Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/02/2024, 08:33
Static task
static1
Behavioral task
behavioral1
Sample
Picture42.JPG_www.facebook.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Picture42.JPG_www.facebook.exe
Resource
win10v2004-20240226-en
General
-
Target
Picture42.JPG_www.facebook.exe
-
Size
151KB
-
MD5
3bb29b4fa89ba0623b2668c44fc545dd
-
SHA1
ce273211fa397c88e6af808b0ab20d77f33861c7
-
SHA256
af34aa041818cb31b37c636e019ca464044e2fefacfb6da0abefba856abbbc6d
-
SHA512
5c418b4dc0d19f6df33bfef4ff8a9eeafd83e44eff12dd6304f848a36c9dbe5c689c65b94cc04433828b6dc6d10ea838888018be2274e26496470ac64537d6d0
-
SSDEEP
3072:1YXlOvh+trjeCUwV3ZC3Tfbv4OyWrHXBUtLBf:1kjetiZK3vXLX6LBf
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2604 wmpdlr32.exe -
Executes dropped EXE 30 IoCs
pid Process 2652 wmpdlr32.exe 2604 wmpdlr32.exe 2944 wmpdlr32.exe 2712 wmpdlr32.exe 2752 wmpdlr32.exe 2776 wmpdlr32.exe 1672 wmpdlr32.exe 2416 wmpdlr32.exe 1356 wmpdlr32.exe 2032 wmpdlr32.exe 2348 wmpdlr32.exe 844 wmpdlr32.exe 2884 wmpdlr32.exe 1664 wmpdlr32.exe 980 wmpdlr32.exe 556 wmpdlr32.exe 2100 wmpdlr32.exe 1224 wmpdlr32.exe 3004 wmpdlr32.exe 2644 wmpdlr32.exe 2232 wmpdlr32.exe 2476 wmpdlr32.exe 1876 wmpdlr32.exe 1924 wmpdlr32.exe 2692 wmpdlr32.exe 2548 wmpdlr32.exe 2836 wmpdlr32.exe 1624 wmpdlr32.exe 1064 wmpdlr32.exe 2924 wmpdlr32.exe -
Loads dropped DLL 60 IoCs
pid Process 2372 Picture42.JPG_www.facebook.exe 2372 Picture42.JPG_www.facebook.exe 2652 wmpdlr32.exe 2652 wmpdlr32.exe 2604 wmpdlr32.exe 2604 wmpdlr32.exe 2944 wmpdlr32.exe 2944 wmpdlr32.exe 2712 wmpdlr32.exe 2712 wmpdlr32.exe 2752 wmpdlr32.exe 2752 wmpdlr32.exe 2776 wmpdlr32.exe 2776 wmpdlr32.exe 1672 wmpdlr32.exe 1672 wmpdlr32.exe 2416 wmpdlr32.exe 2416 wmpdlr32.exe 1356 wmpdlr32.exe 1356 wmpdlr32.exe 2032 wmpdlr32.exe 2032 wmpdlr32.exe 2348 wmpdlr32.exe 2348 wmpdlr32.exe 844 wmpdlr32.exe 844 wmpdlr32.exe 2884 wmpdlr32.exe 2884 wmpdlr32.exe 1664 wmpdlr32.exe 1664 wmpdlr32.exe 980 wmpdlr32.exe 980 wmpdlr32.exe 556 wmpdlr32.exe 556 wmpdlr32.exe 2100 wmpdlr32.exe 2100 wmpdlr32.exe 1224 wmpdlr32.exe 1224 wmpdlr32.exe 3004 wmpdlr32.exe 3004 wmpdlr32.exe 2644 wmpdlr32.exe 2644 wmpdlr32.exe 2232 wmpdlr32.exe 2232 wmpdlr32.exe 2476 wmpdlr32.exe 2476 wmpdlr32.exe 1876 wmpdlr32.exe 1876 wmpdlr32.exe 1924 wmpdlr32.exe 1924 wmpdlr32.exe 2692 wmpdlr32.exe 2692 wmpdlr32.exe 2548 wmpdlr32.exe 2548 wmpdlr32.exe 2836 wmpdlr32.exe 2836 wmpdlr32.exe 1624 wmpdlr32.exe 1624 wmpdlr32.exe 1064 wmpdlr32.exe 1064 wmpdlr32.exe -
resource yara_rule behavioral1/memory/2372-2-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2372-3-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2372-4-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2372-6-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2372-7-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2372-8-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2372-29-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2372-33-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2604-47-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2604-50-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2712-65-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2712-67-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2776-88-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2416-107-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2032-125-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/844-144-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1664-161-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/556-183-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1224-195-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2644-211-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1924-223-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2476-224-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1924-239-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2548-251-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1624-263-0x0000000000400000-0x0000000000456000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 32 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdlr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdlr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdlr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdlr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdlr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdlr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdlr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdlr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdlr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 Picture42.JPG_www.facebook.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdlr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdlr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdlr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdlr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdlr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdlr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Picture42.JPG_www.facebook.exe -
Drops file in System32 directory 45 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ Picture42.JPG_www.facebook.exe File created C:\Windows\SysWOW64\wmpdlr32.exe wmpdlr32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlr32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlr32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlr32.exe File created C:\Windows\SysWOW64\wmpdlr32.exe wmpdlr32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlr32.exe File opened for modification C:\Windows\SysWOW64\wmpdlr32.exe wmpdlr32.exe File opened for modification C:\Windows\SysWOW64\wmpdlr32.exe Picture42.JPG_www.facebook.exe File opened for modification C:\Windows\SysWOW64\wmpdlr32.exe wmpdlr32.exe File created C:\Windows\SysWOW64\wmpdlr32.exe wmpdlr32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlr32.exe File created C:\Windows\SysWOW64\wmpdlr32.exe wmpdlr32.exe File opened for modification C:\Windows\SysWOW64\wmpdlr32.exe wmpdlr32.exe File opened for modification C:\Windows\SysWOW64\wmpdlr32.exe wmpdlr32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlr32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlr32.exe File created C:\Windows\SysWOW64\wmpdlr32.exe wmpdlr32.exe File created C:\Windows\SysWOW64\wmpdlr32.exe Picture42.JPG_www.facebook.exe File created C:\Windows\SysWOW64\wmpdlr32.exe wmpdlr32.exe File opened for modification C:\Windows\SysWOW64\wmpdlr32.exe wmpdlr32.exe File created C:\Windows\SysWOW64\wmpdlr32.exe wmpdlr32.exe File opened for modification C:\Windows\SysWOW64\wmpdlr32.exe wmpdlr32.exe File created C:\Windows\SysWOW64\wmpdlr32.exe wmpdlr32.exe File created C:\Windows\SysWOW64\wmpdlr32.exe wmpdlr32.exe File opened for modification C:\Windows\SysWOW64\wmpdlr32.exe wmpdlr32.exe File opened for modification C:\Windows\SysWOW64\wmpdlr32.exe wmpdlr32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlr32.exe File opened for modification C:\Windows\SysWOW64\wmpdlr32.exe wmpdlr32.exe File opened for modification C:\Windows\SysWOW64\wmpdlr32.exe wmpdlr32.exe File created C:\Windows\SysWOW64\wmpdlr32.exe wmpdlr32.exe File opened for modification C:\Windows\SysWOW64\wmpdlr32.exe wmpdlr32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlr32.exe File created C:\Windows\SysWOW64\wmpdlr32.exe wmpdlr32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlr32.exe File opened for modification C:\Windows\SysWOW64\wmpdlr32.exe wmpdlr32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlr32.exe File opened for modification C:\Windows\SysWOW64\wmpdlr32.exe wmpdlr32.exe File created C:\Windows\SysWOW64\wmpdlr32.exe wmpdlr32.exe File created C:\Windows\SysWOW64\wmpdlr32.exe wmpdlr32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlr32.exe File created C:\Windows\SysWOW64\wmpdlr32.exe wmpdlr32.exe File opened for modification C:\Windows\SysWOW64\wmpdlr32.exe wmpdlr32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlr32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlr32.exe -
Suspicious use of SetThreadContext 16 IoCs
description pid Process procid_target PID 2020 set thread context of 2372 2020 Picture42.JPG_www.facebook.exe 28 PID 2652 set thread context of 2604 2652 wmpdlr32.exe 30 PID 2944 set thread context of 2712 2944 wmpdlr32.exe 32 PID 2752 set thread context of 2776 2752 wmpdlr32.exe 34 PID 1672 set thread context of 2416 1672 wmpdlr32.exe 38 PID 1356 set thread context of 2032 1356 wmpdlr32.exe 40 PID 2348 set thread context of 844 2348 wmpdlr32.exe 42 PID 2884 set thread context of 1664 2884 wmpdlr32.exe 44 PID 980 set thread context of 556 980 wmpdlr32.exe 46 PID 2100 set thread context of 1224 2100 wmpdlr32.exe 48 PID 3004 set thread context of 2644 3004 wmpdlr32.exe 50 PID 2232 set thread context of 2476 2232 wmpdlr32.exe 52 PID 1876 set thread context of 1924 1876 wmpdlr32.exe 54 PID 2692 set thread context of 2548 2692 wmpdlr32.exe 56 PID 2836 set thread context of 1624 2836 wmpdlr32.exe 58 PID 1064 set thread context of 2924 1064 wmpdlr32.exe 60 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2372 Picture42.JPG_www.facebook.exe 2372 Picture42.JPG_www.facebook.exe 2604 wmpdlr32.exe 2604 wmpdlr32.exe 2712 wmpdlr32.exe 2712 wmpdlr32.exe 2776 wmpdlr32.exe 2776 wmpdlr32.exe 2416 wmpdlr32.exe 2416 wmpdlr32.exe 2032 wmpdlr32.exe 2032 wmpdlr32.exe 844 wmpdlr32.exe 844 wmpdlr32.exe 1664 wmpdlr32.exe 1664 wmpdlr32.exe 556 wmpdlr32.exe 556 wmpdlr32.exe 1224 wmpdlr32.exe 1224 wmpdlr32.exe 2644 wmpdlr32.exe 2644 wmpdlr32.exe 2476 wmpdlr32.exe 2476 wmpdlr32.exe 1924 wmpdlr32.exe 1924 wmpdlr32.exe 2548 wmpdlr32.exe 2548 wmpdlr32.exe 1624 wmpdlr32.exe 1624 wmpdlr32.exe 2924 wmpdlr32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2372 2020 Picture42.JPG_www.facebook.exe 28 PID 2020 wrote to memory of 2372 2020 Picture42.JPG_www.facebook.exe 28 PID 2020 wrote to memory of 2372 2020 Picture42.JPG_www.facebook.exe 28 PID 2020 wrote to memory of 2372 2020 Picture42.JPG_www.facebook.exe 28 PID 2020 wrote to memory of 2372 2020 Picture42.JPG_www.facebook.exe 28 PID 2020 wrote to memory of 2372 2020 Picture42.JPG_www.facebook.exe 28 PID 2020 wrote to memory of 2372 2020 Picture42.JPG_www.facebook.exe 28 PID 2372 wrote to memory of 2652 2372 Picture42.JPG_www.facebook.exe 29 PID 2372 wrote to memory of 2652 2372 Picture42.JPG_www.facebook.exe 29 PID 2372 wrote to memory of 2652 2372 Picture42.JPG_www.facebook.exe 29 PID 2372 wrote to memory of 2652 2372 Picture42.JPG_www.facebook.exe 29 PID 2652 wrote to memory of 2604 2652 wmpdlr32.exe 30 PID 2652 wrote to memory of 2604 2652 wmpdlr32.exe 30 PID 2652 wrote to memory of 2604 2652 wmpdlr32.exe 30 PID 2652 wrote to memory of 2604 2652 wmpdlr32.exe 30 PID 2652 wrote to memory of 2604 2652 wmpdlr32.exe 30 PID 2652 wrote to memory of 2604 2652 wmpdlr32.exe 30 PID 2652 wrote to memory of 2604 2652 wmpdlr32.exe 30 PID 2604 wrote to memory of 2944 2604 wmpdlr32.exe 31 PID 2604 wrote to memory of 2944 2604 wmpdlr32.exe 31 PID 2604 wrote to memory of 2944 2604 wmpdlr32.exe 31 PID 2604 wrote to memory of 2944 2604 wmpdlr32.exe 31 PID 2944 wrote to memory of 2712 2944 wmpdlr32.exe 32 PID 2944 wrote to memory of 2712 2944 wmpdlr32.exe 32 PID 2944 wrote to memory of 2712 2944 wmpdlr32.exe 32 PID 2944 wrote to memory of 2712 2944 wmpdlr32.exe 32 PID 2944 wrote to memory of 2712 2944 wmpdlr32.exe 32 PID 2944 wrote to memory of 2712 2944 wmpdlr32.exe 32 PID 2944 wrote to memory of 2712 2944 wmpdlr32.exe 32 PID 2712 wrote to memory of 2752 2712 wmpdlr32.exe 33 PID 2712 wrote to memory of 2752 2712 wmpdlr32.exe 33 PID 2712 wrote to memory of 2752 2712 wmpdlr32.exe 33 PID 2712 wrote to memory of 2752 2712 wmpdlr32.exe 33 PID 2752 wrote to memory of 2776 2752 wmpdlr32.exe 34 PID 2752 wrote to memory of 2776 2752 wmpdlr32.exe 34 PID 2752 wrote to memory of 2776 2752 wmpdlr32.exe 34 PID 2752 wrote to memory of 2776 2752 wmpdlr32.exe 34 PID 2752 wrote to memory of 2776 2752 wmpdlr32.exe 34 PID 2752 wrote to memory of 2776 2752 wmpdlr32.exe 34 PID 2752 wrote to memory of 2776 2752 wmpdlr32.exe 34 PID 2776 wrote to memory of 1672 2776 wmpdlr32.exe 37 PID 2776 wrote to memory of 1672 2776 wmpdlr32.exe 37 PID 2776 wrote to memory of 1672 2776 wmpdlr32.exe 37 PID 2776 wrote to memory of 1672 2776 wmpdlr32.exe 37 PID 1672 wrote to memory of 2416 1672 wmpdlr32.exe 38 PID 1672 wrote to memory of 2416 1672 wmpdlr32.exe 38 PID 1672 wrote to memory of 2416 1672 wmpdlr32.exe 38 PID 1672 wrote to memory of 2416 1672 wmpdlr32.exe 38 PID 1672 wrote to memory of 2416 1672 wmpdlr32.exe 38 PID 1672 wrote to memory of 2416 1672 wmpdlr32.exe 38 PID 1672 wrote to memory of 2416 1672 wmpdlr32.exe 38 PID 2416 wrote to memory of 1356 2416 wmpdlr32.exe 39 PID 2416 wrote to memory of 1356 2416 wmpdlr32.exe 39 PID 2416 wrote to memory of 1356 2416 wmpdlr32.exe 39 PID 2416 wrote to memory of 1356 2416 wmpdlr32.exe 39 PID 1356 wrote to memory of 2032 1356 wmpdlr32.exe 40 PID 1356 wrote to memory of 2032 1356 wmpdlr32.exe 40 PID 1356 wrote to memory of 2032 1356 wmpdlr32.exe 40 PID 1356 wrote to memory of 2032 1356 wmpdlr32.exe 40 PID 1356 wrote to memory of 2032 1356 wmpdlr32.exe 40 PID 1356 wrote to memory of 2032 1356 wmpdlr32.exe 40 PID 1356 wrote to memory of 2032 1356 wmpdlr32.exe 40 PID 2032 wrote to memory of 2348 2032 wmpdlr32.exe 41 PID 2032 wrote to memory of 2348 2032 wmpdlr32.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\Picture42.JPG_www.facebook.exe"C:\Users\Admin\AppData\Local\Temp\Picture42.JPG_www.facebook.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\Picture42.JPG_www.facebook.exe"C:\Users\Admin\AppData\Local\Temp\Picture42.JPG_www.facebook.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\wmpdlr32.exe"C:\Windows\system32\wmpdlr32.exe" C:\Users\Admin\AppData\Local\Temp\PICTUR~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\wmpdlr32.exe"C:\Windows\system32\wmpdlr32.exe" C:\Users\Admin\AppData\Local\Temp\PICTUR~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\wmpdlr32.exe"C:\Windows\system32\wmpdlr32.exe" C:\Windows\SysWOW64\wmpdlr32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\wmpdlr32.exe"C:\Windows\system32\wmpdlr32.exe" C:\Windows\SysWOW64\wmpdlr32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\wmpdlr32.exe"C:\Windows\system32\wmpdlr32.exe" C:\Windows\SysWOW64\wmpdlr32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\wmpdlr32.exe"C:\Windows\system32\wmpdlr32.exe" C:\Windows\SysWOW64\wmpdlr32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\wmpdlr32.exe"C:\Windows\system32\wmpdlr32.exe" C:\Windows\SysWOW64\wmpdlr32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\wmpdlr32.exe"C:\Windows\system32\wmpdlr32.exe" C:\Windows\SysWOW64\wmpdlr32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\wmpdlr32.exe"C:\Windows\system32\wmpdlr32.exe" C:\Windows\SysWOW64\wmpdlr32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\wmpdlr32.exe"C:\Windows\system32\wmpdlr32.exe" C:\Windows\SysWOW64\wmpdlr32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\wmpdlr32.exe"C:\Windows\system32\wmpdlr32.exe" C:\Windows\SysWOW64\wmpdlr32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2348 -
C:\Windows\SysWOW64\wmpdlr32.exe"C:\Windows\system32\wmpdlr32.exe" C:\Windows\SysWOW64\wmpdlr32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:844 -
C:\Windows\SysWOW64\wmpdlr32.exe"C:\Windows\system32\wmpdlr32.exe" C:\Windows\SysWOW64\wmpdlr32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2884 -
C:\Windows\SysWOW64\wmpdlr32.exe"C:\Windows\system32\wmpdlr32.exe" C:\Windows\SysWOW64\wmpdlr32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1664 -
C:\Windows\SysWOW64\wmpdlr32.exe"C:\Windows\system32\wmpdlr32.exe" C:\Windows\SysWOW64\wmpdlr32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:980 -
C:\Windows\SysWOW64\wmpdlr32.exe"C:\Windows\system32\wmpdlr32.exe" C:\Windows\SysWOW64\wmpdlr32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:556 -
C:\Windows\SysWOW64\wmpdlr32.exe"C:\Windows\system32\wmpdlr32.exe" C:\Windows\SysWOW64\wmpdlr32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2100 -
C:\Windows\SysWOW64\wmpdlr32.exe"C:\Windows\system32\wmpdlr32.exe" C:\Windows\SysWOW64\wmpdlr32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1224 -
C:\Windows\SysWOW64\wmpdlr32.exe"C:\Windows\system32\wmpdlr32.exe" C:\Windows\SysWOW64\wmpdlr32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:3004 -
C:\Windows\SysWOW64\wmpdlr32.exe"C:\Windows\system32\wmpdlr32.exe" C:\Windows\SysWOW64\wmpdlr32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2644 -
C:\Windows\SysWOW64\wmpdlr32.exe"C:\Windows\system32\wmpdlr32.exe" C:\Windows\SysWOW64\wmpdlr32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2232 -
C:\Windows\SysWOW64\wmpdlr32.exe"C:\Windows\system32\wmpdlr32.exe" C:\Windows\SysWOW64\wmpdlr32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2476 -
C:\Windows\SysWOW64\wmpdlr32.exe"C:\Windows\system32\wmpdlr32.exe" C:\Windows\SysWOW64\wmpdlr32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1876 -
C:\Windows\SysWOW64\wmpdlr32.exe"C:\Windows\system32\wmpdlr32.exe" C:\Windows\SysWOW64\wmpdlr32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1924 -
C:\Windows\SysWOW64\wmpdlr32.exe"C:\Windows\system32\wmpdlr32.exe" C:\Windows\SysWOW64\wmpdlr32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2692 -
C:\Windows\SysWOW64\wmpdlr32.exe"C:\Windows\system32\wmpdlr32.exe" C:\Windows\SysWOW64\wmpdlr32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2548 -
C:\Windows\SysWOW64\wmpdlr32.exe"C:\Windows\system32\wmpdlr32.exe" C:\Windows\SysWOW64\wmpdlr32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2836 -
C:\Windows\SysWOW64\wmpdlr32.exe"C:\Windows\system32\wmpdlr32.exe" C:\Windows\SysWOW64\wmpdlr32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1624 -
C:\Windows\SysWOW64\wmpdlr32.exe"C:\Windows\system32\wmpdlr32.exe" C:\Windows\SysWOW64\wmpdlr32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1064 -
C:\Windows\SysWOW64\wmpdlr32.exe"C:\Windows\system32\wmpdlr32.exe" C:\Windows\SysWOW64\wmpdlr32.exe32⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:2924
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151KB
MD53bb29b4fa89ba0623b2668c44fc545dd
SHA1ce273211fa397c88e6af808b0ab20d77f33861c7
SHA256af34aa041818cb31b37c636e019ca464044e2fefacfb6da0abefba856abbbc6d
SHA5125c418b4dc0d19f6df33bfef4ff8a9eeafd83e44eff12dd6304f848a36c9dbe5c689c65b94cc04433828b6dc6d10ea838888018be2274e26496470ac64537d6d0