Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21/07/2024, 13:25
Static task
static1
Behavioral task
behavioral1
Sample
60a8cd6788134c21532d3ef95812e2c5_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
60a8cd6788134c21532d3ef95812e2c5_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
60a8cd6788134c21532d3ef95812e2c5_JaffaCakes118.exe
-
Size
160KB
-
MD5
60a8cd6788134c21532d3ef95812e2c5
-
SHA1
b73b1e5600d5b8c57c753bf6b6c73a0239be6ffc
-
SHA256
67470a7c5f32ac08df6e6b396a9ef15eb655b1361d5af041a0e1b1ff03a11689
-
SHA512
db21b08173c9520ce3c977d63d339a315c8fe5fb0f9a92b9bde7fbe81a82e7ff84e62d5eed921838c0fe40288cd5ba457698034bbf70ab68a788d12b3907e1db
-
SSDEEP
3072:q58CtmI19GOkxn/TuKN2ttpiNxr3PTbZ9z4f0Uu206oW:qEOsTuKN2triNxr3YV06D
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings 2 TTPs 42 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wnpdk3.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wnpdk3.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wnpdk3.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wnpdk3.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wnpdk3.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wnpdk3.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wnpdk3.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wnpdk3.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wnpdk3.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wnpdk3.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wnpdk3.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wnpdk3.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wnpdk3.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wnpdk3.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wnpdk3.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wnpdk3.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wnpdk3.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wnpdk3.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wnpdk3.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wnpdk3.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wnpdk3.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wnpdk3.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wnpdk3.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wnpdk3.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation 60a8cd6788134c21532d3ef95812e2c5_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wnpdk3.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wnpdk3.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wnpdk3.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wnpdk3.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wnpdk3.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wnpdk3.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wnpdk3.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wnpdk3.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wnpdk3.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wnpdk3.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wnpdk3.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wnpdk3.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wnpdk3.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wnpdk3.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wnpdk3.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wnpdk3.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation wnpdk3.exe -
Deletes itself 1 IoCs
pid Process 212 wnpdk3.exe -
Executes dropped EXE 64 IoCs
pid Process 4496 wnpdk3.exe 212 wnpdk3.exe 3756 wnpdk3.exe 3936 wnpdk3.exe 3324 wnpdk3.exe 3668 wnpdk3.exe 3064 wnpdk3.exe 4580 wnpdk3.exe 4912 wnpdk3.exe 4328 wnpdk3.exe 2812 wnpdk3.exe 2404 wnpdk3.exe 2660 wnpdk3.exe 3960 wnpdk3.exe 2484 wnpdk3.exe 1236 wnpdk3.exe 4740 wnpdk3.exe 3460 wnpdk3.exe 4812 wnpdk3.exe 1144 wnpdk3.exe 4956 wnpdk3.exe 4980 wnpdk3.exe 2372 wnpdk3.exe 4828 wnpdk3.exe 1392 wnpdk3.exe 544 wnpdk3.exe 2876 wnpdk3.exe 1060 wnpdk3.exe 4124 wnpdk3.exe 1648 wnpdk3.exe 4472 wnpdk3.exe 1348 wnpdk3.exe 2728 wnpdk3.exe 4272 wnpdk3.exe 4520 wnpdk3.exe 4524 wnpdk3.exe 4588 wnpdk3.exe 5096 wnpdk3.exe 2292 wnpdk3.exe 3808 wnpdk3.exe 3544 wnpdk3.exe 3224 wnpdk3.exe 4428 wnpdk3.exe 2676 wnpdk3.exe 4788 wnpdk3.exe 3064 wnpdk3.exe 3292 wnpdk3.exe 2228 wnpdk3.exe 3080 wnpdk3.exe 4908 wnpdk3.exe 3848 wnpdk3.exe 3056 wnpdk3.exe 4596 wnpdk3.exe 3840 wnpdk3.exe 3252 wnpdk3.exe 2604 wnpdk3.exe 2532 wnpdk3.exe 4496 wnpdk3.exe 5032 wnpdk3.exe 3240 wnpdk3.exe 4248 wnpdk3.exe 4552 wnpdk3.exe 2952 wnpdk3.exe 1604 wnpdk3.exe -
resource yara_rule behavioral2/memory/1196-0-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/1196-2-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/1196-3-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/1196-4-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/1196-38-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/212-45-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/212-43-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/212-44-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/212-46-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/3936-53-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/3936-52-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/3936-51-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/3936-55-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/3668-60-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/3668-61-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/3668-63-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/4580-69-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/4580-71-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/4328-79-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/2404-85-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/2404-87-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/3960-96-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/1236-103-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/3460-109-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/3460-111-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/1144-117-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/1144-119-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/4980-125-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/4980-127-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/4828-133-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/4828-137-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/544-145-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/1060-153-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/1648-161-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/1348-166-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/1348-170-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/4272-178-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/4524-183-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/4524-187-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/5096-192-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/5096-197-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/3808-202-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/3808-206-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/3224-211-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/3224-215-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/2676-220-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/2676-223-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/3064-234-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/2228-240-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/4908-244-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/4908-247-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/3056-251-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/3056-254-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/3840-258-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/3840-261-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/2604-265-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/2604-268-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/4496-272-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/4496-275-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/3240-279-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/3240-282-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/4552-285-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/4552-289-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/1604-292-0x0000000000400000-0x0000000000467000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdk3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdk3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdk3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdk3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdk3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdk3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdk3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdk3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdk3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdk3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdk3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 60a8cd6788134c21532d3ef95812e2c5_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdk3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdk3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdk3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdk3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdk3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdk3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdk3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdk3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdk3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdk3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdk3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdk3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdk3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdk3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdk3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdk3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdk3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdk3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdk3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdk3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdk3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdk3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdk3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdk3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdk3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdk3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdk3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdk3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdk3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdk3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdk3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdk3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdk3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdk3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdk3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdk3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdk3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdk3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdk3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdk3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdk3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdk3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdk3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdk3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdk3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdk3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdk3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdk3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdk3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 60a8cd6788134c21532d3ef95812e2c5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdk3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdk3.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File opened for modification C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File created C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File created C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File created C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File opened for modification C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File created C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File opened for modification C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File opened for modification C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File created C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File created C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File opened for modification C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File created C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File created C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File opened for modification C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File opened for modification C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File created C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File created C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File opened for modification C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File opened for modification C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File opened for modification C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File opened for modification C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File created C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File opened for modification C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File opened for modification C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File created C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File opened for modification C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File created C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File opened for modification C:\Windows\SysWOW64\wnpdk3.exe 60a8cd6788134c21532d3ef95812e2c5_JaffaCakes118.exe File created C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File created C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File created C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File created C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File created C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File opened for modification C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File created C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File opened for modification C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File created C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File opened for modification C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File created C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File created C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File created C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File created C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File opened for modification C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File created C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File opened for modification C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File created C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File created C:\Windows\SysWOW64\wnpdk3.exe 60a8cd6788134c21532d3ef95812e2c5_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File opened for modification C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File created C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File created C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File created C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File created C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File created C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File opened for modification C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File opened for modification C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File opened for modification C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File opened for modification C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File created C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File opened for modification C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File created C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File opened for modification C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe File created C:\Windows\SysWOW64\wnpdk3.exe wnpdk3.exe -
Suspicious use of SetThreadContext 43 IoCs
description pid Process procid_target PID 4884 set thread context of 1196 4884 60a8cd6788134c21532d3ef95812e2c5_JaffaCakes118.exe 87 PID 4496 set thread context of 212 4496 wnpdk3.exe 89 PID 3756 set thread context of 3936 3756 wnpdk3.exe 96 PID 3324 set thread context of 3668 3324 wnpdk3.exe 99 PID 3064 set thread context of 4580 3064 wnpdk3.exe 102 PID 4912 set thread context of 4328 4912 wnpdk3.exe 105 PID 2812 set thread context of 2404 2812 wnpdk3.exe 107 PID 2660 set thread context of 3960 2660 wnpdk3.exe 109 PID 2484 set thread context of 1236 2484 wnpdk3.exe 111 PID 4740 set thread context of 3460 4740 wnpdk3.exe 114 PID 4812 set thread context of 1144 4812 wnpdk3.exe 117 PID 4956 set thread context of 4980 4956 wnpdk3.exe 121 PID 2372 set thread context of 4828 2372 wnpdk3.exe 125 PID 1392 set thread context of 544 1392 wnpdk3.exe 131 PID 2876 set thread context of 1060 2876 wnpdk3.exe 133 PID 4124 set thread context of 1648 4124 wnpdk3.exe 135 PID 4472 set thread context of 1348 4472 wnpdk3.exe 137 PID 2728 set thread context of 4272 2728 wnpdk3.exe 139 PID 4520 set thread context of 4524 4520 wnpdk3.exe 141 PID 4588 set thread context of 5096 4588 wnpdk3.exe 143 PID 2292 set thread context of 3808 2292 wnpdk3.exe 145 PID 3544 set thread context of 3224 3544 wnpdk3.exe 147 PID 4428 set thread context of 2676 4428 wnpdk3.exe 149 PID 4788 set thread context of 3064 4788 wnpdk3.exe 152 PID 3292 set thread context of 2228 3292 wnpdk3.exe 154 PID 3080 set thread context of 4908 3080 wnpdk3.exe 156 PID 3848 set thread context of 3056 3848 wnpdk3.exe 158 PID 4596 set thread context of 3840 4596 wnpdk3.exe 160 PID 3252 set thread context of 2604 3252 wnpdk3.exe 162 PID 2532 set thread context of 4496 2532 wnpdk3.exe 164 PID 5032 set thread context of 3240 5032 wnpdk3.exe 166 PID 4248 set thread context of 4552 4248 wnpdk3.exe 168 PID 2952 set thread context of 1604 2952 wnpdk3.exe 170 PID 116 set thread context of 932 116 wnpdk3.exe 172 PID 4136 set thread context of 4448 4136 wnpdk3.exe 174 PID 3156 set thread context of 2532 3156 wnpdk3.exe 176 PID 4832 set thread context of 3304 4832 wnpdk3.exe 178 PID 2732 set thread context of 1140 2732 wnpdk3.exe 180 PID 2492 set thread context of 1604 2492 wnpdk3.exe 182 PID 4132 set thread context of 4520 4132 wnpdk3.exe 184 PID 4188 set thread context of 4116 4188 wnpdk3.exe 186 PID 3068 set thread context of 4296 3068 wnpdk3.exe 188 PID 3772 set thread context of 4180 3772 wnpdk3.exe 190 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdk3.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\Local Settings wnpdk3.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\Local Settings wnpdk3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdk3.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\Local Settings wnpdk3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdk3.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\Local Settings wnpdk3.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\Local Settings wnpdk3.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\Local Settings wnpdk3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdk3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdk3.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\Local Settings 60a8cd6788134c21532d3ef95812e2c5_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\Local Settings wnpdk3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdk3.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\Local Settings wnpdk3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdk3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdk3.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\Local Settings wnpdk3.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\Local Settings wnpdk3.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\Local Settings wnpdk3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdk3.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\Local Settings wnpdk3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdk3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdk3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdk3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdk3.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\Local Settings wnpdk3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdk3.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\Local Settings wnpdk3.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\Local Settings wnpdk3.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\Local Settings wnpdk3.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\Local Settings wnpdk3.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\Local Settings wnpdk3.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\Local Settings wnpdk3.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\Local Settings wnpdk3.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\Local Settings wnpdk3.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\Local Settings wnpdk3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdk3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdk3.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\Local Settings wnpdk3.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\Local Settings wnpdk3.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\Local Settings wnpdk3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdk3.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\Local Settings wnpdk3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdk3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdk3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdk3.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\Local Settings wnpdk3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdk3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdk3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdk3.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\Local Settings wnpdk3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdk3.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\Local Settings wnpdk3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdk3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdk3.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\Local Settings wnpdk3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdk3.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\Local Settings wnpdk3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdk3.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\Local Settings wnpdk3.exe Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\Local Settings wnpdk3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdk3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdk3.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1196 60a8cd6788134c21532d3ef95812e2c5_JaffaCakes118.exe 1196 60a8cd6788134c21532d3ef95812e2c5_JaffaCakes118.exe 212 wnpdk3.exe 212 wnpdk3.exe 3936 wnpdk3.exe 3936 wnpdk3.exe 3668 wnpdk3.exe 3668 wnpdk3.exe 4580 wnpdk3.exe 4580 wnpdk3.exe 4328 wnpdk3.exe 4328 wnpdk3.exe 2404 wnpdk3.exe 2404 wnpdk3.exe 3960 wnpdk3.exe 3960 wnpdk3.exe 1236 wnpdk3.exe 1236 wnpdk3.exe 3460 wnpdk3.exe 3460 wnpdk3.exe 1144 wnpdk3.exe 1144 wnpdk3.exe 4980 wnpdk3.exe 4980 wnpdk3.exe 4828 wnpdk3.exe 4828 wnpdk3.exe 544 wnpdk3.exe 544 wnpdk3.exe 1060 wnpdk3.exe 1060 wnpdk3.exe 1648 wnpdk3.exe 1648 wnpdk3.exe 1348 wnpdk3.exe 1348 wnpdk3.exe 4272 wnpdk3.exe 4272 wnpdk3.exe 4524 wnpdk3.exe 4524 wnpdk3.exe 5096 wnpdk3.exe 5096 wnpdk3.exe 3808 wnpdk3.exe 3808 wnpdk3.exe 3224 wnpdk3.exe 3224 wnpdk3.exe 2676 wnpdk3.exe 2676 wnpdk3.exe 3064 wnpdk3.exe 3064 wnpdk3.exe 2228 wnpdk3.exe 2228 wnpdk3.exe 4908 wnpdk3.exe 4908 wnpdk3.exe 3056 wnpdk3.exe 3056 wnpdk3.exe 3840 wnpdk3.exe 3840 wnpdk3.exe 2604 wnpdk3.exe 2604 wnpdk3.exe 4496 wnpdk3.exe 4496 wnpdk3.exe 3240 wnpdk3.exe 3240 wnpdk3.exe 4552 wnpdk3.exe 4552 wnpdk3.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4884 wrote to memory of 1196 4884 60a8cd6788134c21532d3ef95812e2c5_JaffaCakes118.exe 87 PID 4884 wrote to memory of 1196 4884 60a8cd6788134c21532d3ef95812e2c5_JaffaCakes118.exe 87 PID 4884 wrote to memory of 1196 4884 60a8cd6788134c21532d3ef95812e2c5_JaffaCakes118.exe 87 PID 4884 wrote to memory of 1196 4884 60a8cd6788134c21532d3ef95812e2c5_JaffaCakes118.exe 87 PID 4884 wrote to memory of 1196 4884 60a8cd6788134c21532d3ef95812e2c5_JaffaCakes118.exe 87 PID 4884 wrote to memory of 1196 4884 60a8cd6788134c21532d3ef95812e2c5_JaffaCakes118.exe 87 PID 4884 wrote to memory of 1196 4884 60a8cd6788134c21532d3ef95812e2c5_JaffaCakes118.exe 87 PID 1196 wrote to memory of 4496 1196 60a8cd6788134c21532d3ef95812e2c5_JaffaCakes118.exe 88 PID 1196 wrote to memory of 4496 1196 60a8cd6788134c21532d3ef95812e2c5_JaffaCakes118.exe 88 PID 1196 wrote to memory of 4496 1196 60a8cd6788134c21532d3ef95812e2c5_JaffaCakes118.exe 88 PID 4496 wrote to memory of 212 4496 wnpdk3.exe 89 PID 4496 wrote to memory of 212 4496 wnpdk3.exe 89 PID 4496 wrote to memory of 212 4496 wnpdk3.exe 89 PID 4496 wrote to memory of 212 4496 wnpdk3.exe 89 PID 4496 wrote to memory of 212 4496 wnpdk3.exe 89 PID 4496 wrote to memory of 212 4496 wnpdk3.exe 89 PID 4496 wrote to memory of 212 4496 wnpdk3.exe 89 PID 212 wrote to memory of 3756 212 wnpdk3.exe 95 PID 212 wrote to memory of 3756 212 wnpdk3.exe 95 PID 212 wrote to memory of 3756 212 wnpdk3.exe 95 PID 3756 wrote to memory of 3936 3756 wnpdk3.exe 96 PID 3756 wrote to memory of 3936 3756 wnpdk3.exe 96 PID 3756 wrote to memory of 3936 3756 wnpdk3.exe 96 PID 3756 wrote to memory of 3936 3756 wnpdk3.exe 96 PID 3756 wrote to memory of 3936 3756 wnpdk3.exe 96 PID 3756 wrote to memory of 3936 3756 wnpdk3.exe 96 PID 3756 wrote to memory of 3936 3756 wnpdk3.exe 96 PID 3936 wrote to memory of 3324 3936 wnpdk3.exe 98 PID 3936 wrote to memory of 3324 3936 wnpdk3.exe 98 PID 3936 wrote to memory of 3324 3936 wnpdk3.exe 98 PID 3324 wrote to memory of 3668 3324 wnpdk3.exe 99 PID 3324 wrote to memory of 3668 3324 wnpdk3.exe 99 PID 3324 wrote to memory of 3668 3324 wnpdk3.exe 99 PID 3324 wrote to memory of 3668 3324 wnpdk3.exe 99 PID 3324 wrote to memory of 3668 3324 wnpdk3.exe 99 PID 3324 wrote to memory of 3668 3324 wnpdk3.exe 99 PID 3324 wrote to memory of 3668 3324 wnpdk3.exe 99 PID 3668 wrote to memory of 3064 3668 wnpdk3.exe 101 PID 3668 wrote to memory of 3064 3668 wnpdk3.exe 101 PID 3668 wrote to memory of 3064 3668 wnpdk3.exe 101 PID 3064 wrote to memory of 4580 3064 wnpdk3.exe 102 PID 3064 wrote to memory of 4580 3064 wnpdk3.exe 102 PID 3064 wrote to memory of 4580 3064 wnpdk3.exe 102 PID 3064 wrote to memory of 4580 3064 wnpdk3.exe 102 PID 3064 wrote to memory of 4580 3064 wnpdk3.exe 102 PID 3064 wrote to memory of 4580 3064 wnpdk3.exe 102 PID 3064 wrote to memory of 4580 3064 wnpdk3.exe 102 PID 4580 wrote to memory of 4912 4580 wnpdk3.exe 104 PID 4580 wrote to memory of 4912 4580 wnpdk3.exe 104 PID 4580 wrote to memory of 4912 4580 wnpdk3.exe 104 PID 4912 wrote to memory of 4328 4912 wnpdk3.exe 105 PID 4912 wrote to memory of 4328 4912 wnpdk3.exe 105 PID 4912 wrote to memory of 4328 4912 wnpdk3.exe 105 PID 4912 wrote to memory of 4328 4912 wnpdk3.exe 105 PID 4912 wrote to memory of 4328 4912 wnpdk3.exe 105 PID 4912 wrote to memory of 4328 4912 wnpdk3.exe 105 PID 4912 wrote to memory of 4328 4912 wnpdk3.exe 105 PID 4328 wrote to memory of 2812 4328 wnpdk3.exe 106 PID 4328 wrote to memory of 2812 4328 wnpdk3.exe 106 PID 4328 wrote to memory of 2812 4328 wnpdk3.exe 106 PID 2812 wrote to memory of 2404 2812 wnpdk3.exe 107 PID 2812 wrote to memory of 2404 2812 wnpdk3.exe 107 PID 2812 wrote to memory of 2404 2812 wnpdk3.exe 107 PID 2812 wrote to memory of 2404 2812 wnpdk3.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\60a8cd6788134c21532d3ef95812e2c5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\60a8cd6788134c21532d3ef95812e2c5_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\60a8cd6788134c21532d3ef95812e2c5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\60a8cd6788134c21532d3ef95812e2c5_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Users\Admin\AppData\Local\Temp\60A8CD~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Users\Admin\AppData\Local\Temp\60A8CD~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2404 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2660 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3960 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
PID:2484 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1236 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
PID:4740 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3460 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
PID:4812 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1144 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
PID:4956 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4980 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
PID:2372 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4828 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
PID:1392 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:544 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
PID:2876 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1060 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
PID:4124 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe32⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1648 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
PID:4472 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe34⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1348 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
PID:2728 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe36⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4272 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
PID:4520 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe38⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4524 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4588 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe40⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5096 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
PID:2292 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe42⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:3808 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
PID:3544 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe44⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3224 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
PID:4428 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe46⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2676 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
PID:4788 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe48⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3064 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
PID:3292 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe50⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2228 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3080 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe52⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4908 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
PID:3848 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe54⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3056 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
PID:4596 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe56⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3840 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
PID:3252 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe58⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2604 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
PID:2532 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe60⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4496 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5032 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe62⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3240 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
PID:4248 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe64⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4552 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
PID:2952 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe66⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:1604 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe67⤵
- Suspicious use of SetThreadContext
- Modifies registry class
PID:116 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe68⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:932 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe69⤵
- Suspicious use of SetThreadContext
- Modifies registry class
PID:4136 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe70⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4448 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe71⤵
- Suspicious use of SetThreadContext
- Modifies registry class
PID:3156 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe72⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
PID:2532 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe73⤵
- Suspicious use of SetThreadContext
- Modifies registry class
PID:4832 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe74⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:3304 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe75⤵
- Suspicious use of SetThreadContext
- Modifies registry class
PID:2732 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe76⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
PID:1140 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe77⤵
- Suspicious use of SetThreadContext
- Modifies registry class
PID:2492 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe78⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:1604 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe79⤵
- Suspicious use of SetThreadContext
PID:4132 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe80⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:4520 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe81⤵
- Suspicious use of SetThreadContext
- Modifies registry class
PID:4188 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe82⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:4116 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe83⤵
- Suspicious use of SetThreadContext
- Modifies registry class
PID:3068 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe84⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
PID:4296 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe85⤵
- Suspicious use of SetThreadContext
- Modifies registry class
PID:3772 -
C:\Windows\SysWOW64\wnpdk3.exe"C:\Windows\system32\wnpdk3.exe" C:\Windows\SysWOW64\wnpdk3.exe86⤵
- Maps connected drives based on registry
PID:4180
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160KB
MD560a8cd6788134c21532d3ef95812e2c5
SHA1b73b1e5600d5b8c57c753bf6b6c73a0239be6ffc
SHA25667470a7c5f32ac08df6e6b396a9ef15eb655b1361d5af041a0e1b1ff03a11689
SHA512db21b08173c9520ce3c977d63d339a315c8fe5fb0f9a92b9bde7fbe81a82e7ff84e62d5eed921838c0fe40288cd5ba457698034bbf70ab68a788d12b3907e1db