Analysis
-
max time kernel
151s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 08:39
Behavioral task
behavioral1
Sample
8eb51453e5724beaf5a5bab97e9400e0.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8eb51453e5724beaf5a5bab97e9400e0.exe
Resource
win10v2004-20231215-en
General
-
Target
8eb51453e5724beaf5a5bab97e9400e0.exe
-
Size
548KB
-
MD5
8eb51453e5724beaf5a5bab97e9400e0
-
SHA1
72d90a97f01c3d5e5dfcc11e3b52906d21d2dbb4
-
SHA256
e5ad5c7d17ccaa01d2c66ca5f2858dee8b856b8dfb669b7bb43840d335eedf55
-
SHA512
91bf3ea6349fcff30beed223e4866939a4d473bd7b1e735bd46d294fd325a7207d6fbca42bc1a5bbdda891f99adc1214d8530baacc2a23ab703b331d5e04efc5
-
SSDEEP
12288:B4txmnt1LhUr9lCXnVwFpBoSpWAJFZ4CIV:1LhUr9EXVsOAHZRIV
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings 2 TTPs 40 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation wmpkj3.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation wmpkj3.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation wmpkj3.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation wmpkj3.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation wmpkj3.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation wmpkj3.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation wmpkj3.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation wmpkj3.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation wmpkj3.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation wmpkj3.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation wmpkj3.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation wmpkj3.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation wmpkj3.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation wmpkj3.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation wmpkj3.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation wmpkj3.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation wmpkj3.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation wmpkj3.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation wmpkj3.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation wmpkj3.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation wmpkj3.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation wmpkj3.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation wmpkj3.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation wmpkj3.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation wmpkj3.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation wmpkj3.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation wmpkj3.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation wmpkj3.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation wmpkj3.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation wmpkj3.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation wmpkj3.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation wmpkj3.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation wmpkj3.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation wmpkj3.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation wmpkj3.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation wmpkj3.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation wmpkj3.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation wmpkj3.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 8eb51453e5724beaf5a5bab97e9400e0.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation wmpkj3.exe -
Deletes itself 1 IoCs
pid Process 4288 wmpkj3.exe -
Executes dropped EXE 40 IoCs
pid Process 4288 wmpkj3.exe 3496 wmpkj3.exe 1592 wmpkj3.exe 2552 wmpkj3.exe 2108 wmpkj3.exe 632 wmpkj3.exe 3748 wmpkj3.exe 1680 wmpkj3.exe 1576 wmpkj3.exe 2416 wmpkj3.exe 1504 wmpkj3.exe 5020 wmpkj3.exe 4388 wmpkj3.exe 2188 wmpkj3.exe 2532 wmpkj3.exe 1704 wmpkj3.exe 4256 wmpkj3.exe 2236 wmpkj3.exe 5072 wmpkj3.exe 3440 wmpkj3.exe 2068 wmpkj3.exe 4840 wmpkj3.exe 4464 wmpkj3.exe 3692 wmpkj3.exe 820 wmpkj3.exe 1568 wmpkj3.exe 1956 wmpkj3.exe 4968 wmpkj3.exe 2272 wmpkj3.exe 1192 wmpkj3.exe 3156 wmpkj3.exe 2936 wmpkj3.exe 2660 wmpkj3.exe 2284 wmpkj3.exe 744 wmpkj3.exe 4156 wmpkj3.exe 3724 wmpkj3.exe 2752 wmpkj3.exe 772 wmpkj3.exe 1760 wmpkj3.exe -
resource yara_rule behavioral2/memory/324-0-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/files/0x0007000000023107-5.dat upx behavioral2/memory/324-34-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/3496-36-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/4288-37-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/3496-39-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/2552-43-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/1592-42-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/2552-45-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/2108-46-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/2108-48-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/632-49-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/632-51-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/3748-53-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/1576-55-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/1680-56-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/1576-59-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/2416-60-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/2416-63-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/1504-62-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/1504-65-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/5020-68-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/4388-67-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/4388-70-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/2532-72-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/2188-73-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/2532-75-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/1704-77-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/4256-79-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/5072-81-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/2236-82-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/5072-84-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/2068-86-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/3440-87-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/2068-89-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/4840-91-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/4464-94-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/820-96-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/3692-97-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/1568-100-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/820-101-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/1568-104-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/1956-103-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/1956-107-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/4968-106-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/2272-110-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/4968-109-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/2272-112-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/1192-113-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/1192-115-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/3156-116-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/3156-118-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/2936-120-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/2660-121-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/2660-123-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/2284-124-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/744-125-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/3724-126-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/2752-127-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/772-128-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/772-129-0x0000000000400000-0x000000000048A000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpkj3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpkj3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpkj3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpkj3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpkj3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpkj3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpkj3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpkj3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpkj3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpkj3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpkj3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpkj3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpkj3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpkj3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpkj3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpkj3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpkj3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpkj3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpkj3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpkj3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpkj3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpkj3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpkj3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpkj3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpkj3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpkj3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpkj3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpkj3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpkj3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpkj3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpkj3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpkj3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpkj3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpkj3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpkj3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 8eb51453e5724beaf5a5bab97e9400e0.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 8eb51453e5724beaf5a5bab97e9400e0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpkj3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpkj3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpkj3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpkj3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpkj3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpkj3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpkj3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpkj3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpkj3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpkj3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpkj3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpkj3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpkj3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpkj3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpkj3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpkj3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpkj3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpkj3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpkj3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpkj3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpkj3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpkj3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpkj3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpkj3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpkj3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpkj3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpkj3.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File opened for modification C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File created C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File created C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File opened for modification C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File opened for modification C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File created C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File opened for modification C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File opened for modification C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File created C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File opened for modification C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File created C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File created C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File created C:\Windows\SysWOW64\wmpkj3.exe 8eb51453e5724beaf5a5bab97e9400e0.exe File created C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File opened for modification C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File opened for modification C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File created C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File opened for modification C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File created C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File created C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File created C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File opened for modification C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File opened for modification C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File opened for modification C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File opened for modification C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File created C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File opened for modification C:\Windows\SysWOW64\wmpkj3.exe 8eb51453e5724beaf5a5bab97e9400e0.exe File opened for modification C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File opened for modification C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File created C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File opened for modification C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File created C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File created C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File opened for modification C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File created C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File opened for modification C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File opened for modification C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File opened for modification C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File opened for modification C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File opened for modification C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File created C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File created C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File opened for modification C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File opened for modification C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File created C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File opened for modification C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File created C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File created C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File created C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File opened for modification C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File created C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File created C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File created C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File created C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File created C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File created C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File created C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File created C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File created C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File created C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File opened for modification C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File opened for modification C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe File opened for modification C:\Windows\SysWOW64\wmpkj3.exe wmpkj3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpkj3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpkj3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpkj3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpkj3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpkj3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 8eb51453e5724beaf5a5bab97e9400e0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpkj3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpkj3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpkj3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpkj3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpkj3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpkj3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpkj3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpkj3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpkj3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpkj3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpkj3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpkj3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpkj3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpkj3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpkj3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpkj3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpkj3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpkj3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpkj3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpkj3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpkj3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpkj3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpkj3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpkj3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpkj3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpkj3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpkj3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpkj3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpkj3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpkj3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpkj3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpkj3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpkj3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpkj3.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 324 8eb51453e5724beaf5a5bab97e9400e0.exe 324 8eb51453e5724beaf5a5bab97e9400e0.exe 4288 wmpkj3.exe 4288 wmpkj3.exe 3496 wmpkj3.exe 3496 wmpkj3.exe 1592 wmpkj3.exe 1592 wmpkj3.exe 2552 wmpkj3.exe 2552 wmpkj3.exe 2108 wmpkj3.exe 2108 wmpkj3.exe 632 wmpkj3.exe 632 wmpkj3.exe 3748 wmpkj3.exe 3748 wmpkj3.exe 1680 wmpkj3.exe 1680 wmpkj3.exe 1576 wmpkj3.exe 1576 wmpkj3.exe 2416 wmpkj3.exe 2416 wmpkj3.exe 1504 wmpkj3.exe 1504 wmpkj3.exe 5020 wmpkj3.exe 5020 wmpkj3.exe 4388 wmpkj3.exe 4388 wmpkj3.exe 2188 wmpkj3.exe 2188 wmpkj3.exe 2532 wmpkj3.exe 2532 wmpkj3.exe 1704 wmpkj3.exe 1704 wmpkj3.exe 4256 wmpkj3.exe 4256 wmpkj3.exe 2236 wmpkj3.exe 2236 wmpkj3.exe 5072 wmpkj3.exe 5072 wmpkj3.exe 3440 wmpkj3.exe 3440 wmpkj3.exe 2068 wmpkj3.exe 2068 wmpkj3.exe 4840 wmpkj3.exe 4840 wmpkj3.exe 4464 wmpkj3.exe 4464 wmpkj3.exe 3692 wmpkj3.exe 3692 wmpkj3.exe 820 wmpkj3.exe 820 wmpkj3.exe 1568 wmpkj3.exe 1568 wmpkj3.exe 1956 wmpkj3.exe 1956 wmpkj3.exe 4968 wmpkj3.exe 4968 wmpkj3.exe 2272 wmpkj3.exe 2272 wmpkj3.exe 1192 wmpkj3.exe 1192 wmpkj3.exe 3156 wmpkj3.exe 3156 wmpkj3.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 324 wrote to memory of 4288 324 8eb51453e5724beaf5a5bab97e9400e0.exe 82 PID 324 wrote to memory of 4288 324 8eb51453e5724beaf5a5bab97e9400e0.exe 82 PID 324 wrote to memory of 4288 324 8eb51453e5724beaf5a5bab97e9400e0.exe 82 PID 4288 wrote to memory of 3496 4288 wmpkj3.exe 86 PID 4288 wrote to memory of 3496 4288 wmpkj3.exe 86 PID 4288 wrote to memory of 3496 4288 wmpkj3.exe 86 PID 3496 wrote to memory of 1592 3496 wmpkj3.exe 89 PID 3496 wrote to memory of 1592 3496 wmpkj3.exe 89 PID 3496 wrote to memory of 1592 3496 wmpkj3.exe 89 PID 1592 wrote to memory of 2552 1592 wmpkj3.exe 92 PID 1592 wrote to memory of 2552 1592 wmpkj3.exe 92 PID 1592 wrote to memory of 2552 1592 wmpkj3.exe 92 PID 2552 wrote to memory of 2108 2552 wmpkj3.exe 93 PID 2552 wrote to memory of 2108 2552 wmpkj3.exe 93 PID 2552 wrote to memory of 2108 2552 wmpkj3.exe 93 PID 2108 wrote to memory of 632 2108 wmpkj3.exe 94 PID 2108 wrote to memory of 632 2108 wmpkj3.exe 94 PID 2108 wrote to memory of 632 2108 wmpkj3.exe 94 PID 632 wrote to memory of 3748 632 wmpkj3.exe 95 PID 632 wrote to memory of 3748 632 wmpkj3.exe 95 PID 632 wrote to memory of 3748 632 wmpkj3.exe 95 PID 3748 wrote to memory of 1680 3748 wmpkj3.exe 97 PID 3748 wrote to memory of 1680 3748 wmpkj3.exe 97 PID 3748 wrote to memory of 1680 3748 wmpkj3.exe 97 PID 1680 wrote to memory of 1576 1680 wmpkj3.exe 98 PID 1680 wrote to memory of 1576 1680 wmpkj3.exe 98 PID 1680 wrote to memory of 1576 1680 wmpkj3.exe 98 PID 1576 wrote to memory of 2416 1576 wmpkj3.exe 99 PID 1576 wrote to memory of 2416 1576 wmpkj3.exe 99 PID 1576 wrote to memory of 2416 1576 wmpkj3.exe 99 PID 2416 wrote to memory of 1504 2416 wmpkj3.exe 100 PID 2416 wrote to memory of 1504 2416 wmpkj3.exe 100 PID 2416 wrote to memory of 1504 2416 wmpkj3.exe 100 PID 1504 wrote to memory of 5020 1504 wmpkj3.exe 101 PID 1504 wrote to memory of 5020 1504 wmpkj3.exe 101 PID 1504 wrote to memory of 5020 1504 wmpkj3.exe 101 PID 5020 wrote to memory of 4388 5020 wmpkj3.exe 102 PID 5020 wrote to memory of 4388 5020 wmpkj3.exe 102 PID 5020 wrote to memory of 4388 5020 wmpkj3.exe 102 PID 4388 wrote to memory of 2188 4388 wmpkj3.exe 103 PID 4388 wrote to memory of 2188 4388 wmpkj3.exe 103 PID 4388 wrote to memory of 2188 4388 wmpkj3.exe 103 PID 2188 wrote to memory of 2532 2188 wmpkj3.exe 104 PID 2188 wrote to memory of 2532 2188 wmpkj3.exe 104 PID 2188 wrote to memory of 2532 2188 wmpkj3.exe 104 PID 2532 wrote to memory of 1704 2532 wmpkj3.exe 105 PID 2532 wrote to memory of 1704 2532 wmpkj3.exe 105 PID 2532 wrote to memory of 1704 2532 wmpkj3.exe 105 PID 1704 wrote to memory of 4256 1704 wmpkj3.exe 106 PID 1704 wrote to memory of 4256 1704 wmpkj3.exe 106 PID 1704 wrote to memory of 4256 1704 wmpkj3.exe 106 PID 4256 wrote to memory of 2236 4256 wmpkj3.exe 107 PID 4256 wrote to memory of 2236 4256 wmpkj3.exe 107 PID 4256 wrote to memory of 2236 4256 wmpkj3.exe 107 PID 2236 wrote to memory of 5072 2236 wmpkj3.exe 108 PID 2236 wrote to memory of 5072 2236 wmpkj3.exe 108 PID 2236 wrote to memory of 5072 2236 wmpkj3.exe 108 PID 5072 wrote to memory of 3440 5072 wmpkj3.exe 109 PID 5072 wrote to memory of 3440 5072 wmpkj3.exe 109 PID 5072 wrote to memory of 3440 5072 wmpkj3.exe 109 PID 3440 wrote to memory of 2068 3440 wmpkj3.exe 110 PID 3440 wrote to memory of 2068 3440 wmpkj3.exe 110 PID 3440 wrote to memory of 2068 3440 wmpkj3.exe 110 PID 2068 wrote to memory of 4840 2068 wmpkj3.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\8eb51453e5724beaf5a5bab97e9400e0.exe"C:\Users\Admin\AppData\Local\Temp\8eb51453e5724beaf5a5bab97e9400e0.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Windows\SysWOW64\wmpkj3.exe"C:\Windows\system32\wmpkj3.exe" C:\Users\Admin\AppData\Local\Temp\8EB514~1.EXE2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\SysWOW64\wmpkj3.exe"C:\Windows\system32\wmpkj3.exe" C:\Windows\SysWOW64\wmpkj3.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\SysWOW64\wmpkj3.exe"C:\Windows\system32\wmpkj3.exe" C:\Windows\SysWOW64\wmpkj3.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\wmpkj3.exe"C:\Windows\system32\wmpkj3.exe" C:\Windows\SysWOW64\wmpkj3.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\wmpkj3.exe"C:\Windows\system32\wmpkj3.exe" C:\Windows\SysWOW64\wmpkj3.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\wmpkj3.exe"C:\Windows\system32\wmpkj3.exe" C:\Windows\SysWOW64\wmpkj3.exe7⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\SysWOW64\wmpkj3.exe"C:\Windows\system32\wmpkj3.exe" C:\Windows\SysWOW64\wmpkj3.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\SysWOW64\wmpkj3.exe"C:\Windows\system32\wmpkj3.exe" C:\Windows\SysWOW64\wmpkj3.exe9⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\wmpkj3.exe"C:\Windows\system32\wmpkj3.exe" C:\Windows\SysWOW64\wmpkj3.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\wmpkj3.exe"C:\Windows\system32\wmpkj3.exe" C:\Windows\SysWOW64\wmpkj3.exe11⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\wmpkj3.exe"C:\Windows\system32\wmpkj3.exe" C:\Windows\SysWOW64\wmpkj3.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\wmpkj3.exe"C:\Windows\system32\wmpkj3.exe" C:\Windows\SysWOW64\wmpkj3.exe13⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\wmpkj3.exe"C:\Windows\system32\wmpkj3.exe" C:\Windows\SysWOW64\wmpkj3.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\SysWOW64\wmpkj3.exe"C:\Windows\system32\wmpkj3.exe" C:\Windows\SysWOW64\wmpkj3.exe15⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\wmpkj3.exe"C:\Windows\system32\wmpkj3.exe" C:\Windows\SysWOW64\wmpkj3.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\wmpkj3.exe"C:\Windows\system32\wmpkj3.exe" C:\Windows\SysWOW64\wmpkj3.exe17⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\wmpkj3.exe"C:\Windows\system32\wmpkj3.exe" C:\Windows\SysWOW64\wmpkj3.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Windows\SysWOW64\wmpkj3.exe"C:\Windows\system32\wmpkj3.exe" C:\Windows\SysWOW64\wmpkj3.exe19⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\wmpkj3.exe"C:\Windows\system32\wmpkj3.exe" C:\Windows\SysWOW64\wmpkj3.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\SysWOW64\wmpkj3.exe"C:\Windows\system32\wmpkj3.exe" C:\Windows\SysWOW64\wmpkj3.exe21⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Windows\SysWOW64\wmpkj3.exe"C:\Windows\system32\wmpkj3.exe" C:\Windows\SysWOW64\wmpkj3.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\wmpkj3.exe"C:\Windows\system32\wmpkj3.exe" C:\Windows\SysWOW64\wmpkj3.exe23⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4840 -
C:\Windows\SysWOW64\wmpkj3.exe"C:\Windows\system32\wmpkj3.exe" C:\Windows\SysWOW64\wmpkj3.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4464 -
C:\Windows\SysWOW64\wmpkj3.exe"C:\Windows\system32\wmpkj3.exe" C:\Windows\SysWOW64\wmpkj3.exe25⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3692 -
C:\Windows\SysWOW64\wmpkj3.exe"C:\Windows\system32\wmpkj3.exe" C:\Windows\SysWOW64\wmpkj3.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:820 -
C:\Windows\SysWOW64\wmpkj3.exe"C:\Windows\system32\wmpkj3.exe" C:\Windows\SysWOW64\wmpkj3.exe27⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1568 -
C:\Windows\SysWOW64\wmpkj3.exe"C:\Windows\system32\wmpkj3.exe" C:\Windows\SysWOW64\wmpkj3.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1956 -
C:\Windows\SysWOW64\wmpkj3.exe"C:\Windows\system32\wmpkj3.exe" C:\Windows\SysWOW64\wmpkj3.exe29⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4968 -
C:\Windows\SysWOW64\wmpkj3.exe"C:\Windows\system32\wmpkj3.exe" C:\Windows\SysWOW64\wmpkj3.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2272 -
C:\Windows\SysWOW64\wmpkj3.exe"C:\Windows\system32\wmpkj3.exe" C:\Windows\SysWOW64\wmpkj3.exe31⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1192 -
C:\Windows\SysWOW64\wmpkj3.exe"C:\Windows\system32\wmpkj3.exe" C:\Windows\SysWOW64\wmpkj3.exe32⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3156 -
C:\Windows\SysWOW64\wmpkj3.exe"C:\Windows\system32\wmpkj3.exe" C:\Windows\SysWOW64\wmpkj3.exe33⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:2936 -
C:\Windows\SysWOW64\wmpkj3.exe"C:\Windows\system32\wmpkj3.exe" C:\Windows\SysWOW64\wmpkj3.exe34⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:2660 -
C:\Windows\SysWOW64\wmpkj3.exe"C:\Windows\system32\wmpkj3.exe" C:\Windows\SysWOW64\wmpkj3.exe35⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:2284 -
C:\Windows\SysWOW64\wmpkj3.exe"C:\Windows\system32\wmpkj3.exe" C:\Windows\SysWOW64\wmpkj3.exe36⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:744 -
C:\Windows\SysWOW64\wmpkj3.exe"C:\Windows\system32\wmpkj3.exe" C:\Windows\SysWOW64\wmpkj3.exe37⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:4156 -
C:\Windows\SysWOW64\wmpkj3.exe"C:\Windows\system32\wmpkj3.exe" C:\Windows\SysWOW64\wmpkj3.exe38⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:3724 -
C:\Windows\SysWOW64\wmpkj3.exe"C:\Windows\system32\wmpkj3.exe" C:\Windows\SysWOW64\wmpkj3.exe39⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:2752 -
C:\Windows\SysWOW64\wmpkj3.exe"C:\Windows\system32\wmpkj3.exe" C:\Windows\SysWOW64\wmpkj3.exe40⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:772 -
C:\Windows\SysWOW64\wmpkj3.exe"C:\Windows\system32\wmpkj3.exe" C:\Windows\SysWOW64\wmpkj3.exe41⤵
- Executes dropped EXE
- Maps connected drives based on registry
PID:1760
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
548KB
MD58eb51453e5724beaf5a5bab97e9400e0
SHA172d90a97f01c3d5e5dfcc11e3b52906d21d2dbb4
SHA256e5ad5c7d17ccaa01d2c66ca5f2858dee8b856b8dfb669b7bb43840d335eedf55
SHA51291bf3ea6349fcff30beed223e4866939a4d473bd7b1e735bd46d294fd325a7207d6fbca42bc1a5bbdda891f99adc1214d8530baacc2a23ab703b331d5e04efc5