Analysis
-
max time kernel
147s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23-07-2024 11:55
Static task
static1
Behavioral task
behavioral1
Sample
677db9afd4a7dab39e559cbfcb8de21d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
677db9afd4a7dab39e559cbfcb8de21d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
677db9afd4a7dab39e559cbfcb8de21d_JaffaCakes118.exe
-
Size
152KB
-
MD5
677db9afd4a7dab39e559cbfcb8de21d
-
SHA1
ddd9249eae614e40c351f953a59f73a3c9a066a9
-
SHA256
c246562d445a87510ca922f72562f5643774f534d87150b5ea419f33e152fd10
-
SHA512
2a64376f0f7dcc42620ff7a41c7000f7385c95818c0771ef056720c438ea9c318f2f572052c1d0024c4ae2d17c6169a9c94de82151513d57c92ecd8123d7f92e
-
SSDEEP
3072:Rsre8BcmZEUfhWlzDVQxLAaC61PG1Ff/y+l44P:JyESwlDVeN1S44P
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings 2 TTPs 11 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation wmpnkt32.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation wmpnkt32.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation 677db9afd4a7dab39e559cbfcb8de21d_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation wmpnkt32.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation wmpnkt32.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation wmpnkt32.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation wmpnkt32.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation wmpnkt32.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation wmpnkt32.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation wmpnkt32.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation wmpnkt32.exe -
Deletes itself 1 IoCs
pid Process 5020 wmpnkt32.exe -
Executes dropped EXE 22 IoCs
pid Process 1560 wmpnkt32.exe 5020 wmpnkt32.exe 3236 wmpnkt32.exe 4428 wmpnkt32.exe 3796 wmpnkt32.exe 3948 wmpnkt32.exe 772 wmpnkt32.exe 4900 wmpnkt32.exe 1900 wmpnkt32.exe 4340 wmpnkt32.exe 1208 wmpnkt32.exe 4992 wmpnkt32.exe 2516 wmpnkt32.exe 2472 wmpnkt32.exe 4368 wmpnkt32.exe 4160 wmpnkt32.exe 1788 wmpnkt32.exe 4124 wmpnkt32.exe 3324 wmpnkt32.exe 5072 wmpnkt32.exe 2344 wmpnkt32.exe 1396 wmpnkt32.exe -
resource yara_rule behavioral2/memory/4108-1-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/4108-4-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/4108-5-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/4108-6-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/4108-43-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/5020-50-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/5020-52-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/5020-56-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/4428-66-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/3948-77-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/4900-87-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/4340-93-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/4340-98-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/4992-104-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/4992-109-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/2472-119-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/4160-125-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/4160-130-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/4124-141-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/5072-145-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/5072-146-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/5072-149-0x0000000000400000-0x0000000000457000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 24 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpnkt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpnkt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpnkt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpnkt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpnkt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 677db9afd4a7dab39e559cbfcb8de21d_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpnkt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpnkt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpnkt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpnkt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpnkt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpnkt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 677db9afd4a7dab39e559cbfcb8de21d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpnkt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpnkt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpnkt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpnkt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpnkt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpnkt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpnkt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpnkt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpnkt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpnkt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpnkt32.exe -
Drops file in System32 directory 33 IoCs
description ioc Process File created C:\Windows\SysWOW64\wmpnkt32.exe wmpnkt32.exe File created C:\Windows\SysWOW64\wmpnkt32.exe wmpnkt32.exe File opened for modification C:\Windows\SysWOW64\ wmpnkt32.exe File opened for modification C:\Windows\SysWOW64\ wmpnkt32.exe File created C:\Windows\SysWOW64\wmpnkt32.exe wmpnkt32.exe File opened for modification C:\Windows\SysWOW64\ wmpnkt32.exe File opened for modification C:\Windows\SysWOW64\wmpnkt32.exe wmpnkt32.exe File created C:\Windows\SysWOW64\wmpnkt32.exe wmpnkt32.exe File opened for modification C:\Windows\SysWOW64\ 677db9afd4a7dab39e559cbfcb8de21d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ wmpnkt32.exe File opened for modification C:\Windows\SysWOW64\ wmpnkt32.exe File created C:\Windows\SysWOW64\wmpnkt32.exe wmpnkt32.exe File created C:\Windows\SysWOW64\wmpnkt32.exe wmpnkt32.exe File created C:\Windows\SysWOW64\wmpnkt32.exe wmpnkt32.exe File opened for modification C:\Windows\SysWOW64\ wmpnkt32.exe File opened for modification C:\Windows\SysWOW64\wmpnkt32.exe wmpnkt32.exe File opened for modification C:\Windows\SysWOW64\wmpnkt32.exe wmpnkt32.exe File opened for modification C:\Windows\SysWOW64\wmpnkt32.exe 677db9afd4a7dab39e559cbfcb8de21d_JaffaCakes118.exe File created C:\Windows\SysWOW64\wmpnkt32.exe 677db9afd4a7dab39e559cbfcb8de21d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wmpnkt32.exe wmpnkt32.exe File opened for modification C:\Windows\SysWOW64\ wmpnkt32.exe File opened for modification C:\Windows\SysWOW64\wmpnkt32.exe wmpnkt32.exe File opened for modification C:\Windows\SysWOW64\ wmpnkt32.exe File opened for modification C:\Windows\SysWOW64\wmpnkt32.exe wmpnkt32.exe File opened for modification C:\Windows\SysWOW64\wmpnkt32.exe wmpnkt32.exe File opened for modification C:\Windows\SysWOW64\wmpnkt32.exe wmpnkt32.exe File created C:\Windows\SysWOW64\wmpnkt32.exe wmpnkt32.exe File opened for modification C:\Windows\SysWOW64\ wmpnkt32.exe File created C:\Windows\SysWOW64\wmpnkt32.exe wmpnkt32.exe File opened for modification C:\Windows\SysWOW64\wmpnkt32.exe wmpnkt32.exe File created C:\Windows\SysWOW64\wmpnkt32.exe wmpnkt32.exe File opened for modification C:\Windows\SysWOW64\ wmpnkt32.exe File opened for modification C:\Windows\SysWOW64\wmpnkt32.exe wmpnkt32.exe -
Suspicious use of SetThreadContext 12 IoCs
description pid Process procid_target PID 4688 set thread context of 4108 4688 677db9afd4a7dab39e559cbfcb8de21d_JaffaCakes118.exe 90 PID 1560 set thread context of 5020 1560 wmpnkt32.exe 97 PID 3236 set thread context of 4428 3236 wmpnkt32.exe 101 PID 3796 set thread context of 3948 3796 wmpnkt32.exe 104 PID 772 set thread context of 4900 772 wmpnkt32.exe 106 PID 1900 set thread context of 4340 1900 wmpnkt32.exe 110 PID 1208 set thread context of 4992 1208 wmpnkt32.exe 112 PID 2516 set thread context of 2472 2516 wmpnkt32.exe 114 PID 4368 set thread context of 4160 4368 wmpnkt32.exe 122 PID 1788 set thread context of 4124 1788 wmpnkt32.exe 124 PID 3324 set thread context of 5072 3324 wmpnkt32.exe 126 PID 2344 set thread context of 1396 2344 wmpnkt32.exe 131 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpnkt32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpnkt32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpnkt32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpnkt32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpnkt32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpnkt32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpnkt32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpnkt32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 677db9afd4a7dab39e559cbfcb8de21d_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpnkt32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpnkt32.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 4108 677db9afd4a7dab39e559cbfcb8de21d_JaffaCakes118.exe 4108 677db9afd4a7dab39e559cbfcb8de21d_JaffaCakes118.exe 4108 677db9afd4a7dab39e559cbfcb8de21d_JaffaCakes118.exe 4108 677db9afd4a7dab39e559cbfcb8de21d_JaffaCakes118.exe 5020 wmpnkt32.exe 5020 wmpnkt32.exe 5020 wmpnkt32.exe 5020 wmpnkt32.exe 4428 wmpnkt32.exe 4428 wmpnkt32.exe 4428 wmpnkt32.exe 4428 wmpnkt32.exe 3948 wmpnkt32.exe 3948 wmpnkt32.exe 3948 wmpnkt32.exe 3948 wmpnkt32.exe 4900 wmpnkt32.exe 4900 wmpnkt32.exe 4900 wmpnkt32.exe 4900 wmpnkt32.exe 4340 wmpnkt32.exe 4340 wmpnkt32.exe 4340 wmpnkt32.exe 4340 wmpnkt32.exe 4992 wmpnkt32.exe 4992 wmpnkt32.exe 4992 wmpnkt32.exe 4992 wmpnkt32.exe 2472 wmpnkt32.exe 2472 wmpnkt32.exe 2472 wmpnkt32.exe 2472 wmpnkt32.exe 4160 wmpnkt32.exe 4160 wmpnkt32.exe 4160 wmpnkt32.exe 4160 wmpnkt32.exe 4124 wmpnkt32.exe 4124 wmpnkt32.exe 4124 wmpnkt32.exe 4124 wmpnkt32.exe 5072 wmpnkt32.exe 5072 wmpnkt32.exe 5072 wmpnkt32.exe 5072 wmpnkt32.exe 1396 wmpnkt32.exe 1396 wmpnkt32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4688 wrote to memory of 4108 4688 677db9afd4a7dab39e559cbfcb8de21d_JaffaCakes118.exe 90 PID 4688 wrote to memory of 4108 4688 677db9afd4a7dab39e559cbfcb8de21d_JaffaCakes118.exe 90 PID 4688 wrote to memory of 4108 4688 677db9afd4a7dab39e559cbfcb8de21d_JaffaCakes118.exe 90 PID 4688 wrote to memory of 4108 4688 677db9afd4a7dab39e559cbfcb8de21d_JaffaCakes118.exe 90 PID 4688 wrote to memory of 4108 4688 677db9afd4a7dab39e559cbfcb8de21d_JaffaCakes118.exe 90 PID 4688 wrote to memory of 4108 4688 677db9afd4a7dab39e559cbfcb8de21d_JaffaCakes118.exe 90 PID 4688 wrote to memory of 4108 4688 677db9afd4a7dab39e559cbfcb8de21d_JaffaCakes118.exe 90 PID 4108 wrote to memory of 1560 4108 677db9afd4a7dab39e559cbfcb8de21d_JaffaCakes118.exe 95 PID 4108 wrote to memory of 1560 4108 677db9afd4a7dab39e559cbfcb8de21d_JaffaCakes118.exe 95 PID 4108 wrote to memory of 1560 4108 677db9afd4a7dab39e559cbfcb8de21d_JaffaCakes118.exe 95 PID 1560 wrote to memory of 5020 1560 wmpnkt32.exe 97 PID 1560 wrote to memory of 5020 1560 wmpnkt32.exe 97 PID 1560 wrote to memory of 5020 1560 wmpnkt32.exe 97 PID 1560 wrote to memory of 5020 1560 wmpnkt32.exe 97 PID 1560 wrote to memory of 5020 1560 wmpnkt32.exe 97 PID 1560 wrote to memory of 5020 1560 wmpnkt32.exe 97 PID 1560 wrote to memory of 5020 1560 wmpnkt32.exe 97 PID 5020 wrote to memory of 3236 5020 wmpnkt32.exe 98 PID 5020 wrote to memory of 3236 5020 wmpnkt32.exe 98 PID 5020 wrote to memory of 3236 5020 wmpnkt32.exe 98 PID 3236 wrote to memory of 4428 3236 wmpnkt32.exe 101 PID 3236 wrote to memory of 4428 3236 wmpnkt32.exe 101 PID 3236 wrote to memory of 4428 3236 wmpnkt32.exe 101 PID 3236 wrote to memory of 4428 3236 wmpnkt32.exe 101 PID 3236 wrote to memory of 4428 3236 wmpnkt32.exe 101 PID 3236 wrote to memory of 4428 3236 wmpnkt32.exe 101 PID 3236 wrote to memory of 4428 3236 wmpnkt32.exe 101 PID 4428 wrote to memory of 3796 4428 wmpnkt32.exe 103 PID 4428 wrote to memory of 3796 4428 wmpnkt32.exe 103 PID 4428 wrote to memory of 3796 4428 wmpnkt32.exe 103 PID 3796 wrote to memory of 3948 3796 wmpnkt32.exe 104 PID 3796 wrote to memory of 3948 3796 wmpnkt32.exe 104 PID 3796 wrote to memory of 3948 3796 wmpnkt32.exe 104 PID 3796 wrote to memory of 3948 3796 wmpnkt32.exe 104 PID 3796 wrote to memory of 3948 3796 wmpnkt32.exe 104 PID 3796 wrote to memory of 3948 3796 wmpnkt32.exe 104 PID 3796 wrote to memory of 3948 3796 wmpnkt32.exe 104 PID 3948 wrote to memory of 772 3948 wmpnkt32.exe 105 PID 3948 wrote to memory of 772 3948 wmpnkt32.exe 105 PID 3948 wrote to memory of 772 3948 wmpnkt32.exe 105 PID 772 wrote to memory of 4900 772 wmpnkt32.exe 106 PID 772 wrote to memory of 4900 772 wmpnkt32.exe 106 PID 772 wrote to memory of 4900 772 wmpnkt32.exe 106 PID 772 wrote to memory of 4900 772 wmpnkt32.exe 106 PID 772 wrote to memory of 4900 772 wmpnkt32.exe 106 PID 772 wrote to memory of 4900 772 wmpnkt32.exe 106 PID 772 wrote to memory of 4900 772 wmpnkt32.exe 106 PID 4900 wrote to memory of 1900 4900 wmpnkt32.exe 109 PID 4900 wrote to memory of 1900 4900 wmpnkt32.exe 109 PID 4900 wrote to memory of 1900 4900 wmpnkt32.exe 109 PID 1900 wrote to memory of 4340 1900 wmpnkt32.exe 110 PID 1900 wrote to memory of 4340 1900 wmpnkt32.exe 110 PID 1900 wrote to memory of 4340 1900 wmpnkt32.exe 110 PID 1900 wrote to memory of 4340 1900 wmpnkt32.exe 110 PID 1900 wrote to memory of 4340 1900 wmpnkt32.exe 110 PID 1900 wrote to memory of 4340 1900 wmpnkt32.exe 110 PID 1900 wrote to memory of 4340 1900 wmpnkt32.exe 110 PID 4340 wrote to memory of 1208 4340 wmpnkt32.exe 111 PID 4340 wrote to memory of 1208 4340 wmpnkt32.exe 111 PID 4340 wrote to memory of 1208 4340 wmpnkt32.exe 111 PID 1208 wrote to memory of 4992 1208 wmpnkt32.exe 112 PID 1208 wrote to memory of 4992 1208 wmpnkt32.exe 112 PID 1208 wrote to memory of 4992 1208 wmpnkt32.exe 112 PID 1208 wrote to memory of 4992 1208 wmpnkt32.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\677db9afd4a7dab39e559cbfcb8de21d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\677db9afd4a7dab39e559cbfcb8de21d_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\677db9afd4a7dab39e559cbfcb8de21d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\677db9afd4a7dab39e559cbfcb8de21d_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\SysWOW64\wmpnkt32.exe"C:\Windows\system32\wmpnkt32.exe" C:\Users\Admin\AppData\Local\Temp\677DB9~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\wmpnkt32.exe"C:\Windows\system32\wmpnkt32.exe" C:\Users\Admin\AppData\Local\Temp\677DB9~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\wmpnkt32.exe"C:\Windows\system32\wmpnkt32.exe" C:\Windows\SysWOW64\wmpnkt32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\SysWOW64\wmpnkt32.exe"C:\Windows\system32\wmpnkt32.exe" C:\Windows\SysWOW64\wmpnkt32.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\wmpnkt32.exe"C:\Windows\system32\wmpnkt32.exe" C:\Windows\SysWOW64\wmpnkt32.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\SysWOW64\wmpnkt32.exe"C:\Windows\system32\wmpnkt32.exe" C:\Windows\SysWOW64\wmpnkt32.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\SysWOW64\wmpnkt32.exe"C:\Windows\system32\wmpnkt32.exe" C:\Windows\SysWOW64\wmpnkt32.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\SysWOW64\wmpnkt32.exe"C:\Windows\system32\wmpnkt32.exe" C:\Windows\SysWOW64\wmpnkt32.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\wmpnkt32.exe"C:\Windows\system32\wmpnkt32.exe" C:\Windows\SysWOW64\wmpnkt32.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\wmpnkt32.exe"C:\Windows\system32\wmpnkt32.exe" C:\Windows\SysWOW64\wmpnkt32.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Windows\SysWOW64\wmpnkt32.exe"C:\Windows\system32\wmpnkt32.exe" C:\Windows\SysWOW64\wmpnkt32.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\SysWOW64\wmpnkt32.exe"C:\Windows\system32\wmpnkt32.exe" C:\Windows\SysWOW64\wmpnkt32.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4992 -
C:\Windows\SysWOW64\wmpnkt32.exe"C:\Windows\system32\wmpnkt32.exe" C:\Windows\SysWOW64\wmpnkt32.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2516 -
C:\Windows\SysWOW64\wmpnkt32.exe"C:\Windows\system32\wmpnkt32.exe" C:\Windows\SysWOW64\wmpnkt32.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2472 -
C:\Windows\SysWOW64\wmpnkt32.exe"C:\Windows\system32\wmpnkt32.exe" C:\Windows\SysWOW64\wmpnkt32.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4368 -
C:\Windows\SysWOW64\wmpnkt32.exe"C:\Windows\system32\wmpnkt32.exe" C:\Windows\SysWOW64\wmpnkt32.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4160 -
C:\Windows\SysWOW64\wmpnkt32.exe"C:\Windows\system32\wmpnkt32.exe" C:\Windows\SysWOW64\wmpnkt32.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1788 -
C:\Windows\SysWOW64\wmpnkt32.exe"C:\Windows\system32\wmpnkt32.exe" C:\Windows\SysWOW64\wmpnkt32.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4124 -
C:\Windows\SysWOW64\wmpnkt32.exe"C:\Windows\system32\wmpnkt32.exe" C:\Windows\SysWOW64\wmpnkt32.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3324 -
C:\Windows\SysWOW64\wmpnkt32.exe"C:\Windows\system32\wmpnkt32.exe" C:\Windows\SysWOW64\wmpnkt32.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5072 -
C:\Windows\SysWOW64\wmpnkt32.exe"C:\Windows\system32\wmpnkt32.exe" C:\Windows\SysWOW64\wmpnkt32.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2344 -
C:\Windows\SysWOW64\wmpnkt32.exe"C:\Windows\system32\wmpnkt32.exe" C:\Windows\SysWOW64\wmpnkt32.exe24⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:1396
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152KB
MD5677db9afd4a7dab39e559cbfcb8de21d
SHA1ddd9249eae614e40c351f953a59f73a3c9a066a9
SHA256c246562d445a87510ca922f72562f5643774f534d87150b5ea419f33e152fd10
SHA5122a64376f0f7dcc42620ff7a41c7000f7385c95818c0771ef056720c438ea9c318f2f572052c1d0024c4ae2d17c6169a9c94de82151513d57c92ecd8123d7f92e