Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 18:32
Static task
static1
Behavioral task
behavioral1
Sample
d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe
-
Size
160KB
-
MD5
d6e0f910f6dc906f6055af025b2ac200
-
SHA1
f6a2b1dc32defba4d19cf6b4411c564b8c775060
-
SHA256
2739685adca05cfa408b1f53f18e2aa4a410351faf26016ccb98feeb18f0c69c
-
SHA512
1203962dd7d08e242c462fbf836d0dc22718874d36370a5b31d486a43e412c64ae9626b6a7a5772944ad053645d075b84a2c2f91347fffb75aa87f0efa1f45a5
-
SSDEEP
3072:u2GtnZTaLPEXPyr8D1PHGvKxIYc4UCo7lYgCc1qRLHWKs:uRZIGKr8D1PdxIz4UCylZgdHW3
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2188 wnplt2.exe -
Executes dropped EXE 64 IoCs
pid Process 2332 wnplt2.exe 2188 wnplt2.exe 2628 wnplt2.exe 992 wnplt2.exe 2676 wnplt2.exe 1896 wnplt2.exe 1664 wnplt2.exe 2496 wnplt2.exe 2176 wnplt2.exe 404 wnplt2.exe 1528 wnplt2.exe 1876 wnplt2.exe 1788 wnplt2.exe 1420 wnplt2.exe 2328 wnplt2.exe 1932 wnplt2.exe 2104 wnplt2.exe 1704 wnplt2.exe 2620 wnplt2.exe 2812 wnplt2.exe 2232 wnplt2.exe 1084 wnplt2.exe 1364 wnplt2.exe 2940 wnplt2.exe 2204 wnplt2.exe 2272 wnplt2.exe 2276 wnplt2.exe 2952 wnplt2.exe 704 wnplt2.exe 1928 wnplt2.exe 2440 wnplt2.exe 324 wnplt2.exe 1276 wnplt2.exe 2508 wnplt2.exe 1708 wnplt2.exe 2396 wnplt2.exe 856 wnplt2.exe 2752 wnplt2.exe 2756 wnplt2.exe 3060 wnplt2.exe 2484 wnplt2.exe 1304 wnplt2.exe 1660 wnplt2.exe 820 wnplt2.exe 2204 wnplt2.exe 316 wnplt2.exe 1884 wnplt2.exe 676 wnplt2.exe 1528 wnplt2.exe 1376 wnplt2.exe 3016 wnplt2.exe 3020 wnplt2.exe 2088 wnplt2.exe 1560 wnplt2.exe 1244 wnplt2.exe 2880 wnplt2.exe 2824 wnplt2.exe 2456 wnplt2.exe 3064 wnplt2.exe 1224 wnplt2.exe 1656 wnplt2.exe 1716 wnplt2.exe 2016 wnplt2.exe 588 wnplt2.exe -
Loads dropped DLL 64 IoCs
pid Process 1384 d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe 1384 d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe 2188 wnplt2.exe 2188 wnplt2.exe 992 wnplt2.exe 992 wnplt2.exe 1896 wnplt2.exe 1896 wnplt2.exe 2496 wnplt2.exe 2496 wnplt2.exe 404 wnplt2.exe 404 wnplt2.exe 1876 wnplt2.exe 1876 wnplt2.exe 1420 wnplt2.exe 1420 wnplt2.exe 1932 wnplt2.exe 1932 wnplt2.exe 1704 wnplt2.exe 1704 wnplt2.exe 2812 wnplt2.exe 2812 wnplt2.exe 1084 wnplt2.exe 1084 wnplt2.exe 2940 wnplt2.exe 2940 wnplt2.exe 2272 wnplt2.exe 2272 wnplt2.exe 2952 wnplt2.exe 2952 wnplt2.exe 1928 wnplt2.exe 1928 wnplt2.exe 324 wnplt2.exe 324 wnplt2.exe 2508 wnplt2.exe 2508 wnplt2.exe 2396 wnplt2.exe 2396 wnplt2.exe 2752 wnplt2.exe 2752 wnplt2.exe 3060 wnplt2.exe 3060 wnplt2.exe 1304 wnplt2.exe 1304 wnplt2.exe 820 wnplt2.exe 820 wnplt2.exe 316 wnplt2.exe 316 wnplt2.exe 676 wnplt2.exe 676 wnplt2.exe 1376 wnplt2.exe 1376 wnplt2.exe 3020 wnplt2.exe 3020 wnplt2.exe 1560 wnplt2.exe 1560 wnplt2.exe 2880 wnplt2.exe 2880 wnplt2.exe 2456 wnplt2.exe 2456 wnplt2.exe 1224 wnplt2.exe 1224 wnplt2.exe 1716 wnplt2.exe 1716 wnplt2.exe -
resource yara_rule behavioral1/memory/1384-4-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1384-9-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1384-8-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1384-7-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1384-6-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1384-3-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1384-2-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1384-22-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2188-32-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2188-34-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2188-33-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2188-39-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/992-51-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/992-50-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/992-49-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/992-58-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1896-68-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1896-67-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1896-69-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1896-75-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2496-91-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/404-107-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1876-125-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1420-136-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1420-141-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1932-158-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1704-169-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1704-176-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2812-186-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2812-192-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1084-209-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2940-225-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2272-242-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2952-256-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1928-268-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/324-280-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2508-292-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2396-304-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2752-313-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2752-317-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/3060-329-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1304-339-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1304-342-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/820-354-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/316-366-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/676-378-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1376-390-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/3020-402-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1560-414-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2880-423-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2880-427-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2456-437-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2456-440-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1224-449-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1224-453-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1716-462-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1716-466-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/588-476-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/588-479-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1508-489-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1508-492-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1780-500-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1780-505-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2368-515-0x0000000000400000-0x0000000000468000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe -
Suspicious use of SetThreadContext 59 IoCs
description pid Process procid_target PID 1680 set thread context of 1384 1680 d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe 30 PID 2332 set thread context of 2188 2332 wnplt2.exe 32 PID 2628 set thread context of 992 2628 wnplt2.exe 35 PID 2676 set thread context of 1896 2676 wnplt2.exe 37 PID 1664 set thread context of 2496 1664 wnplt2.exe 39 PID 2176 set thread context of 404 2176 wnplt2.exe 41 PID 1528 set thread context of 1876 1528 wnplt2.exe 43 PID 1788 set thread context of 1420 1788 wnplt2.exe 45 PID 2328 set thread context of 1932 2328 wnplt2.exe 47 PID 2104 set thread context of 1704 2104 wnplt2.exe 49 PID 2620 set thread context of 2812 2620 wnplt2.exe 51 PID 2232 set thread context of 1084 2232 wnplt2.exe 53 PID 1364 set thread context of 2940 1364 wnplt2.exe 55 PID 2204 set thread context of 2272 2204 wnplt2.exe 57 PID 2276 set thread context of 2952 2276 wnplt2.exe 59 PID 704 set thread context of 1928 704 wnplt2.exe 61 PID 2440 set thread context of 324 2440 wnplt2.exe 63 PID 1276 set thread context of 2508 1276 wnplt2.exe 65 PID 1708 set thread context of 2396 1708 wnplt2.exe 67 PID 856 set thread context of 2752 856 wnplt2.exe 69 PID 2756 set thread context of 3060 2756 wnplt2.exe 71 PID 2484 set thread context of 1304 2484 wnplt2.exe 73 PID 1660 set thread context of 820 1660 wnplt2.exe 75 PID 2204 set thread context of 316 2204 wnplt2.exe 77 PID 1884 set thread context of 676 1884 wnplt2.exe 79 PID 1528 set thread context of 1376 1528 wnplt2.exe 81 PID 3016 set thread context of 3020 3016 wnplt2.exe 83 PID 2088 set thread context of 1560 2088 wnplt2.exe 85 PID 1244 set thread context of 2880 1244 wnplt2.exe 87 PID 2824 set thread context of 2456 2824 wnplt2.exe 89 PID 3064 set thread context of 1224 3064 wnplt2.exe 91 PID 1656 set thread context of 1716 1656 wnplt2.exe 93 PID 2016 set thread context of 588 2016 wnplt2.exe 95 PID 1208 set thread context of 1508 1208 wnplt2.exe 97 PID 2512 set thread context of 1780 2512 wnplt2.exe 99 PID 2224 set thread context of 2368 2224 wnplt2.exe 101 PID 1644 set thread context of 2972 1644 wnplt2.exe 103 PID 1708 set thread context of 2372 1708 wnplt2.exe 105 PID 2220 set thread context of 2728 2220 wnplt2.exe 107 PID 2680 set thread context of 1520 2680 wnplt2.exe 109 PID 1880 set thread context of 2720 1880 wnplt2.exe 111 PID 1452 set thread context of 2024 1452 wnplt2.exe 113 PID 1032 set thread context of 1328 1032 wnplt2.exe 115 PID 1768 set thread context of 880 1768 wnplt2.exe 117 PID 1888 set thread context of 1504 1888 wnplt2.exe 119 PID 2700 set thread context of 2348 2700 wnplt2.exe 121 PID 3032 set thread context of 472 3032 wnplt2.exe 123 PID 2816 set thread context of 1940 2816 wnplt2.exe 125 PID 2844 set thread context of 1140 2844 wnplt2.exe 127 PID 3068 set thread context of 2796 3068 wnplt2.exe 129 PID 1964 set thread context of 1544 1964 wnplt2.exe 131 PID 1572 set thread context of 2192 1572 wnplt2.exe 133 PID 1308 set thread context of 704 1308 wnplt2.exe 135 PID 2056 set thread context of 560 2056 wnplt2.exe 137 PID 1628 set thread context of 2184 1628 wnplt2.exe 139 PID 688 set thread context of 896 688 wnplt2.exe 141 PID 2900 set thread context of 1244 2900 wnplt2.exe 143 PID 2980 set thread context of 2824 2980 wnplt2.exe 145 PID 2632 set thread context of 3056 2632 wnplt2.exe 147 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe -
Suspicious behavior: EnumeratesProcesses 59 IoCs
pid Process 1384 d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe 2188 wnplt2.exe 992 wnplt2.exe 1896 wnplt2.exe 2496 wnplt2.exe 404 wnplt2.exe 1876 wnplt2.exe 1420 wnplt2.exe 1932 wnplt2.exe 1704 wnplt2.exe 2812 wnplt2.exe 1084 wnplt2.exe 2940 wnplt2.exe 2272 wnplt2.exe 2952 wnplt2.exe 1928 wnplt2.exe 324 wnplt2.exe 2508 wnplt2.exe 2396 wnplt2.exe 2752 wnplt2.exe 3060 wnplt2.exe 1304 wnplt2.exe 820 wnplt2.exe 316 wnplt2.exe 676 wnplt2.exe 1376 wnplt2.exe 3020 wnplt2.exe 1560 wnplt2.exe 2880 wnplt2.exe 2456 wnplt2.exe 1224 wnplt2.exe 1716 wnplt2.exe 588 wnplt2.exe 1508 wnplt2.exe 1780 wnplt2.exe 2368 wnplt2.exe 2972 wnplt2.exe 2372 wnplt2.exe 2728 wnplt2.exe 1520 wnplt2.exe 2720 wnplt2.exe 2024 wnplt2.exe 1328 wnplt2.exe 880 wnplt2.exe 1504 wnplt2.exe 2348 wnplt2.exe 472 wnplt2.exe 1940 wnplt2.exe 1140 wnplt2.exe 2796 wnplt2.exe 1544 wnplt2.exe 2192 wnplt2.exe 704 wnplt2.exe 560 wnplt2.exe 2184 wnplt2.exe 896 wnplt2.exe 1244 wnplt2.exe 2824 wnplt2.exe 3056 wnplt2.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1680 wrote to memory of 1384 1680 d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe 30 PID 1680 wrote to memory of 1384 1680 d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe 30 PID 1680 wrote to memory of 1384 1680 d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe 30 PID 1680 wrote to memory of 1384 1680 d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe 30 PID 1680 wrote to memory of 1384 1680 d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe 30 PID 1680 wrote to memory of 1384 1680 d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe 30 PID 1680 wrote to memory of 1384 1680 d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe 30 PID 1384 wrote to memory of 2332 1384 d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe 31 PID 1384 wrote to memory of 2332 1384 d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe 31 PID 1384 wrote to memory of 2332 1384 d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe 31 PID 1384 wrote to memory of 2332 1384 d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe 31 PID 2332 wrote to memory of 2188 2332 wnplt2.exe 32 PID 2332 wrote to memory of 2188 2332 wnplt2.exe 32 PID 2332 wrote to memory of 2188 2332 wnplt2.exe 32 PID 2332 wrote to memory of 2188 2332 wnplt2.exe 32 PID 2332 wrote to memory of 2188 2332 wnplt2.exe 32 PID 2332 wrote to memory of 2188 2332 wnplt2.exe 32 PID 2332 wrote to memory of 2188 2332 wnplt2.exe 32 PID 2188 wrote to memory of 2628 2188 wnplt2.exe 34 PID 2188 wrote to memory of 2628 2188 wnplt2.exe 34 PID 2188 wrote to memory of 2628 2188 wnplt2.exe 34 PID 2188 wrote to memory of 2628 2188 wnplt2.exe 34 PID 2628 wrote to memory of 992 2628 wnplt2.exe 35 PID 2628 wrote to memory of 992 2628 wnplt2.exe 35 PID 2628 wrote to memory of 992 2628 wnplt2.exe 35 PID 2628 wrote to memory of 992 2628 wnplt2.exe 35 PID 2628 wrote to memory of 992 2628 wnplt2.exe 35 PID 2628 wrote to memory of 992 2628 wnplt2.exe 35 PID 2628 wrote to memory of 992 2628 wnplt2.exe 35 PID 992 wrote to memory of 2676 992 wnplt2.exe 36 PID 992 wrote to memory of 2676 992 wnplt2.exe 36 PID 992 wrote to memory of 2676 992 wnplt2.exe 36 PID 992 wrote to memory of 2676 992 wnplt2.exe 36 PID 2676 wrote to memory of 1896 2676 wnplt2.exe 37 PID 2676 wrote to memory of 1896 2676 wnplt2.exe 37 PID 2676 wrote to memory of 1896 2676 wnplt2.exe 37 PID 2676 wrote to memory of 1896 2676 wnplt2.exe 37 PID 2676 wrote to memory of 1896 2676 wnplt2.exe 37 PID 2676 wrote to memory of 1896 2676 wnplt2.exe 37 PID 2676 wrote to memory of 1896 2676 wnplt2.exe 37 PID 1896 wrote to memory of 1664 1896 wnplt2.exe 38 PID 1896 wrote to memory of 1664 1896 wnplt2.exe 38 PID 1896 wrote to memory of 1664 1896 wnplt2.exe 38 PID 1896 wrote to memory of 1664 1896 wnplt2.exe 38 PID 1664 wrote to memory of 2496 1664 wnplt2.exe 39 PID 1664 wrote to memory of 2496 1664 wnplt2.exe 39 PID 1664 wrote to memory of 2496 1664 wnplt2.exe 39 PID 1664 wrote to memory of 2496 1664 wnplt2.exe 39 PID 1664 wrote to memory of 2496 1664 wnplt2.exe 39 PID 1664 wrote to memory of 2496 1664 wnplt2.exe 39 PID 1664 wrote to memory of 2496 1664 wnplt2.exe 39 PID 2496 wrote to memory of 2176 2496 wnplt2.exe 40 PID 2496 wrote to memory of 2176 2496 wnplt2.exe 40 PID 2496 wrote to memory of 2176 2496 wnplt2.exe 40 PID 2496 wrote to memory of 2176 2496 wnplt2.exe 40 PID 2176 wrote to memory of 404 2176 wnplt2.exe 41 PID 2176 wrote to memory of 404 2176 wnplt2.exe 41 PID 2176 wrote to memory of 404 2176 wnplt2.exe 41 PID 2176 wrote to memory of 404 2176 wnplt2.exe 41 PID 2176 wrote to memory of 404 2176 wnplt2.exe 41 PID 2176 wrote to memory of 404 2176 wnplt2.exe 41 PID 2176 wrote to memory of 404 2176 wnplt2.exe 41 PID 404 wrote to memory of 1528 404 wnplt2.exe 42 PID 404 wrote to memory of 1528 404 wnplt2.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Users\Admin\AppData\Local\Temp\D6E0F9~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Users\Admin\AppData\Local\Temp\D6E0F9~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1528 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1876 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1788 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1420 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2328 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1932 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2104 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1704 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2620 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2812 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2232 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1084 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1364 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2940 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2204 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2272 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2276 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2952 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:704 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1928 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2440 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe34⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:324 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1276 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe36⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2508 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1708 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe38⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2396 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:856 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe40⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2752 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2756 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe42⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3060 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2484 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe44⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1304 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1660 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe46⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:820 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2204 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe48⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:316 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1884 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe50⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:676 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1528 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe52⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1376 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3016 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe54⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3020 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2088 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe56⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:1560 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1244 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe58⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2880 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2824 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe60⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2456 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3064 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe62⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1224 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1656 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe64⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1716 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2016 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe66⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:588 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe67⤵
- Suspicious use of SetThreadContext
PID:1208 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe68⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1508 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe69⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2512 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe70⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1780 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe71⤵
- Suspicious use of SetThreadContext
PID:2224 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe72⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2368 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe73⤵
- Suspicious use of SetThreadContext
PID:1644 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe74⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2972 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe75⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1708 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe76⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2372 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe77⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2220 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe78⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2728 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe79⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2680 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe80⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1520 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe81⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1880 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe82⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2720 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe83⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1452 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe84⤵
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2024 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe85⤵
- Suspicious use of SetThreadContext
PID:1032 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe86⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1328 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe87⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1768 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe88⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:880 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe89⤵
- Suspicious use of SetThreadContext
PID:1888 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe90⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1504 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe91⤵
- Suspicious use of SetThreadContext
PID:2700 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe92⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2348 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe93⤵
- Suspicious use of SetThreadContext
PID:3032 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe94⤵
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:472 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe95⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2816 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe96⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1940 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe97⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2844 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe98⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1140 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe99⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3068 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe100⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2796 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe101⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1964 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe102⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1544 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe103⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1572 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe104⤵
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2192 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe105⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1308 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe106⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:704 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe107⤵
- Suspicious use of SetThreadContext
PID:2056 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe108⤵
- Suspicious behavior: EnumeratesProcesses
PID:560 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe109⤵
- Suspicious use of SetThreadContext
PID:1628 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe110⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2184 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe111⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:688 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe112⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:896 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe113⤵
- Suspicious use of SetThreadContext
PID:2900 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe114⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1244 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe115⤵
- Suspicious use of SetThreadContext
PID:2980 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe116⤵
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2824 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe117⤵
- Suspicious use of SetThreadContext
PID:2632 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe118⤵
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:3056
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160KB
MD5d6e0f910f6dc906f6055af025b2ac200
SHA1f6a2b1dc32defba4d19cf6b4411c564b8c775060
SHA2562739685adca05cfa408b1f53f18e2aa4a410351faf26016ccb98feeb18f0c69c
SHA5121203962dd7d08e242c462fbf836d0dc22718874d36370a5b31d486a43e412c64ae9626b6a7a5772944ad053645d075b84a2c2f91347fffb75aa87f0efa1f45a5