Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 09:49
Behavioral task
behavioral1
Sample
e5d0650411b0b4c0e5989d62895a35af_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e5d0650411b0b4c0e5989d62895a35af_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e5d0650411b0b4c0e5989d62895a35af_JaffaCakes118.exe
-
Size
377KB
-
MD5
e5d0650411b0b4c0e5989d62895a35af
-
SHA1
0307a3a8827743c27079b3db4abb541126564cd9
-
SHA256
eb168aaf39c4926770e387f1b34bda57823b6afe7a26779856bf9391573b2a37
-
SHA512
10666e2fc8739c7fc6e1d0e6b6ddf63780f8ce823d946f1d8727a126c8741fec676a233c6f12aaef2bfec64260f6aeb92418640ac924a39a1f7579bbe749dadd
-
SSDEEP
6144:reVaO/iUJ4BrbvBJfK4PVCX23mGBWuMFvYoc9dRT+GDNmMzuMs6Cyv3kgg:reVT/iUJ45bvregmZ/Fgoc9bLX643
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 64 IoCs
pid Process 4728 wdq.exe 3476 auv.exe 2084 odb.exe 3012 ycf.exe 2296 lpx.exe 2600 ykg.exe 3128 jgh.exe 1404 six.exe 3032 inf.exe 4288 tuj.exe 1492 xke.exe 4696 lxv.exe 2308 vtw.exe 2096 idc.exe 1020 sns.exe 4692 fab.exe 1876 sre.exe 3620 dju.exe 5092 qla.exe 2256 dmg.exe 4304 qlb.exe 5056 dyk.exe 412 nxx.exe 5060 avr.exe 3452 nij.exe 4500 yek.exe 1076 luf.exe 4364 ytz.exe 4124 ism.exe 4160 vfv.exe 4276 idy.exe 3472 vqh.exe 3256 idz.exe 4480 vqj.exe 220 fbg.exe 616 soq.exe 4800 gbh.exe 5068 tor.exe 2032 dzo.exe 796 qmy.exe 4328 dzp.exe 3840 qmz.exe 1528 aow.exe 4524 nnr.exe 3188 awx.exe 4456 njh.exe 1504 xmw.exe 4880 lho.exe 444 yuf.exe 2856 lhp.exe 4552 vje.exe 4420 iew.exe 924 vrn.exe 1004 iex.exe 4784 shm.exe 4228 fce.exe 1612 kpv.exe 4400 ycf.exe 1236 lsi.exe 3936 voa.exe 1692 ind.exe 264 van.exe 1608 fcc.exe 2880 sxu.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\cak.exe sxv.exe File created C:\Windows\SysWOW64\hqb.exe xnl.exe File created C:\Windows\SysWOW64\osq.exe eia.exe File created C:\Windows\SysWOW64\mpw.exe zcf.exe File created C:\Windows\SysWOW64\bxd.exe nkt.exe File created C:\Windows\SysWOW64\jfl.exe vst.exe File created C:\Windows\SysWOW64\sad.exe fnt.exe File created C:\Windows\SysWOW64\yuf.exe lho.exe File created C:\Windows\SysWOW64\qqq.exe ggb.exe File opened for modification C:\Windows\SysWOW64\utx.exe hcu.exe File opened for modification C:\Windows\SysWOW64\mdr.exe zew.exe File created C:\Windows\SysWOW64\joh.exe xpm.exe File created C:\Windows\SysWOW64\hji.exe uwy.exe File created C:\Windows\SysWOW64\qdh.exe dqq.exe File opened for modification C:\Windows\SysWOW64\ozm.exe bbr.exe File opened for modification C:\Windows\SysWOW64\qzu.exe gpf.exe File opened for modification C:\Windows\SysWOW64\qla.exe dju.exe File opened for modification C:\Windows\SysWOW64\axs.exe qvd.exe File opened for modification C:\Windows\SysWOW64\uti.exe lqt.exe File created C:\Windows\SysWOW64\krw.exe xee.exe File created C:\Windows\SysWOW64\cgf.exe otv.exe File created C:\Windows\SysWOW64\zac.exe mrd.exe File created C:\Windows\SysWOW64\zmu.exe lrc.exe File created C:\Windows\SysWOW64\bzn.exe oat.exe File created C:\Windows\SysWOW64\axs.exe qvd.exe File created C:\Windows\SysWOW64\lav.exe ynl.exe File opened for modification C:\Windows\SysWOW64\ocm.exe erw.exe File opened for modification C:\Windows\SysWOW64\vme.exe hrm.exe File opened for modification C:\Windows\SysWOW64\cgi.exe otr.exe File created C:\Windows\SysWOW64\maj.exe ynr.exe File created C:\Windows\SysWOW64\jtz.exe vgq.exe File created C:\Windows\SysWOW64\fli.exe vew.exe File opened for modification C:\Windows\SysWOW64\luf.exe yek.exe File created C:\Windows\SysWOW64\vew.exe iob.exe File opened for modification C:\Windows\SysWOW64\flj.exe syr.exe File created C:\Windows\SysWOW64\rft.exe esb.exe File created C:\Windows\SysWOW64\dgo.exe qpu.exe File created C:\Windows\SysWOW64\ycf.exe odb.exe File opened for modification C:\Windows\SysWOW64\rnj.exe hku.exe File created C:\Windows\SysWOW64\cni.exe tdt.exe File opened for modification C:\Windows\SysWOW64\fad.exe sqx.exe File created C:\Windows\SysWOW64\ndr.exe zia.exe File created C:\Windows\SysWOW64\ufr.exe hgw.exe File created C:\Windows\SysWOW64\jbx.exe zzh.exe File created C:\Windows\SysWOW64\ehu.exe rud.exe File opened for modification C:\Windows\SysWOW64\lid.exe yvl.exe File created C:\Windows\SysWOW64\cda.exe sad.exe File opened for modification C:\Windows\SysWOW64\jyr.exe vpk.exe File created C:\Windows\SysWOW64\als.exe nya.exe File created C:\Windows\SysWOW64\vfv.exe ism.exe File created C:\Windows\SysWOW64\gga.exe wzo.exe File opened for modification C:\Windows\SysWOW64\mbg.exe yox.exe File created C:\Windows\SysWOW64\ped.exe cni.exe File created C:\Windows\SysWOW64\cxk.exe sqg.exe File opened for modification C:\Windows\SysWOW64\egq.exe rtg.exe File opened for modification C:\Windows\SysWOW64\qop.exe dbx.exe File opened for modification C:\Windows\SysWOW64\hnv.exe tad.exe File opened for modification C:\Windows\SysWOW64\vva.exe lll.exe File opened for modification C:\Windows\SysWOW64\boy.exe rdi.exe File created C:\Windows\SysWOW64\cnh.exe xxm.exe File opened for modification C:\Windows\SysWOW64\chk.exe sxu.exe File created C:\Windows\SysWOW64\fpe.exe scm.exe File created C:\Windows\SysWOW64\fzg.exe smo.exe File created C:\Windows\SysWOW64\qkx.exe cxo.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fli.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sxu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language itq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fzg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ocm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qhm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dmm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lyt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qzq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gwq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gii.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language idz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rwo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vva.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cpn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qdh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qoj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cxe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mrd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language izn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vyh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dyp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ycf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mhd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language maj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hak.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sns.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qmy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ewn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wir.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iwg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qlb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ocn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ufa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gpf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gzc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nsl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ngy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dqq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oda.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lbf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ghx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vqh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zlh.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2016 wrote to memory of 4728 2016 e5d0650411b0b4c0e5989d62895a35af_JaffaCakes118.exe 83 PID 2016 wrote to memory of 4728 2016 e5d0650411b0b4c0e5989d62895a35af_JaffaCakes118.exe 83 PID 2016 wrote to memory of 4728 2016 e5d0650411b0b4c0e5989d62895a35af_JaffaCakes118.exe 83 PID 4728 wrote to memory of 3476 4728 wdq.exe 84 PID 4728 wrote to memory of 3476 4728 wdq.exe 84 PID 4728 wrote to memory of 3476 4728 wdq.exe 84 PID 3476 wrote to memory of 2084 3476 auv.exe 85 PID 3476 wrote to memory of 2084 3476 auv.exe 85 PID 3476 wrote to memory of 2084 3476 auv.exe 85 PID 2084 wrote to memory of 3012 2084 odb.exe 86 PID 2084 wrote to memory of 3012 2084 odb.exe 86 PID 2084 wrote to memory of 3012 2084 odb.exe 86 PID 3012 wrote to memory of 2296 3012 ycf.exe 87 PID 3012 wrote to memory of 2296 3012 ycf.exe 87 PID 3012 wrote to memory of 2296 3012 ycf.exe 87 PID 2296 wrote to memory of 2600 2296 lpx.exe 88 PID 2296 wrote to memory of 2600 2296 lpx.exe 88 PID 2296 wrote to memory of 2600 2296 lpx.exe 88 PID 2600 wrote to memory of 3128 2600 ykg.exe 89 PID 2600 wrote to memory of 3128 2600 ykg.exe 89 PID 2600 wrote to memory of 3128 2600 ykg.exe 89 PID 3128 wrote to memory of 1404 3128 jgh.exe 90 PID 3128 wrote to memory of 1404 3128 jgh.exe 90 PID 3128 wrote to memory of 1404 3128 jgh.exe 90 PID 1404 wrote to memory of 3032 1404 six.exe 91 PID 1404 wrote to memory of 3032 1404 six.exe 91 PID 1404 wrote to memory of 3032 1404 six.exe 91 PID 3032 wrote to memory of 4288 3032 inf.exe 92 PID 3032 wrote to memory of 4288 3032 inf.exe 92 PID 3032 wrote to memory of 4288 3032 inf.exe 92 PID 4288 wrote to memory of 1492 4288 tuj.exe 93 PID 4288 wrote to memory of 1492 4288 tuj.exe 93 PID 4288 wrote to memory of 1492 4288 tuj.exe 93 PID 1492 wrote to memory of 4696 1492 xke.exe 94 PID 1492 wrote to memory of 4696 1492 xke.exe 94 PID 1492 wrote to memory of 4696 1492 xke.exe 94 PID 4696 wrote to memory of 2308 4696 lxv.exe 96 PID 4696 wrote to memory of 2308 4696 lxv.exe 96 PID 4696 wrote to memory of 2308 4696 lxv.exe 96 PID 2308 wrote to memory of 2096 2308 vtw.exe 97 PID 2308 wrote to memory of 2096 2308 vtw.exe 97 PID 2308 wrote to memory of 2096 2308 vtw.exe 97 PID 2096 wrote to memory of 1020 2096 idc.exe 98 PID 2096 wrote to memory of 1020 2096 idc.exe 98 PID 2096 wrote to memory of 1020 2096 idc.exe 98 PID 1020 wrote to memory of 4692 1020 sns.exe 99 PID 1020 wrote to memory of 4692 1020 sns.exe 99 PID 1020 wrote to memory of 4692 1020 sns.exe 99 PID 4692 wrote to memory of 1876 4692 fab.exe 100 PID 4692 wrote to memory of 1876 4692 fab.exe 100 PID 4692 wrote to memory of 1876 4692 fab.exe 100 PID 1876 wrote to memory of 3620 1876 sre.exe 101 PID 1876 wrote to memory of 3620 1876 sre.exe 101 PID 1876 wrote to memory of 3620 1876 sre.exe 101 PID 3620 wrote to memory of 5092 3620 dju.exe 102 PID 3620 wrote to memory of 5092 3620 dju.exe 102 PID 3620 wrote to memory of 5092 3620 dju.exe 102 PID 5092 wrote to memory of 2256 5092 qla.exe 103 PID 5092 wrote to memory of 2256 5092 qla.exe 103 PID 5092 wrote to memory of 2256 5092 qla.exe 103 PID 2256 wrote to memory of 4304 2256 dmg.exe 104 PID 2256 wrote to memory of 4304 2256 dmg.exe 104 PID 2256 wrote to memory of 4304 2256 dmg.exe 104 PID 4304 wrote to memory of 5056 4304 qlb.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5d0650411b0b4c0e5989d62895a35af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e5d0650411b0b4c0e5989d62895a35af_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\wdq.exeC:\Windows\system32\wdq.exe 1148 "C:\Users\Admin\AppData\Local\Temp\e5d0650411b0b4c0e5989d62895a35af_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\SysWOW64\auv.exeC:\Windows\system32\auv.exe 1152 "C:\Windows\SysWOW64\wdq.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\SysWOW64\odb.exeC:\Windows\system32\odb.exe 1164 "C:\Windows\SysWOW64\auv.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\ycf.exeC:\Windows\system32\ycf.exe 1156 "C:\Windows\SysWOW64\odb.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\lpx.exeC:\Windows\system32\lpx.exe 1168 "C:\Windows\SysWOW64\ycf.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\ykg.exeC:\Windows\system32\ykg.exe 1172 "C:\Windows\SysWOW64\lpx.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\jgh.exeC:\Windows\system32\jgh.exe 1176 "C:\Windows\SysWOW64\ykg.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Windows\SysWOW64\six.exeC:\Windows\system32\six.exe 1160 "C:\Windows\SysWOW64\jgh.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\inf.exeC:\Windows\system32\inf.exe 1132 "C:\Windows\SysWOW64\six.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\tuj.exeC:\Windows\system32\tuj.exe 1184 "C:\Windows\SysWOW64\inf.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\SysWOW64\xke.exeC:\Windows\system32\xke.exe 1188 "C:\Windows\SysWOW64\tuj.exe"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\lxv.exeC:\Windows\system32\lxv.exe 1192 "C:\Windows\SysWOW64\xke.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\SysWOW64\vtw.exeC:\Windows\system32\vtw.exe 1196 "C:\Windows\SysWOW64\lxv.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\idc.exeC:\Windows\system32\idc.exe 1200 "C:\Windows\SysWOW64\vtw.exe"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\sns.exeC:\Windows\system32\sns.exe 1204 "C:\Windows\SysWOW64\idc.exe"16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\SysWOW64\fab.exeC:\Windows\system32\fab.exe 1208 "C:\Windows\SysWOW64\sns.exe"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\SysWOW64\sre.exeC:\Windows\system32\sre.exe 1216 "C:\Windows\SysWOW64\fab.exe"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\dju.exeC:\Windows\system32\dju.exe 1220 "C:\Windows\SysWOW64\sre.exe"19⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Windows\SysWOW64\qla.exeC:\Windows\system32\qla.exe 1224 "C:\Windows\SysWOW64\dju.exe"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\SysWOW64\dmg.exeC:\Windows\system32\dmg.exe 1212 "C:\Windows\SysWOW64\qla.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\qlb.exeC:\Windows\system32\qlb.exe 1244 "C:\Windows\SysWOW64\dmg.exe"22⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\SysWOW64\dyk.exeC:\Windows\system32\dyk.exe 1236 "C:\Windows\SysWOW64\qlb.exe"23⤵
- Executes dropped EXE
PID:5056 -
C:\Windows\SysWOW64\nxx.exeC:\Windows\system32\nxx.exe 1232 "C:\Windows\SysWOW64\dyk.exe"24⤵
- Executes dropped EXE
PID:412 -
C:\Windows\SysWOW64\avr.exeC:\Windows\system32\avr.exe 1180 "C:\Windows\SysWOW64\nxx.exe"25⤵
- Executes dropped EXE
PID:5060 -
C:\Windows\SysWOW64\nij.exeC:\Windows\system32\nij.exe 1248 "C:\Windows\SysWOW64\avr.exe"26⤵
- Executes dropped EXE
PID:3452 -
C:\Windows\SysWOW64\yek.exeC:\Windows\system32\yek.exe 1256 "C:\Windows\SysWOW64\nij.exe"27⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4500 -
C:\Windows\SysWOW64\luf.exeC:\Windows\system32\luf.exe 1036 "C:\Windows\SysWOW64\yek.exe"28⤵
- Executes dropped EXE
PID:1076 -
C:\Windows\SysWOW64\ytz.exeC:\Windows\system32\ytz.exe 1296 "C:\Windows\SysWOW64\luf.exe"29⤵
- Executes dropped EXE
PID:4364 -
C:\Windows\SysWOW64\ism.exeC:\Windows\system32\ism.exe 1252 "C:\Windows\SysWOW64\ytz.exe"30⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4124 -
C:\Windows\SysWOW64\vfv.exeC:\Windows\system32\vfv.exe 1260 "C:\Windows\SysWOW64\ism.exe"31⤵
- Executes dropped EXE
PID:4160 -
C:\Windows\SysWOW64\idy.exeC:\Windows\system32\idy.exe 1268 "C:\Windows\SysWOW64\vfv.exe"32⤵
- Executes dropped EXE
PID:4276 -
C:\Windows\SysWOW64\vqh.exeC:\Windows\system32\vqh.exe 1272 "C:\Windows\SysWOW64\idy.exe"33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3472 -
C:\Windows\SysWOW64\idz.exeC:\Windows\system32\idz.exe 1276 "C:\Windows\SysWOW64\vqh.exe"34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3256 -
C:\Windows\SysWOW64\vqj.exeC:\Windows\system32\vqj.exe 1280 "C:\Windows\SysWOW64\idz.exe"35⤵
- Executes dropped EXE
PID:4480 -
C:\Windows\SysWOW64\fbg.exeC:\Windows\system32\fbg.exe 1264 "C:\Windows\SysWOW64\vqj.exe"36⤵
- Executes dropped EXE
PID:220 -
C:\Windows\SysWOW64\soq.exeC:\Windows\system32\soq.exe 1284 "C:\Windows\SysWOW64\fbg.exe"37⤵
- Executes dropped EXE
PID:616 -
C:\Windows\SysWOW64\gbh.exeC:\Windows\system32\gbh.exe 1300 "C:\Windows\SysWOW64\soq.exe"38⤵
- Executes dropped EXE
PID:4800 -
C:\Windows\SysWOW64\tor.exeC:\Windows\system32\tor.exe 1288 "C:\Windows\SysWOW64\gbh.exe"39⤵
- Executes dropped EXE
PID:5068 -
C:\Windows\SysWOW64\dzo.exeC:\Windows\system32\dzo.exe 1304 "C:\Windows\SysWOW64\tor.exe"40⤵
- Executes dropped EXE
PID:2032 -
C:\Windows\SysWOW64\qmy.exeC:\Windows\system32\qmy.exe 1308 "C:\Windows\SysWOW64\dzo.exe"41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:796 -
C:\Windows\SysWOW64\dzp.exeC:\Windows\system32\dzp.exe 1240 "C:\Windows\SysWOW64\qmy.exe"42⤵
- Executes dropped EXE
PID:4328 -
C:\Windows\SysWOW64\qmz.exeC:\Windows\system32\qmz.exe 1312 "C:\Windows\SysWOW64\dzp.exe"43⤵
- Executes dropped EXE
PID:3840 -
C:\Windows\SysWOW64\aow.exeC:\Windows\system32\aow.exe 1316 "C:\Windows\SysWOW64\qmz.exe"44⤵
- Executes dropped EXE
PID:1528 -
C:\Windows\SysWOW64\nnr.exeC:\Windows\system32\nnr.exe 1320 "C:\Windows\SysWOW64\aow.exe"45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4524 -
C:\Windows\SysWOW64\awx.exeC:\Windows\system32\awx.exe 1328 "C:\Windows\SysWOW64\nnr.exe"46⤵
- Executes dropped EXE
PID:3188 -
C:\Windows\SysWOW64\njh.exeC:\Windows\system32\njh.exe 1324 "C:\Windows\SysWOW64\awx.exe"47⤵
- Executes dropped EXE
PID:4456 -
C:\Windows\SysWOW64\xmw.exeC:\Windows\system32\xmw.exe 1336 "C:\Windows\SysWOW64\njh.exe"48⤵
- Executes dropped EXE
PID:1504 -
C:\Windows\SysWOW64\lho.exeC:\Windows\system32\lho.exe 1340 "C:\Windows\SysWOW64\xmw.exe"49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4880 -
C:\Windows\SysWOW64\yuf.exeC:\Windows\system32\yuf.exe 1344 "C:\Windows\SysWOW64\lho.exe"50⤵
- Executes dropped EXE
PID:444 -
C:\Windows\SysWOW64\lhp.exeC:\Windows\system32\lhp.exe 1348 "C:\Windows\SysWOW64\yuf.exe"51⤵
- Executes dropped EXE
PID:2856 -
C:\Windows\SysWOW64\vje.exeC:\Windows\system32\vje.exe 1356 "C:\Windows\SysWOW64\lhp.exe"52⤵
- Executes dropped EXE
PID:4552 -
C:\Windows\SysWOW64\iew.exeC:\Windows\system32\iew.exe 1364 "C:\Windows\SysWOW64\vje.exe"53⤵
- Executes dropped EXE
PID:4420 -
C:\Windows\SysWOW64\vrn.exeC:\Windows\system32\vrn.exe 1352 "C:\Windows\SysWOW64\iew.exe"54⤵
- Executes dropped EXE
PID:924 -
C:\Windows\SysWOW64\iex.exeC:\Windows\system32\iex.exe 1368 "C:\Windows\SysWOW64\vrn.exe"55⤵
- Executes dropped EXE
PID:1004 -
C:\Windows\SysWOW64\shm.exeC:\Windows\system32\shm.exe 1332 "C:\Windows\SysWOW64\iex.exe"56⤵
- Executes dropped EXE
PID:4784 -
C:\Windows\SysWOW64\fce.exeC:\Windows\system32\fce.exe 1228 "C:\Windows\SysWOW64\shm.exe"57⤵
- Executes dropped EXE
PID:4228 -
C:\Windows\SysWOW64\kpv.exeC:\Windows\system32\kpv.exe 1376 "C:\Windows\SysWOW64\fce.exe"58⤵
- Executes dropped EXE
PID:1612 -
C:\Windows\SysWOW64\ycf.exeC:\Windows\system32\ycf.exe 1380 "C:\Windows\SysWOW64\kpv.exe"59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4400 -
C:\Windows\SysWOW64\lsi.exeC:\Windows\system32\lsi.exe 1104 "C:\Windows\SysWOW64\ycf.exe"60⤵
- Executes dropped EXE
PID:1236 -
C:\Windows\SysWOW64\voa.exeC:\Windows\system32\voa.exe 1384 "C:\Windows\SysWOW64\lsi.exe"61⤵
- Executes dropped EXE
PID:3936 -
C:\Windows\SysWOW64\ind.exeC:\Windows\system32\ind.exe 1392 "C:\Windows\SysWOW64\voa.exe"62⤵
- Executes dropped EXE
PID:1692 -
C:\Windows\SysWOW64\van.exeC:\Windows\system32\van.exe 1400 "C:\Windows\SysWOW64\ind.exe"63⤵
- Executes dropped EXE
PID:264 -
C:\Windows\SysWOW64\fcc.exeC:\Windows\system32\fcc.exe 1396 "C:\Windows\SysWOW64\van.exe"64⤵
- Executes dropped EXE
PID:1608 -
C:\Windows\SysWOW64\sxu.exeC:\Windows\system32\sxu.exe 1404 "C:\Windows\SysWOW64\fcc.exe"65⤵
- Executes dropped EXE
PID:2880 -
C:\Windows\SysWOW64\fkl.exeC:\Windows\system32\fkl.exe 1408 "C:\Windows\SysWOW64\sxu.exe"66⤵PID:672
-
C:\Windows\SysWOW64\sxv.exeC:\Windows\system32\sxv.exe 1388 "C:\Windows\SysWOW64\fkl.exe"67⤵
- Drops file in System32 directory
PID:2980 -
C:\Windows\SysWOW64\cak.exeC:\Windows\system32\cak.exe 1412 "C:\Windows\SysWOW64\sxv.exe"68⤵PID:2776
-
C:\Windows\SysWOW64\pvc.exeC:\Windows\system32\pvc.exe 1420 "C:\Windows\SysWOW64\cak.exe"69⤵PID:2744
-
C:\Windows\SysWOW64\dit.exeC:\Windows\system32\dit.exe 1424 "C:\Windows\SysWOW64\pvc.exe"70⤵PID:4756
-
C:\Windows\SysWOW64\qvd.exeC:\Windows\system32\qvd.exe 1440 "C:\Windows\SysWOW64\dit.exe"71⤵
- Drops file in System32 directory
PID:1960 -
C:\Windows\SysWOW64\axs.exeC:\Windows\system32\axs.exe 1432 "C:\Windows\SysWOW64\qvd.exe"72⤵PID:32
-
C:\Windows\SysWOW64\nsk.exeC:\Windows\system32\nsk.exe 1416 "C:\Windows\SysWOW64\axs.exe"73⤵PID:5084
-
C:\Windows\SysWOW64\ajf.exeC:\Windows\system32\ajf.exe 1436 "C:\Windows\SysWOW64\nsk.exe"74⤵PID:4324
-
C:\Windows\SysWOW64\nsl.exeC:\Windows\system32\nsl.exe 1140 "C:\Windows\SysWOW64\ajf.exe"75⤵
- System Location Discovery: System Language Discovery
PID:3288 -
C:\Windows\SysWOW64\ajg.exeC:\Windows\system32\ajg.exe 1372 "C:\Windows\SysWOW64\nsl.exe"76⤵PID:3504
-
C:\Windows\SysWOW64\kqs.exeC:\Windows\system32\kqs.exe 1452 "C:\Windows\SysWOW64\ajg.exe"77⤵PID:3468
-
C:\Windows\SysWOW64\xdj.exeC:\Windows\system32\xdj.exe 1292 "C:\Windows\SysWOW64\kqs.exe"78⤵PID:3400
-
C:\Windows\SysWOW64\lqt.exeC:\Windows\system32\lqt.exe 1456 "C:\Windows\SysWOW64\xdj.exe"79⤵
- Drops file in System32 directory
PID:3412 -
C:\Windows\SysWOW64\uti.exeC:\Windows\system32\uti.exe 1464 "C:\Windows\SysWOW64\lqt.exe"80⤵PID:4164
-
C:\Windows\SysWOW64\ioa.exeC:\Windows\system32\ioa.exe 1468 "C:\Windows\SysWOW64\uti.exe"81⤵PID:880
-
C:\Windows\SysWOW64\vbr.exeC:\Windows\system32\vbr.exe 1476 "C:\Windows\SysWOW64\ioa.exe"82⤵
- System Location Discovery: System Language Discovery
PID:1240 -
C:\Windows\SysWOW64\iob.exeC:\Windows\system32\iob.exe 1460 "C:\Windows\SysWOW64\vbr.exe"83⤵
- Drops file in System32 directory
PID:4924 -
C:\Windows\SysWOW64\vew.exeC:\Windows\system32\vew.exe 1480 "C:\Windows\SysWOW64\iob.exe"84⤵
- Drops file in System32 directory
PID:728 -
C:\Windows\SysWOW64\fli.exeC:\Windows\system32\fli.exe 1472 "C:\Windows\SysWOW64\vew.exe"85⤵
- System Location Discovery: System Language Discovery
PID:4884 -
C:\Windows\SysWOW64\syr.exeC:\Windows\system32\syr.exe 1484 "C:\Windows\SysWOW64\fli.exe"86⤵
- Drops file in System32 directory
PID:208 -
C:\Windows\SysWOW64\flj.exeC:\Windows\system32\flj.exe 1492 "C:\Windows\SysWOW64\syr.exe"87⤵PID:1264
-
C:\Windows\SysWOW64\poy.exeC:\Windows\system32\poy.exe 1488 "C:\Windows\SysWOW64\flj.exe"88⤵PID:1772
-
C:\Windows\SysWOW64\cjq.exeC:\Windows\system32\cjq.exe 1500 "C:\Windows\SysWOW64\poy.exe"89⤵PID:4192
-
C:\Windows\SysWOW64\qwz.exeC:\Windows\system32\qwz.exe 1504 "C:\Windows\SysWOW64\cjq.exe"90⤵PID:4868
-
C:\Windows\SysWOW64\djr.exeC:\Windows\system32\djr.exe 1508 "C:\Windows\SysWOW64\qwz.exe"91⤵
- System Location Discovery: System Language Discovery
PID:1680 -
C:\Windows\SysWOW64\nlg.exeC:\Windows\system32\nlg.exe 1496 "C:\Windows\SysWOW64\djr.exe"92⤵PID:3104
-
C:\Windows\SysWOW64\zkj.exeC:\Windows\system32\zkj.exe 1520 "C:\Windows\SysWOW64\nlg.exe"93⤵PID:2936
-
C:\Windows\SysWOW64\nth.exeC:\Windows\system32\nth.exe 1516 "C:\Windows\SysWOW64\zkj.exe"94⤵PID:3020
-
C:\Windows\SysWOW64\agz.exeC:\Windows\system32\agz.exe 1524 "C:\Windows\SysWOW64\nth.exe"95⤵PID:3224
-
C:\Windows\SysWOW64\kjo.exeC:\Windows\system32\kjo.exe 1512 "C:\Windows\SysWOW64\agz.exe"96⤵PID:2768
-
C:\Windows\SysWOW64\xwg.exeC:\Windows\system32\xwg.exe 1536 "C:\Windows\SysWOW64\kjo.exe"97⤵PID:3828
-
C:\Windows\SysWOW64\krq.exeC:\Windows\system32\krq.exe 1528 "C:\Windows\SysWOW64\xwg.exe"98⤵PID:3852
-
C:\Windows\SysWOW64\xhs.exeC:\Windows\system32\xhs.exe 1540 "C:\Windows\SysWOW64\krq.exe"99⤵PID:2560
-
C:\Windows\SysWOW64\hgw.exeC:\Windows\system32\hgw.exe 1532 "C:\Windows\SysWOW64\xhs.exe"100⤵
- Drops file in System32 directory
PID:1412 -
C:\Windows\SysWOW64\ufr.exeC:\Windows\system32\ufr.exe 1552 "C:\Windows\SysWOW64\hgw.exe"101⤵PID:4472
-
C:\Windows\SysWOW64\ioy.exeC:\Windows\system32\ioy.exe 1548 "C:\Windows\SysWOW64\ufr.exe"102⤵PID:692
-
C:\Windows\SysWOW64\vbp.exeC:\Windows\system32\vbp.exe 1544 "C:\Windows\SysWOW64\ioy.exe"103⤵PID:436
-
C:\Windows\SysWOW64\xee.exeC:\Windows\system32\xee.exe 1560 "C:\Windows\SysWOW64\vbp.exe"104⤵
- Drops file in System32 directory
PID:1084 -
C:\Windows\SysWOW64\krw.exeC:\Windows\system32\krw.exe 1564 "C:\Windows\SysWOW64\xee.exe"105⤵PID:2860
-
C:\Windows\SysWOW64\xmg.exeC:\Windows\system32\xmg.exe 1572 "C:\Windows\SysWOW64\krw.exe"106⤵PID:2028
-
C:\Windows\SysWOW64\kzx.exeC:\Windows\system32\kzx.exe 1556 "C:\Windows\SysWOW64\xmg.exe"107⤵PID:4656
-
C:\Windows\SysWOW64\ucm.exeC:\Windows\system32\ucm.exe 1580 "C:\Windows\SysWOW64\kzx.exe"108⤵PID:3964
-
C:\Windows\SysWOW64\hpe.exeC:\Windows\system32\hpe.exe 1576 "C:\Windows\SysWOW64\ucm.exe"109⤵PID:1048
-
C:\Windows\SysWOW64\unz.exeC:\Windows\system32\unz.exe 1584 "C:\Windows\SysWOW64\hpe.exe"110⤵PID:3100
-
C:\Windows\SysWOW64\haq.exeC:\Windows\system32\haq.exe 1444 "C:\Windows\SysWOW64\unz.exe"111⤵PID:1384
-
C:\Windows\SysWOW64\rzv.exeC:\Windows\system32\rzv.exe 1596 "C:\Windows\SysWOW64\haq.exe"112⤵PID:852
-
C:\Windows\SysWOW64\fmm.exeC:\Windows\system32\fmm.exe 1588 "C:\Windows\SysWOW64\rzv.exe"113⤵PID:1496
-
C:\Windows\SysWOW64\shw.exeC:\Windows\system32\shw.exe 1600 "C:\Windows\SysWOW64\fmm.exe"114⤵PID:1860
-
C:\Windows\SysWOW64\fun.exeC:\Windows\system32\fun.exe 1604 "C:\Windows\SysWOW64\shw.exe"115⤵PID:988
-
C:\Windows\SysWOW64\pxd.exeC:\Windows\system32\pxd.exe 1608 "C:\Windows\SysWOW64\fun.exe"116⤵PID:3788
-
C:\Windows\SysWOW64\cvx.exeC:\Windows\system32\cvx.exe 1592 "C:\Windows\SysWOW64\pxd.exe"117⤵PID:2772
-
C:\Windows\SysWOW64\pfe.exeC:\Windows\system32\pfe.exe 1616 "C:\Windows\SysWOW64\cvx.exe"118⤵PID:4844
-
C:\Windows\SysWOW64\cvg.exeC:\Windows\system32\cvg.exe 1620 "C:\Windows\SysWOW64\pfe.exe"119⤵PID:1544
-
C:\Windows\SysWOW64\mul.exeC:\Windows\system32\mul.exe 1624 "C:\Windows\SysWOW64\cvg.exe"120⤵PID:3624
-
C:\Windows\SysWOW64\zhc.exeC:\Windows\system32\zhc.exe 1628 "C:\Windows\SysWOW64\mul.exe"121⤵PID:5072
-
C:\Windows\SysWOW64\ncm.exeC:\Windows\system32\ncm.exe 1632 "C:\Windows\SysWOW64\zhc.exe"122⤵PID:3192
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-