Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 03:00
Static task
static1
Behavioral task
behavioral1
Sample
Picture22.JPG_www.epicfilehost.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Picture22.JPG_www.epicfilehost.exe
Resource
win10v2004-20240802-en
General
-
Target
Picture22.JPG_www.epicfilehost.exe
-
Size
202KB
-
MD5
22b6b57cdb76d009afe4e03833f4efdb
-
SHA1
070aa9f1ecb2b53e5cd4ffea50b6f43d1df8d197
-
SHA256
71de123238bfa174acdc350bb308b10e4566905ce74168010a420eec9ce36e0d
-
SHA512
37aaebef5a36c4c934926fd075e674486a7dc3ca828704261d63a30ba3821e19e5d0256e834d325bca644eb3167661528f13cad02d89e78eba6787eee98f8216
-
SSDEEP
3072:LDnsNLa+VJiA5NNXBMRiOo5gZFqfgXTx7ZtnabuPmZHQC528pSqG4/mcY:8aO9xOoyzQYRZJgfJQC57e4w
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2712 wmpdtv32.exe -
Executes dropped EXE 32 IoCs
pid Process 2812 wmpdtv32.exe 2712 wmpdtv32.exe 1524 wmpdtv32.exe 1972 wmpdtv32.exe 1784 wmpdtv32.exe 2000 wmpdtv32.exe 1496 wmpdtv32.exe 2284 wmpdtv32.exe 2124 wmpdtv32.exe 1396 wmpdtv32.exe 1776 wmpdtv32.exe 832 wmpdtv32.exe 1960 wmpdtv32.exe 2104 wmpdtv32.exe 2064 wmpdtv32.exe 2892 wmpdtv32.exe 2148 wmpdtv32.exe 1608 wmpdtv32.exe 2380 wmpdtv32.exe 2660 wmpdtv32.exe 2340 wmpdtv32.exe 1028 wmpdtv32.exe 2872 wmpdtv32.exe 1488 wmpdtv32.exe 1752 wmpdtv32.exe 1192 wmpdtv32.exe 1756 wmpdtv32.exe 1132 wmpdtv32.exe 2140 wmpdtv32.exe 912 wmpdtv32.exe 1092 wmpdtv32.exe 1312 wmpdtv32.exe -
Loads dropped DLL 32 IoCs
pid Process 2396 Picture22.JPG_www.epicfilehost.exe 2812 wmpdtv32.exe 2712 wmpdtv32.exe 1524 wmpdtv32.exe 1972 wmpdtv32.exe 1784 wmpdtv32.exe 2000 wmpdtv32.exe 1496 wmpdtv32.exe 2284 wmpdtv32.exe 2124 wmpdtv32.exe 1396 wmpdtv32.exe 1776 wmpdtv32.exe 832 wmpdtv32.exe 1960 wmpdtv32.exe 2104 wmpdtv32.exe 2064 wmpdtv32.exe 2892 wmpdtv32.exe 2148 wmpdtv32.exe 1608 wmpdtv32.exe 2380 wmpdtv32.exe 2660 wmpdtv32.exe 2340 wmpdtv32.exe 1028 wmpdtv32.exe 2872 wmpdtv32.exe 1488 wmpdtv32.exe 1752 wmpdtv32.exe 1192 wmpdtv32.exe 1756 wmpdtv32.exe 1132 wmpdtv32.exe 2140 wmpdtv32.exe 912 wmpdtv32.exe 1092 wmpdtv32.exe -
resource yara_rule behavioral1/memory/2396-4-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2396-3-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2396-6-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2396-2-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2396-7-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2396-9-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2396-8-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2396-19-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2712-30-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2712-32-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2712-31-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2712-34-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2712-40-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/1972-51-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/1972-57-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2000-68-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2000-75-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2284-85-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2284-86-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2284-91-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/1396-102-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/1396-109-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/832-120-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/832-126-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2104-137-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2104-144-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2892-154-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2892-161-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/1608-172-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/1608-178-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2660-194-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/1028-210-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/1488-221-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/1488-227-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/1192-238-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/1192-244-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/1132-254-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/1132-257-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/912-265-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/912-270-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/1312-279-0x0000000000400000-0x000000000045A000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 32 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 Picture22.JPG_www.epicfilehost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Picture22.JPG_www.epicfilehost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe -
Drops file in System32 directory 48 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe Picture22.JPG_www.epicfilehost.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe Picture22.JPG_www.epicfilehost.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ Picture22.JPG_www.epicfilehost.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe -
Suspicious use of SetThreadContext 17 IoCs
description pid Process procid_target PID 3048 set thread context of 2396 3048 Picture22.JPG_www.epicfilehost.exe 30 PID 2812 set thread context of 2712 2812 wmpdtv32.exe 32 PID 1524 set thread context of 1972 1524 wmpdtv32.exe 34 PID 1784 set thread context of 2000 1784 wmpdtv32.exe 36 PID 1496 set thread context of 2284 1496 wmpdtv32.exe 38 PID 2124 set thread context of 1396 2124 wmpdtv32.exe 40 PID 1776 set thread context of 832 1776 wmpdtv32.exe 42 PID 1960 set thread context of 2104 1960 wmpdtv32.exe 44 PID 2064 set thread context of 2892 2064 wmpdtv32.exe 47 PID 2148 set thread context of 1608 2148 wmpdtv32.exe 49 PID 2380 set thread context of 2660 2380 wmpdtv32.exe 51 PID 2340 set thread context of 1028 2340 wmpdtv32.exe 53 PID 2872 set thread context of 1488 2872 wmpdtv32.exe 55 PID 1752 set thread context of 1192 1752 wmpdtv32.exe 57 PID 1756 set thread context of 1132 1756 wmpdtv32.exe 59 PID 2140 set thread context of 912 2140 wmpdtv32.exe 61 PID 1092 set thread context of 1312 1092 wmpdtv32.exe 63 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 33 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Picture22.JPG_www.epicfilehost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Picture22.JPG_www.epicfilehost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2396 Picture22.JPG_www.epicfilehost.exe 2396 Picture22.JPG_www.epicfilehost.exe 2712 wmpdtv32.exe 2712 wmpdtv32.exe 1972 wmpdtv32.exe 1972 wmpdtv32.exe 2000 wmpdtv32.exe 2000 wmpdtv32.exe 2284 wmpdtv32.exe 2284 wmpdtv32.exe 1396 wmpdtv32.exe 1396 wmpdtv32.exe 832 wmpdtv32.exe 832 wmpdtv32.exe 2104 wmpdtv32.exe 2104 wmpdtv32.exe 2892 wmpdtv32.exe 2892 wmpdtv32.exe 1608 wmpdtv32.exe 1608 wmpdtv32.exe 2660 wmpdtv32.exe 2660 wmpdtv32.exe 1028 wmpdtv32.exe 1028 wmpdtv32.exe 1488 wmpdtv32.exe 1488 wmpdtv32.exe 1192 wmpdtv32.exe 1192 wmpdtv32.exe 1132 wmpdtv32.exe 1132 wmpdtv32.exe 912 wmpdtv32.exe 912 wmpdtv32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2396 3048 Picture22.JPG_www.epicfilehost.exe 30 PID 3048 wrote to memory of 2396 3048 Picture22.JPG_www.epicfilehost.exe 30 PID 3048 wrote to memory of 2396 3048 Picture22.JPG_www.epicfilehost.exe 30 PID 3048 wrote to memory of 2396 3048 Picture22.JPG_www.epicfilehost.exe 30 PID 3048 wrote to memory of 2396 3048 Picture22.JPG_www.epicfilehost.exe 30 PID 3048 wrote to memory of 2396 3048 Picture22.JPG_www.epicfilehost.exe 30 PID 3048 wrote to memory of 2396 3048 Picture22.JPG_www.epicfilehost.exe 30 PID 2396 wrote to memory of 2812 2396 Picture22.JPG_www.epicfilehost.exe 31 PID 2396 wrote to memory of 2812 2396 Picture22.JPG_www.epicfilehost.exe 31 PID 2396 wrote to memory of 2812 2396 Picture22.JPG_www.epicfilehost.exe 31 PID 2396 wrote to memory of 2812 2396 Picture22.JPG_www.epicfilehost.exe 31 PID 2812 wrote to memory of 2712 2812 wmpdtv32.exe 32 PID 2812 wrote to memory of 2712 2812 wmpdtv32.exe 32 PID 2812 wrote to memory of 2712 2812 wmpdtv32.exe 32 PID 2812 wrote to memory of 2712 2812 wmpdtv32.exe 32 PID 2812 wrote to memory of 2712 2812 wmpdtv32.exe 32 PID 2812 wrote to memory of 2712 2812 wmpdtv32.exe 32 PID 2812 wrote to memory of 2712 2812 wmpdtv32.exe 32 PID 2712 wrote to memory of 1524 2712 wmpdtv32.exe 33 PID 2712 wrote to memory of 1524 2712 wmpdtv32.exe 33 PID 2712 wrote to memory of 1524 2712 wmpdtv32.exe 33 PID 2712 wrote to memory of 1524 2712 wmpdtv32.exe 33 PID 1524 wrote to memory of 1972 1524 wmpdtv32.exe 34 PID 1524 wrote to memory of 1972 1524 wmpdtv32.exe 34 PID 1524 wrote to memory of 1972 1524 wmpdtv32.exe 34 PID 1524 wrote to memory of 1972 1524 wmpdtv32.exe 34 PID 1524 wrote to memory of 1972 1524 wmpdtv32.exe 34 PID 1524 wrote to memory of 1972 1524 wmpdtv32.exe 34 PID 1524 wrote to memory of 1972 1524 wmpdtv32.exe 34 PID 1972 wrote to memory of 1784 1972 wmpdtv32.exe 35 PID 1972 wrote to memory of 1784 1972 wmpdtv32.exe 35 PID 1972 wrote to memory of 1784 1972 wmpdtv32.exe 35 PID 1972 wrote to memory of 1784 1972 wmpdtv32.exe 35 PID 1784 wrote to memory of 2000 1784 wmpdtv32.exe 36 PID 1784 wrote to memory of 2000 1784 wmpdtv32.exe 36 PID 1784 wrote to memory of 2000 1784 wmpdtv32.exe 36 PID 1784 wrote to memory of 2000 1784 wmpdtv32.exe 36 PID 1784 wrote to memory of 2000 1784 wmpdtv32.exe 36 PID 1784 wrote to memory of 2000 1784 wmpdtv32.exe 36 PID 1784 wrote to memory of 2000 1784 wmpdtv32.exe 36 PID 2000 wrote to memory of 1496 2000 wmpdtv32.exe 37 PID 2000 wrote to memory of 1496 2000 wmpdtv32.exe 37 PID 2000 wrote to memory of 1496 2000 wmpdtv32.exe 37 PID 2000 wrote to memory of 1496 2000 wmpdtv32.exe 37 PID 1496 wrote to memory of 2284 1496 wmpdtv32.exe 38 PID 1496 wrote to memory of 2284 1496 wmpdtv32.exe 38 PID 1496 wrote to memory of 2284 1496 wmpdtv32.exe 38 PID 1496 wrote to memory of 2284 1496 wmpdtv32.exe 38 PID 1496 wrote to memory of 2284 1496 wmpdtv32.exe 38 PID 1496 wrote to memory of 2284 1496 wmpdtv32.exe 38 PID 1496 wrote to memory of 2284 1496 wmpdtv32.exe 38 PID 2284 wrote to memory of 2124 2284 wmpdtv32.exe 39 PID 2284 wrote to memory of 2124 2284 wmpdtv32.exe 39 PID 2284 wrote to memory of 2124 2284 wmpdtv32.exe 39 PID 2284 wrote to memory of 2124 2284 wmpdtv32.exe 39 PID 2124 wrote to memory of 1396 2124 wmpdtv32.exe 40 PID 2124 wrote to memory of 1396 2124 wmpdtv32.exe 40 PID 2124 wrote to memory of 1396 2124 wmpdtv32.exe 40 PID 2124 wrote to memory of 1396 2124 wmpdtv32.exe 40 PID 2124 wrote to memory of 1396 2124 wmpdtv32.exe 40 PID 2124 wrote to memory of 1396 2124 wmpdtv32.exe 40 PID 2124 wrote to memory of 1396 2124 wmpdtv32.exe 40 PID 1396 wrote to memory of 1776 1396 wmpdtv32.exe 41 PID 1396 wrote to memory of 1776 1396 wmpdtv32.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\Picture22.JPG_www.epicfilehost.exe"C:\Users\Admin\AppData\Local\Temp\Picture22.JPG_www.epicfilehost.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\Picture22.JPG_www.epicfilehost.exe"C:\Users\Admin\AppData\Local\Temp\Picture22.JPG_www.epicfilehost.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Users\Admin\AppData\Local\Temp\PICTUR~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Users\Admin\AppData\Local\Temp\PICTUR~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1776 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:832 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1960 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2104 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2064 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2892 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2148 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1608 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2380 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2660 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2340 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1028 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2872 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1488 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1752 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1192 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1756 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1132 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2140 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:912 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe33⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1092 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe34⤵
- Executes dropped EXE
PID:1312
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202KB
MD522b6b57cdb76d009afe4e03833f4efdb
SHA1070aa9f1ecb2b53e5cd4ffea50b6f43d1df8d197
SHA25671de123238bfa174acdc350bb308b10e4566905ce74168010a420eec9ce36e0d
SHA51237aaebef5a36c4c934926fd075e674486a7dc3ca828704261d63a30ba3821e19e5d0256e834d325bca644eb3167661528f13cad02d89e78eba6787eee98f8216