760 "C:\Windows\SysWOW64\hzo.exe"60⤵
- Executes dropped EXE
PID:972 -
C:\Windows\SysWOW64\dag.exeC:\Windows\system32\dag.exe 764 "C:\Windows\SysWOW64\umf.exe"61⤵
- Executes dropped EXE
PID:2748 -
C:\Windows\SysWOW64\rnq.exeC:\Windows\system32\rnq.exe 768 "C:\Windows\SysWOW64\dag.exe"62⤵
- Executes dropped EXE
PID:320 -
C:\Windows\SysWOW64\aqf.exeC:\Windows\system32\aqf.exe 776 "C:\Windows\SysWOW64\rnq.exe"63⤵
- Executes dropped EXE
PID:2664 -
C:\Windows\SysWOW64\odw.exeC:\Windows\system32\odw.exe 784 "C:\Windows\SysWOW64\aqf.exe"64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1984 -
C:\Windows\SysWOW64\xrx.exeC:\Windows\system32\xrx.exe 788 "C:\Windows\SysWOW64\odw.exe"65⤵
- Executes dropped EXE
PID:1868 -
C:\Windows\SysWOW64\ceh.exeC:\Windows\system32\ceh.exe 780 "C:\Windows\SysWOW64\xrx.exe"66⤵
- Drops file in System32 directory
PID:1748 -
C:\Windows\SysWOW64\pdj.exeC:\Windows\system32\pdj.exe 800 "C:\Windows\SysWOW64\ceh.exe"67⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2096 -
C:\Windows\SysWOW64\zjk.exeC:\Windows\system32\zjk.exe 772 "C:\Windows\SysWOW64\pdj.exe"68⤵PID:2916
-
C:\Windows\SysWOW64\meu.exeC:\Windows\system32\meu.exe 792 "C:\Windows\SysWOW64\zjk.exe"69⤵PID:1528
-
C:\Windows\SysWOW64\zuw.exeC:\Windows\system32\zuw.exe 820 "C:\Windows\SysWOW64\meu.exe"70⤵
- Drops file in System32 directory
PID:3036 -
C:\Windows\SysWOW64\jip.exeC:\Windows\system32\jip.exe 796 "C:\Windows\SysWOW64\zuw.exe"71⤵PID:3040
-
C:\Windows\SysWOW64\wzs.exeC:\Windows\system32\wzs.exe 804 "C:\Windows\SysWOW64\jip.exe"72⤵
- System Location Discovery: System Language Discovery
PID:1160 -
C:\Windows\SysWOW64\iby.exeC:\Windows\system32\iby.exe 824 "C:\Windows\SysWOW64\wzs.exe"73⤵
- Drops file in System32 directory
PID:1544 -
C:\Windows\SysWOW64\voi.exeC:\Windows\system32\voi.exe 808 "C:\Windows\SysWOW64\iby.exe"74⤵PID:2128
-
C:\Windows\SysWOW64\iqo.exeC:\Windows\system32\iqo.exe 812 "C:\Windows\SysWOW64\voi.exe"75⤵
- System Location Discovery: System Language Discovery
PID:2924 -
C:\Windows\SysWOW64\ssl.exeC:\Windows\system32\ssl.exe 816 "C:\Windows\SysWOW64\iqo.exe"76⤵
- System Location Discovery: System Language Discovery
PID:1208 -
C:\Windows\SysWOW64\ifl.exeC:\Windows\system32\ifl.exe 828 "C:\Windows\SysWOW64\ssl.exe"77⤵PID:2948
-
C:\Windows\SysWOW64\shb.exeC:\Windows\system32\shb.exe 836 "C:\Windows\SysWOW64\ifl.exe"78⤵PID:2524
-
C:\Windows\SysWOW64\fyd.exeC:\Windows\system32\fyd.exe 832 "C:\Windows\SysWOW64\shb.exe"79⤵
- System Location Discovery: System Language Discovery
PID:3064 -
C:\Windows\SysWOW64\raj.exeC:\Windows\system32\raj.exe 840 "C:\Windows\SysWOW64\fyd.exe"80⤵
- Drops file in System32 directory
PID:1368 -
C:\Windows\SysWOW64\eye.exeC:\Windows\system32\eye.exe 844 "C:\Windows\SysWOW64\raj.exe"81⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2432 -
C:\Windows\SysWOW64\rpz.exeC:\Windows\system32\rpz.exe 848 "C:\Windows\SysWOW64\eye.exe"82⤵
- System Location Discovery: System Language Discovery
PID:2588 -
C:\Windows\SysWOW64\bda.exeC:\Windows\system32\bda.exe 852 "C:\Windows\SysWOW64\rpz.exe"83⤵PID:3044
-
C:\Windows\SysWOW64\oqr.exeC:\Windows\system32\oqr.exe 856 "C:\Windows\SysWOW64\bda.exe"84⤵
- Drops file in System32 directory
PID:2480 -
C:\Windows\SysWOW64\bgm.exeC:\Windows\system32\bgm.exe 860 "C:\Windows\SysWOW64\oqr.exe"85⤵PID:2516
-
C:\Windows\SysWOW64\lrb.exeC:\Windows\system32\lrb.exe 872 "C:\Windows\SysWOW64\bgm.exe"86⤵PID:2780
-
C:\Windows\SysWOW64\yli.exeC:\Windows\system32\yli.exe 864 "C:\Windows\SysWOW64\lrb.exe"87⤵PID:1924
-
C:\Windows\SysWOW64\lgz.exeC:\Windows\system32\lgz.exe 868 "C:\Windows\SysWOW64\yli.exe"88⤵
- Drops file in System32 directory
PID:2800 -
C:\Windows\SysWOW64\uma.exeC:\Windows\system32\uma.exe 876 "C:\Windows\SysWOW64\lgz.exe"89⤵
- System Location Discovery: System Language Discovery
PID:2168 -
C:\Windows\SysWOW64\hzj.exeC:\Windows\system32\hzj.exe 880 "C:\Windows\SysWOW64\uma.exe"90⤵PID:2956
-
C:\Windows\SysWOW64\uym.exeC:\Windows\system32\uym.exe 884 "C:\Windows\SysWOW64\hzj.exe"91⤵PID:1944
-
C:\Windows\SysWOW64\emn.exeC:\Windows\system32\emn.exe 896 "C:\Windows\SysWOW64\uym.exe"92⤵
- Drops file in System32 directory
PID:1880 -
C:\Windows\SysWOW64\rch.exeC:\Windows\system32\rch.exe 888 "C:\Windows\SysWOW64\emn.exe"93⤵
- System Location Discovery: System Language Discovery
PID:2364 -
C:\Windows\SysWOW64\etc.exeC:\Windows\system32\etc.exe 912 "C:\Windows\SysWOW64\rch.exe"94⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1948 -
C:\Windows\SysWOW64\rvi.exeC:\Windows\system32\rvi.exe 892 "C:\Windows\SysWOW64\etc.exe"95⤵
- Drops file in System32 directory
PID:2160 -
C:\Windows\SysWOW64\eia.exeC:\Windows\system32\eia.exe 904 "C:\Windows\SysWOW64\rvi.exe"96⤵PID:2776
-
C:\Windows\SysWOW64\nwb.exeC:\Windows\system32\nwb.exe 900 "C:\Windows\SysWOW64\eia.exe"97⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:892 -
C:\Windows\SysWOW64\amv.exeC:\Windows\system32\amv.exe 908 "C:\Windows\SysWOW64\nwb.exe"98⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2216 -
C:\Windows\SysWOW64\nlq.exeC:\Windows\system32\nlq.exe 916 "C:\Windows\SysWOW64\amv.exe"99⤵
- Drops file in System32 directory
PID:752 -
C:\Windows\SysWOW64\abt.exeC:\Windows\system32\abt.exe 920 "C:\Windows\SysWOW64\nlq.exe"100⤵PID:3052
-
C:\Windows\SysWOW64\ndz.exeC:\Windows\system32\ndz.exe 924 "C:\Windows\SysWOW64\abt.exe"101⤵PID:832
-
C:\Windows\SysWOW64\xgo.exeC:\Windows\system32\xgo.exe 928 "C:\Windows\SysWOW64\ndz.exe"102⤵PID:2612
-
C:\Windows\SysWOW64\nsp.exeC:\Windows\system32\nsp.exe 932 "C:\Windows\SysWOW64\xgo.exe"103⤵PID:2256
-
C:\Windows\SysWOW64\wyp.exeC:\Windows\system32\wyp.exe 936 "C:\Windows\SysWOW64\nsp.exe"104⤵
- Drops file in System32 directory
PID:2552 -
C:\Windows\SysWOW64\jth.exeC:\Windows\system32\jth.exe 940 "C:\Windows\SysWOW64\wyp.exe"105⤵PID:2424
-
C:\Windows\SysWOW64\wkc.exeC:\Windows\system32\wkc.exe 944 "C:\Windows\SysWOW64\jth.exe"106⤵
- Drops file in System32 directory
PID:768 -
C:\Windows\SysWOW64\gur.exeC:\Windows\system32\gur.exe 948 "C:\Windows\SysWOW64\wkc.exe"107⤵PID:2488
-
C:\Windows\SysWOW64\tlu.exeC:\Windows\system32\tlu.exe 952 "C:\Windows\SysWOW64\gur.exe"108⤵
- System Location Discovery: System Language Discovery
PID:1668 -
C:\Windows\SysWOW64\doj.exeC:\Windows\system32\doj.exe 956 "C:\Windows\SysWOW64\tlu.exe"109⤵PID:900
-
C:\Windows\SysWOW64\qme.exeC:\Windows\system32\qme.exe 960 "C:\Windows\SysWOW64\doj.exe"110⤵
- System Location Discovery: System Language Discovery
PID:2820 -
C:\Windows\SysWOW64\ddh.exeC:\Windows\system32\ddh.exe 964 "C:\Windows\SysWOW64\qme.exe"111⤵PID:1892
-
C:\Windows\SysWOW64\pfn.exeC:\Windows\system32\pfn.exe 976 "C:\Windows\SysWOW64\ddh.exe"112⤵
- Drops file in System32 directory
PID:1928 -
C:\Windows\SysWOW64\zhc.exeC:\Windows\system32\zhc.exe 968 "C:\Windows\SysWOW64\pfn.exe"113⤵
- System Location Discovery: System Language Discovery
PID:800 -
C:\Windows\SysWOW64\mgx.exeC:\Windows\system32\mgx.exe 972 "C:\Windows\SysWOW64\zhc.exe"114⤵PID:2972
-
C:\Windows\SysWOW64\zws.exeC:\Windows\system32\zws.exe 980 "C:\Windows\SysWOW64\mgx.exe"115⤵PID:344
-
C:\Windows\SysWOW64\evv.exeC:\Windows\system32\evv.exe 984 "C:\Windows\SysWOW64\zws.exe"116⤵PID:2668
-
C:\Windows\SysWOW64\rlp.exeC:\Windows\system32\rlp.exe 996 "C:\Windows\SysWOW64\evv.exe"117⤵
- System Location Discovery: System Language Discovery
PID:2112 -
C:\Windows\SysWOW64\bzq.exeC:\Windows\system32\bzq.exe 988 "C:\Windows\SysWOW64\rlp.exe"118⤵PID:1356
-
C:\Windows\SysWOW64\oql.exeC:\Windows\system32\oql.exe 992 "C:\Windows\SysWOW64\bzq.exe"119⤵
- System Location Discovery: System Language Discovery
PID:1716 -
C:\Windows\SysWOW64\boo.exeC:\Windows\system32\boo.exe 1004 "C:\Windows\SysWOW64\oql.exe"120⤵PID:992
-
C:\Windows\SysWOW64\niu.exeC:\Windows\system32\niu.exe 1000 "C:\Windows\SysWOW64\boo.exe"121⤵PID:3056
-
C:\Windows\SysWOW64\avd.exeC:\Windows\system32\avd.exe 1008 "C:\Windows\SysWOW64\niu.exe"122⤵PID:2180
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-