Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10-08-2024 14:04
Static task
static1
Behavioral task
behavioral1
Sample
86584144a2d1a5daba6742ad57990711_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
86584144a2d1a5daba6742ad57990711_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
86584144a2d1a5daba6742ad57990711_JaffaCakes118.exe
-
Size
168KB
-
MD5
86584144a2d1a5daba6742ad57990711
-
SHA1
75b11e27bfe8c0368d5cde98243a5ce98cf6057d
-
SHA256
17692e2c673b9864ea7a1de50201c5ea584c97e873214decd521d19e88929a0f
-
SHA512
523b1b5937113f8993236893b48ca2b988b6a91c54d5dcbdb09a99aa3680aad0d9025d43639946b563ff1c790df56e3be8fe9c9d589d74b3b95e95dcfa1cc82e
-
SSDEEP
3072:4dSNzTtd65UuhJNf4mpDzKXtkpF7PE7mkUWGdVRfXDIXOqx:4+z6XhADXCpF7PcISr
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2696 wnpdx4.exe -
Executes dropped EXE 64 IoCs
pid Process 2688 wnpdx4.exe 2696 wnpdx4.exe 2652 wnpdx4.exe 2556 wnpdx4.exe 2832 wnpdx4.exe 2040 wnpdx4.exe 1120 wnpdx4.exe 2848 wnpdx4.exe 2816 wnpdx4.exe 2060 wnpdx4.exe 532 wnpdx4.exe 2076 wnpdx4.exe 2496 wnpdx4.exe 1820 wnpdx4.exe 2512 wnpdx4.exe 1736 wnpdx4.exe 1772 wnpdx4.exe 2316 wnpdx4.exe 1048 wnpdx4.exe 2240 wnpdx4.exe 3056 wnpdx4.exe 1572 wnpdx4.exe 2800 wnpdx4.exe 2648 wnpdx4.exe 2728 wnpdx4.exe 2676 wnpdx4.exe 2300 wnpdx4.exe 1280 wnpdx4.exe 2632 wnpdx4.exe 1928 wnpdx4.exe 3028 wnpdx4.exe 2524 wnpdx4.exe 2068 wnpdx4.exe 568 wnpdx4.exe 2964 wnpdx4.exe 2960 wnpdx4.exe 1356 wnpdx4.exe 924 wnpdx4.exe 2420 wnpdx4.exe 1004 wnpdx4.exe 1584 wnpdx4.exe 1028 wnpdx4.exe 276 wnpdx4.exe 2456 wnpdx4.exe 888 wnpdx4.exe 1496 wnpdx4.exe 2120 wnpdx4.exe 2112 wnpdx4.exe 2776 wnpdx4.exe 2544 wnpdx4.exe 2548 wnpdx4.exe 2652 wnpdx4.exe 1560 wnpdx4.exe 432 wnpdx4.exe 2396 wnpdx4.exe 2900 wnpdx4.exe 752 wnpdx4.exe 1740 wnpdx4.exe 1400 wnpdx4.exe 524 wnpdx4.exe 848 wnpdx4.exe 1856 wnpdx4.exe 972 wnpdx4.exe 2712 wnpdx4.exe -
Loads dropped DLL 64 IoCs
pid Process 1952 86584144a2d1a5daba6742ad57990711_JaffaCakes118.exe 1952 86584144a2d1a5daba6742ad57990711_JaffaCakes118.exe 2688 wnpdx4.exe 2696 wnpdx4.exe 2696 wnpdx4.exe 2556 wnpdx4.exe 2556 wnpdx4.exe 2040 wnpdx4.exe 2040 wnpdx4.exe 2848 wnpdx4.exe 2848 wnpdx4.exe 2060 wnpdx4.exe 2060 wnpdx4.exe 2076 wnpdx4.exe 2076 wnpdx4.exe 1820 wnpdx4.exe 1820 wnpdx4.exe 1736 wnpdx4.exe 1736 wnpdx4.exe 2316 wnpdx4.exe 2316 wnpdx4.exe 2240 wnpdx4.exe 2240 wnpdx4.exe 1572 wnpdx4.exe 1572 wnpdx4.exe 2648 wnpdx4.exe 2648 wnpdx4.exe 2676 wnpdx4.exe 2676 wnpdx4.exe 1280 wnpdx4.exe 1280 wnpdx4.exe 1928 wnpdx4.exe 1928 wnpdx4.exe 2524 wnpdx4.exe 2524 wnpdx4.exe 568 wnpdx4.exe 568 wnpdx4.exe 2960 wnpdx4.exe 2960 wnpdx4.exe 924 wnpdx4.exe 924 wnpdx4.exe 1004 wnpdx4.exe 1004 wnpdx4.exe 1028 wnpdx4.exe 1028 wnpdx4.exe 2456 wnpdx4.exe 2456 wnpdx4.exe 1496 wnpdx4.exe 1496 wnpdx4.exe 2112 wnpdx4.exe 2112 wnpdx4.exe 2544 wnpdx4.exe 2544 wnpdx4.exe 2652 wnpdx4.exe 2652 wnpdx4.exe 432 wnpdx4.exe 432 wnpdx4.exe 2900 wnpdx4.exe 2900 wnpdx4.exe 1740 wnpdx4.exe 1740 wnpdx4.exe 524 wnpdx4.exe 524 wnpdx4.exe 1856 wnpdx4.exe -
resource yara_rule behavioral1/memory/1952-2-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1952-3-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1952-4-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1952-6-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1952-7-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1952-9-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1952-8-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1952-20-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2696-32-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2696-33-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2696-37-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2556-47-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2556-49-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2556-48-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2556-53-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2040-64-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2040-70-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2848-80-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2848-87-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2060-98-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2060-97-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2060-99-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2060-107-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2076-115-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2076-123-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1820-139-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1736-149-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1736-157-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2316-167-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2316-174-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2240-184-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2240-192-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1572-202-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1572-209-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2648-225-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2676-235-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2676-241-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1280-251-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1280-254-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1928-266-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2524-278-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/568-287-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/568-291-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2960-300-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2960-304-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/924-313-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/924-317-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1004-329-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1028-338-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1028-342-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2456-351-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2456-355-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1496-364-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1496-368-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2112-377-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2112-383-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2544-390-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2544-394-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2652-403-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2652-407-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/432-415-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/432-420-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2900-429-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2900-433-0x0000000000400000-0x0000000000468000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 86584144a2d1a5daba6742ad57990711_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx4.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File created C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File created C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File opened for modification C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File opened for modification C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File opened for modification C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File opened for modification C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File opened for modification C:\Windows\SysWOW64\wnpdx4.exe 86584144a2d1a5daba6742ad57990711_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File opened for modification C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File opened for modification C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File created C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File opened for modification C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File opened for modification C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File opened for modification C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File created C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File created C:\Windows\SysWOW64\wnpdx4.exe 86584144a2d1a5daba6742ad57990711_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File opened for modification C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File opened for modification C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File opened for modification C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File opened for modification C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File opened for modification C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File opened for modification C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File created C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File opened for modification C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File opened for modification C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File opened for modification C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File opened for modification C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File opened for modification C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File created C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File created C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File created C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File created C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File created C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File created C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File opened for modification C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File opened for modification C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File opened for modification C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File created C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File created C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File created C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File opened for modification C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File created C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File created C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File created C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File opened for modification C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File opened for modification C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File opened for modification C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File created C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File opened for modification C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File opened for modification C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File created C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File created C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File created C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File created C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File created C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File opened for modification C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File created C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File opened for modification C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File created C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File created C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File created C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe File opened for modification C:\Windows\SysWOW64\wnpdx4.exe wnpdx4.exe -
Suspicious use of SetThreadContext 41 IoCs
description pid Process procid_target PID 2072 set thread context of 1952 2072 86584144a2d1a5daba6742ad57990711_JaffaCakes118.exe 30 PID 2688 set thread context of 2696 2688 wnpdx4.exe 32 PID 2652 set thread context of 2556 2652 wnpdx4.exe 34 PID 2832 set thread context of 2040 2832 wnpdx4.exe 36 PID 1120 set thread context of 2848 1120 wnpdx4.exe 38 PID 2816 set thread context of 2060 2816 wnpdx4.exe 40 PID 532 set thread context of 2076 532 wnpdx4.exe 42 PID 2496 set thread context of 1820 2496 wnpdx4.exe 44 PID 2512 set thread context of 1736 2512 wnpdx4.exe 46 PID 1772 set thread context of 2316 1772 wnpdx4.exe 48 PID 1048 set thread context of 2240 1048 wnpdx4.exe 50 PID 3056 set thread context of 1572 3056 wnpdx4.exe 52 PID 2800 set thread context of 2648 2800 wnpdx4.exe 54 PID 2728 set thread context of 2676 2728 wnpdx4.exe 56 PID 2300 set thread context of 1280 2300 wnpdx4.exe 58 PID 2632 set thread context of 1928 2632 wnpdx4.exe 60 PID 3028 set thread context of 2524 3028 wnpdx4.exe 62 PID 2068 set thread context of 568 2068 wnpdx4.exe 64 PID 2964 set thread context of 2960 2964 wnpdx4.exe 66 PID 1356 set thread context of 924 1356 wnpdx4.exe 68 PID 2420 set thread context of 1004 2420 wnpdx4.exe 70 PID 1584 set thread context of 1028 1584 wnpdx4.exe 72 PID 276 set thread context of 2456 276 wnpdx4.exe 74 PID 888 set thread context of 1496 888 wnpdx4.exe 76 PID 2120 set thread context of 2112 2120 wnpdx4.exe 78 PID 2776 set thread context of 2544 2776 wnpdx4.exe 80 PID 2548 set thread context of 2652 2548 wnpdx4.exe 82 PID 1560 set thread context of 432 1560 wnpdx4.exe 84 PID 2396 set thread context of 2900 2396 wnpdx4.exe 86 PID 752 set thread context of 1740 752 wnpdx4.exe 88 PID 1400 set thread context of 524 1400 wnpdx4.exe 90 PID 848 set thread context of 1856 848 wnpdx4.exe 92 PID 972 set thread context of 2712 972 wnpdx4.exe 94 PID 2196 set thread context of 388 2196 wnpdx4.exe 96 PID 2420 set thread context of 2360 2420 wnpdx4.exe 98 PID 1772 set thread context of 2856 1772 wnpdx4.exe 100 PID 236 set thread context of 688 236 wnpdx4.exe 102 PID 1600 set thread context of 2384 1600 wnpdx4.exe 104 PID 2684 set thread context of 2748 2684 wnpdx4.exe 106 PID 2564 set thread context of 2588 2564 wnpdx4.exe 108 PID 3008 set thread context of 3020 3008 wnpdx4.exe 110 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86584144a2d1a5daba6742ad57990711_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86584144a2d1a5daba6742ad57990711_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx4.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 1952 86584144a2d1a5daba6742ad57990711_JaffaCakes118.exe 2696 wnpdx4.exe 2556 wnpdx4.exe 2040 wnpdx4.exe 2848 wnpdx4.exe 2060 wnpdx4.exe 2076 wnpdx4.exe 1820 wnpdx4.exe 1736 wnpdx4.exe 2316 wnpdx4.exe 2240 wnpdx4.exe 1572 wnpdx4.exe 2648 wnpdx4.exe 2676 wnpdx4.exe 1280 wnpdx4.exe 1928 wnpdx4.exe 2524 wnpdx4.exe 568 wnpdx4.exe 2960 wnpdx4.exe 924 wnpdx4.exe 1004 wnpdx4.exe 1028 wnpdx4.exe 2456 wnpdx4.exe 1496 wnpdx4.exe 2112 wnpdx4.exe 2544 wnpdx4.exe 2652 wnpdx4.exe 432 wnpdx4.exe 2900 wnpdx4.exe 1740 wnpdx4.exe 524 wnpdx4.exe 1856 wnpdx4.exe 2712 wnpdx4.exe 388 wnpdx4.exe 2360 wnpdx4.exe 2856 wnpdx4.exe 688 wnpdx4.exe 2384 wnpdx4.exe 2748 wnpdx4.exe 2588 wnpdx4.exe 3020 wnpdx4.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2072 wrote to memory of 1952 2072 86584144a2d1a5daba6742ad57990711_JaffaCakes118.exe 30 PID 2072 wrote to memory of 1952 2072 86584144a2d1a5daba6742ad57990711_JaffaCakes118.exe 30 PID 2072 wrote to memory of 1952 2072 86584144a2d1a5daba6742ad57990711_JaffaCakes118.exe 30 PID 2072 wrote to memory of 1952 2072 86584144a2d1a5daba6742ad57990711_JaffaCakes118.exe 30 PID 2072 wrote to memory of 1952 2072 86584144a2d1a5daba6742ad57990711_JaffaCakes118.exe 30 PID 2072 wrote to memory of 1952 2072 86584144a2d1a5daba6742ad57990711_JaffaCakes118.exe 30 PID 2072 wrote to memory of 1952 2072 86584144a2d1a5daba6742ad57990711_JaffaCakes118.exe 30 PID 1952 wrote to memory of 2688 1952 86584144a2d1a5daba6742ad57990711_JaffaCakes118.exe 31 PID 1952 wrote to memory of 2688 1952 86584144a2d1a5daba6742ad57990711_JaffaCakes118.exe 31 PID 1952 wrote to memory of 2688 1952 86584144a2d1a5daba6742ad57990711_JaffaCakes118.exe 31 PID 1952 wrote to memory of 2688 1952 86584144a2d1a5daba6742ad57990711_JaffaCakes118.exe 31 PID 2688 wrote to memory of 2696 2688 wnpdx4.exe 32 PID 2688 wrote to memory of 2696 2688 wnpdx4.exe 32 PID 2688 wrote to memory of 2696 2688 wnpdx4.exe 32 PID 2688 wrote to memory of 2696 2688 wnpdx4.exe 32 PID 2688 wrote to memory of 2696 2688 wnpdx4.exe 32 PID 2688 wrote to memory of 2696 2688 wnpdx4.exe 32 PID 2688 wrote to memory of 2696 2688 wnpdx4.exe 32 PID 2696 wrote to memory of 2652 2696 wnpdx4.exe 33 PID 2696 wrote to memory of 2652 2696 wnpdx4.exe 33 PID 2696 wrote to memory of 2652 2696 wnpdx4.exe 33 PID 2696 wrote to memory of 2652 2696 wnpdx4.exe 33 PID 2652 wrote to memory of 2556 2652 wnpdx4.exe 34 PID 2652 wrote to memory of 2556 2652 wnpdx4.exe 34 PID 2652 wrote to memory of 2556 2652 wnpdx4.exe 34 PID 2652 wrote to memory of 2556 2652 wnpdx4.exe 34 PID 2652 wrote to memory of 2556 2652 wnpdx4.exe 34 PID 2652 wrote to memory of 2556 2652 wnpdx4.exe 34 PID 2652 wrote to memory of 2556 2652 wnpdx4.exe 34 PID 2556 wrote to memory of 2832 2556 wnpdx4.exe 35 PID 2556 wrote to memory of 2832 2556 wnpdx4.exe 35 PID 2556 wrote to memory of 2832 2556 wnpdx4.exe 35 PID 2556 wrote to memory of 2832 2556 wnpdx4.exe 35 PID 2832 wrote to memory of 2040 2832 wnpdx4.exe 36 PID 2832 wrote to memory of 2040 2832 wnpdx4.exe 36 PID 2832 wrote to memory of 2040 2832 wnpdx4.exe 36 PID 2832 wrote to memory of 2040 2832 wnpdx4.exe 36 PID 2832 wrote to memory of 2040 2832 wnpdx4.exe 36 PID 2832 wrote to memory of 2040 2832 wnpdx4.exe 36 PID 2832 wrote to memory of 2040 2832 wnpdx4.exe 36 PID 2040 wrote to memory of 1120 2040 wnpdx4.exe 37 PID 2040 wrote to memory of 1120 2040 wnpdx4.exe 37 PID 2040 wrote to memory of 1120 2040 wnpdx4.exe 37 PID 2040 wrote to memory of 1120 2040 wnpdx4.exe 37 PID 1120 wrote to memory of 2848 1120 wnpdx4.exe 38 PID 1120 wrote to memory of 2848 1120 wnpdx4.exe 38 PID 1120 wrote to memory of 2848 1120 wnpdx4.exe 38 PID 1120 wrote to memory of 2848 1120 wnpdx4.exe 38 PID 1120 wrote to memory of 2848 1120 wnpdx4.exe 38 PID 1120 wrote to memory of 2848 1120 wnpdx4.exe 38 PID 1120 wrote to memory of 2848 1120 wnpdx4.exe 38 PID 2848 wrote to memory of 2816 2848 wnpdx4.exe 39 PID 2848 wrote to memory of 2816 2848 wnpdx4.exe 39 PID 2848 wrote to memory of 2816 2848 wnpdx4.exe 39 PID 2848 wrote to memory of 2816 2848 wnpdx4.exe 39 PID 2816 wrote to memory of 2060 2816 wnpdx4.exe 40 PID 2816 wrote to memory of 2060 2816 wnpdx4.exe 40 PID 2816 wrote to memory of 2060 2816 wnpdx4.exe 40 PID 2816 wrote to memory of 2060 2816 wnpdx4.exe 40 PID 2816 wrote to memory of 2060 2816 wnpdx4.exe 40 PID 2816 wrote to memory of 2060 2816 wnpdx4.exe 40 PID 2816 wrote to memory of 2060 2816 wnpdx4.exe 40 PID 2060 wrote to memory of 532 2060 wnpdx4.exe 41 PID 2060 wrote to memory of 532 2060 wnpdx4.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\86584144a2d1a5daba6742ad57990711_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\86584144a2d1a5daba6742ad57990711_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\86584144a2d1a5daba6742ad57990711_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\86584144a2d1a5daba6742ad57990711_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Users\Admin\AppData\Local\Temp\865841~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Users\Admin\AppData\Local\Temp\865841~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:532 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2076 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2496 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1820 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2512 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1736 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1772 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2316 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1048 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2240 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3056 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1572 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2800 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2648 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2728 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2676 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2300 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1280 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2632 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1928 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3028 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe34⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2524 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2068 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe36⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:568 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2964 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe38⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2960 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1356 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe40⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:924 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2420 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe42⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1004 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1584 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe44⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1028 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:276 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe46⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2456 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:888 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe48⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1496 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2120 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe50⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2112 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2776 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe52⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2544 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2548 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe54⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2652 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1560 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe56⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:432 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2396 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe58⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2900 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:752 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe60⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1740 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1400 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe62⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:524 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:848 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe64⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1856 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:972 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe66⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2712 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe67⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2196 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe68⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:388 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe69⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2420 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe70⤵
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2360 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe71⤵
- Suspicious use of SetThreadContext
PID:1772 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe72⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2856 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe73⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:236 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe74⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:688 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe75⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1600 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe76⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2384 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe77⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2684 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe78⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2748 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe79⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2564 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe80⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2588 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe81⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3008 -
C:\Windows\SysWOW64\wnpdx4.exe"C:\Windows\system32\wnpdx4.exe" C:\Windows\SysWOW64\wnpdx4.exe82⤵
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:3020
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD586584144a2d1a5daba6742ad57990711
SHA175b11e27bfe8c0368d5cde98243a5ce98cf6057d
SHA25617692e2c673b9864ea7a1de50201c5ea584c97e873214decd521d19e88929a0f
SHA512523b1b5937113f8993236893b48ca2b988b6a91c54d5dcbdb09a99aa3680aad0d9025d43639946b563ff1c790df56e3be8fe9c9d589d74b3b95e95dcfa1cc82e