Analysis
-
max time kernel
150s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 18:32
Static task
static1
Behavioral task
behavioral1
Sample
d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe
-
Size
160KB
-
MD5
d6e0f910f6dc906f6055af025b2ac200
-
SHA1
f6a2b1dc32defba4d19cf6b4411c564b8c775060
-
SHA256
2739685adca05cfa408b1f53f18e2aa4a410351faf26016ccb98feeb18f0c69c
-
SHA512
1203962dd7d08e242c462fbf836d0dc22718874d36370a5b31d486a43e412c64ae9626b6a7a5772944ad053645d075b84a2c2f91347fffb75aa87f0efa1f45a5
-
SSDEEP
3072:u2GtnZTaLPEXPyr8D1PHGvKxIYc4UCo7lYgCc1qRLHWKs:uRZIGKr8D1PdxIz4UCylZgdHW3
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings 2 TTPs 46 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnplt2.exe -
Deletes itself 1 IoCs
pid Process 4120 wnplt2.exe -
Executes dropped EXE 64 IoCs
pid Process 1524 wnplt2.exe 4120 wnplt2.exe 3000 wnplt2.exe 1716 wnplt2.exe 2668 wnplt2.exe 456 wnplt2.exe 3112 wnplt2.exe 3500 wnplt2.exe 2760 wnplt2.exe 4500 wnplt2.exe 3628 wnplt2.exe 3324 wnplt2.exe 4972 wnplt2.exe 1304 wnplt2.exe 216 wnplt2.exe 4904 wnplt2.exe 4064 wnplt2.exe 1980 wnplt2.exe 4100 wnplt2.exe 1808 wnplt2.exe 2140 wnplt2.exe 1160 wnplt2.exe 2440 wnplt2.exe 2040 wnplt2.exe 4932 wnplt2.exe 4548 wnplt2.exe 1452 wnplt2.exe 1556 wnplt2.exe 4236 wnplt2.exe 1064 wnplt2.exe 3300 wnplt2.exe 1168 wnplt2.exe 2308 wnplt2.exe 1468 wnplt2.exe 2412 wnplt2.exe 1344 wnplt2.exe 3496 wnplt2.exe 3652 wnplt2.exe 4932 wnplt2.exe 4680 wnplt2.exe 1784 wnplt2.exe 2768 wnplt2.exe 4060 wnplt2.exe 216 wnplt2.exe 2928 wnplt2.exe 2120 wnplt2.exe 4952 wnplt2.exe 2700 wnplt2.exe 860 wnplt2.exe 652 wnplt2.exe 4520 wnplt2.exe 2704 wnplt2.exe 2440 wnplt2.exe 3680 wnplt2.exe 4348 wnplt2.exe 5064 wnplt2.exe 4996 wnplt2.exe 5004 wnplt2.exe 868 wnplt2.exe 2480 wnplt2.exe 4060 wnplt2.exe 1504 wnplt2.exe 2256 wnplt2.exe 2892 wnplt2.exe -
resource yara_rule behavioral2/memory/1536-0-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/1536-2-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/1536-4-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/1536-3-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/1536-38-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/4120-44-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/4120-43-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/4120-45-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/4120-47-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/1716-52-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/1716-53-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/1716-54-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/456-62-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/3500-69-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/4500-74-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/4500-77-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/3324-84-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/1304-89-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/1304-90-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/1304-88-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/1304-92-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/4904-96-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/4904-97-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/4904-98-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/4904-102-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/1980-108-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/1808-115-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/1808-117-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/1160-122-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/1160-124-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/2040-133-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/4548-139-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/4548-144-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/1556-152-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/1064-160-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/1168-164-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/1168-169-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/1468-173-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/1468-178-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/1344-186-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/3652-190-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/3652-195-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/4680-203-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/2768-208-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/2768-212-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/216-220-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/2120-226-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/2700-232-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/652-236-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/652-239-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/2704-245-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/3680-251-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/5064-257-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/5004-260-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/5004-264-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/2480-270-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/1504-276-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/2892-282-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/2680-286-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/2680-289-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/3228-292-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/3228-296-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/2152-302-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/2784-308-0x0000000000400000-0x0000000000468000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt2.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File opened for modification C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe File created C:\Windows\SysWOW64\wnplt2.exe wnplt2.exe -
Suspicious use of SetThreadContext 46 IoCs
description pid Process procid_target PID 3268 set thread context of 1536 3268 d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe 83 PID 1524 set thread context of 4120 1524 wnplt2.exe 89 PID 3000 set thread context of 1716 3000 wnplt2.exe 92 PID 2668 set thread context of 456 2668 wnplt2.exe 96 PID 3112 set thread context of 3500 3112 wnplt2.exe 100 PID 2760 set thread context of 4500 2760 wnplt2.exe 103 PID 3628 set thread context of 3324 3628 wnplt2.exe 107 PID 4972 set thread context of 1304 4972 wnplt2.exe 109 PID 216 set thread context of 4904 216 wnplt2.exe 111 PID 4064 set thread context of 1980 4064 wnplt2.exe 113 PID 4100 set thread context of 1808 4100 wnplt2.exe 116 PID 2140 set thread context of 1160 2140 wnplt2.exe 118 PID 2440 set thread context of 2040 2440 wnplt2.exe 120 PID 4932 set thread context of 4548 4932 wnplt2.exe 122 PID 1452 set thread context of 1556 1452 wnplt2.exe 125 PID 4236 set thread context of 1064 4236 wnplt2.exe 127 PID 3300 set thread context of 1168 3300 wnplt2.exe 129 PID 2308 set thread context of 1468 2308 wnplt2.exe 131 PID 2412 set thread context of 1344 2412 wnplt2.exe 133 PID 3496 set thread context of 3652 3496 wnplt2.exe 135 PID 4932 set thread context of 4680 4932 wnplt2.exe 137 PID 1784 set thread context of 2768 1784 wnplt2.exe 139 PID 4060 set thread context of 216 4060 wnplt2.exe 141 PID 2928 set thread context of 2120 2928 wnplt2.exe 143 PID 4952 set thread context of 2700 4952 wnplt2.exe 145 PID 860 set thread context of 652 860 wnplt2.exe 147 PID 4520 set thread context of 2704 4520 wnplt2.exe 149 PID 2440 set thread context of 3680 2440 wnplt2.exe 151 PID 4348 set thread context of 5064 4348 wnplt2.exe 153 PID 4996 set thread context of 5004 4996 wnplt2.exe 155 PID 868 set thread context of 2480 868 wnplt2.exe 157 PID 4060 set thread context of 1504 4060 wnplt2.exe 159 PID 2256 set thread context of 2892 2256 wnplt2.exe 161 PID 1300 set thread context of 2680 1300 wnplt2.exe 163 PID 764 set thread context of 3228 764 wnplt2.exe 165 PID 4920 set thread context of 2152 4920 wnplt2.exe 167 PID 3120 set thread context of 2784 3120 wnplt2.exe 169 PID 1636 set thread context of 1800 1636 wnplt2.exe 171 PID 1380 set thread context of 3040 1380 wnplt2.exe 173 PID 2856 set thread context of 3312 2856 wnplt2.exe 175 PID 1620 set thread context of 1136 1620 wnplt2.exe 177 PID 3080 set thread context of 4036 3080 wnplt2.exe 179 PID 2308 set thread context of 1212 2308 wnplt2.exe 181 PID 664 set thread context of 4396 664 wnplt2.exe 183 PID 2760 set thread context of 244 2760 wnplt2.exe 185 PID 3956 set thread context of 4932 3956 wnplt2.exe 187 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnplt2.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnplt2.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings wnplt2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnplt2.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings wnplt2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnplt2.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings wnplt2.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings wnplt2.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings wnplt2.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings wnplt2.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnplt2.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings wnplt2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnplt2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnplt2.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings wnplt2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnplt2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnplt2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnplt2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnplt2.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings wnplt2.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings wnplt2.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings wnplt2.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings wnplt2.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings wnplt2.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings wnplt2.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings wnplt2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnplt2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnplt2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnplt2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnplt2.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings wnplt2.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings wnplt2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnplt2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnplt2.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings wnplt2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnplt2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnplt2.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings wnplt2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnplt2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnplt2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnplt2.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings wnplt2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnplt2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnplt2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnplt2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnplt2.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings wnplt2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnplt2.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings wnplt2.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings wnplt2.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings wnplt2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnplt2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnplt2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnplt2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnplt2.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings wnplt2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnplt2.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings wnplt2.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings wnplt2.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings wnplt2.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings wnplt2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnplt2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnplt2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1536 d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe 1536 d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe 4120 wnplt2.exe 4120 wnplt2.exe 1716 wnplt2.exe 1716 wnplt2.exe 456 wnplt2.exe 456 wnplt2.exe 3500 wnplt2.exe 3500 wnplt2.exe 4500 wnplt2.exe 4500 wnplt2.exe 3324 wnplt2.exe 3324 wnplt2.exe 1304 wnplt2.exe 1304 wnplt2.exe 4904 wnplt2.exe 4904 wnplt2.exe 1980 wnplt2.exe 1980 wnplt2.exe 1808 wnplt2.exe 1808 wnplt2.exe 1160 wnplt2.exe 1160 wnplt2.exe 2040 wnplt2.exe 2040 wnplt2.exe 4548 wnplt2.exe 4548 wnplt2.exe 1556 wnplt2.exe 1556 wnplt2.exe 1064 wnplt2.exe 1064 wnplt2.exe 1168 wnplt2.exe 1168 wnplt2.exe 1468 wnplt2.exe 1468 wnplt2.exe 1344 wnplt2.exe 1344 wnplt2.exe 3652 wnplt2.exe 3652 wnplt2.exe 4680 wnplt2.exe 4680 wnplt2.exe 2768 wnplt2.exe 2768 wnplt2.exe 216 wnplt2.exe 216 wnplt2.exe 2120 wnplt2.exe 2120 wnplt2.exe 2700 wnplt2.exe 2700 wnplt2.exe 652 wnplt2.exe 652 wnplt2.exe 2704 wnplt2.exe 2704 wnplt2.exe 3680 wnplt2.exe 3680 wnplt2.exe 5064 wnplt2.exe 5064 wnplt2.exe 5004 wnplt2.exe 5004 wnplt2.exe 2480 wnplt2.exe 2480 wnplt2.exe 1504 wnplt2.exe 1504 wnplt2.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3268 wrote to memory of 1536 3268 d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe 83 PID 3268 wrote to memory of 1536 3268 d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe 83 PID 3268 wrote to memory of 1536 3268 d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe 83 PID 3268 wrote to memory of 1536 3268 d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe 83 PID 3268 wrote to memory of 1536 3268 d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe 83 PID 3268 wrote to memory of 1536 3268 d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe 83 PID 3268 wrote to memory of 1536 3268 d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe 83 PID 1536 wrote to memory of 1524 1536 d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe 88 PID 1536 wrote to memory of 1524 1536 d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe 88 PID 1536 wrote to memory of 1524 1536 d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe 88 PID 1524 wrote to memory of 4120 1524 wnplt2.exe 89 PID 1524 wrote to memory of 4120 1524 wnplt2.exe 89 PID 1524 wrote to memory of 4120 1524 wnplt2.exe 89 PID 1524 wrote to memory of 4120 1524 wnplt2.exe 89 PID 1524 wrote to memory of 4120 1524 wnplt2.exe 89 PID 1524 wrote to memory of 4120 1524 wnplt2.exe 89 PID 1524 wrote to memory of 4120 1524 wnplt2.exe 89 PID 4120 wrote to memory of 3000 4120 wnplt2.exe 91 PID 4120 wrote to memory of 3000 4120 wnplt2.exe 91 PID 4120 wrote to memory of 3000 4120 wnplt2.exe 91 PID 3000 wrote to memory of 1716 3000 wnplt2.exe 92 PID 3000 wrote to memory of 1716 3000 wnplt2.exe 92 PID 3000 wrote to memory of 1716 3000 wnplt2.exe 92 PID 3000 wrote to memory of 1716 3000 wnplt2.exe 92 PID 3000 wrote to memory of 1716 3000 wnplt2.exe 92 PID 3000 wrote to memory of 1716 3000 wnplt2.exe 92 PID 3000 wrote to memory of 1716 3000 wnplt2.exe 92 PID 1716 wrote to memory of 2668 1716 wnplt2.exe 95 PID 1716 wrote to memory of 2668 1716 wnplt2.exe 95 PID 1716 wrote to memory of 2668 1716 wnplt2.exe 95 PID 2668 wrote to memory of 456 2668 wnplt2.exe 96 PID 2668 wrote to memory of 456 2668 wnplt2.exe 96 PID 2668 wrote to memory of 456 2668 wnplt2.exe 96 PID 2668 wrote to memory of 456 2668 wnplt2.exe 96 PID 2668 wrote to memory of 456 2668 wnplt2.exe 96 PID 2668 wrote to memory of 456 2668 wnplt2.exe 96 PID 2668 wrote to memory of 456 2668 wnplt2.exe 96 PID 456 wrote to memory of 3112 456 wnplt2.exe 99 PID 456 wrote to memory of 3112 456 wnplt2.exe 99 PID 456 wrote to memory of 3112 456 wnplt2.exe 99 PID 3112 wrote to memory of 3500 3112 wnplt2.exe 100 PID 3112 wrote to memory of 3500 3112 wnplt2.exe 100 PID 3112 wrote to memory of 3500 3112 wnplt2.exe 100 PID 3112 wrote to memory of 3500 3112 wnplt2.exe 100 PID 3112 wrote to memory of 3500 3112 wnplt2.exe 100 PID 3112 wrote to memory of 3500 3112 wnplt2.exe 100 PID 3112 wrote to memory of 3500 3112 wnplt2.exe 100 PID 3500 wrote to memory of 2760 3500 wnplt2.exe 102 PID 3500 wrote to memory of 2760 3500 wnplt2.exe 102 PID 3500 wrote to memory of 2760 3500 wnplt2.exe 102 PID 2760 wrote to memory of 4500 2760 wnplt2.exe 103 PID 2760 wrote to memory of 4500 2760 wnplt2.exe 103 PID 2760 wrote to memory of 4500 2760 wnplt2.exe 103 PID 2760 wrote to memory of 4500 2760 wnplt2.exe 103 PID 2760 wrote to memory of 4500 2760 wnplt2.exe 103 PID 2760 wrote to memory of 4500 2760 wnplt2.exe 103 PID 2760 wrote to memory of 4500 2760 wnplt2.exe 103 PID 4500 wrote to memory of 3628 4500 wnplt2.exe 106 PID 4500 wrote to memory of 3628 4500 wnplt2.exe 106 PID 4500 wrote to memory of 3628 4500 wnplt2.exe 106 PID 3628 wrote to memory of 3324 3628 wnplt2.exe 107 PID 3628 wrote to memory of 3324 3628 wnplt2.exe 107 PID 3628 wrote to memory of 3324 3628 wnplt2.exe 107 PID 3628 wrote to memory of 3324 3628 wnplt2.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d6e0f910f6dc906f6055af025b2ac200_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Users\Admin\AppData\Local\Temp\D6E0F9~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Users\Admin\AppData\Local\Temp\D6E0F9~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3324 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4972 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1304 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:216 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4904 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4064 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1980 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4100 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:1808 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2140 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1160 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2440 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2040 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4932 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4548 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1452 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1556 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4236 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe32⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1064 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3300 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe34⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1168 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2308 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe36⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1468 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
PID:2412 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe38⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1344 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3496 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe40⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3652 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4932 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe42⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4680 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
PID:1784 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe44⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2768 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4060 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe46⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:216 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2928 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe48⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2120 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4952 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe50⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2700 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:860 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe52⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:652 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4520 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe54⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2704 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2440 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe56⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3680 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
PID:4348 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe58⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5064 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4996 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe60⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5004 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:868 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe62⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2480 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
PID:4060 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe64⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1504 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2256 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe66⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2892 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe67⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1300 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe68⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2680 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe69⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:764 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe70⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:3228 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe71⤵
- Suspicious use of SetThreadContext
- Modifies registry class
PID:4920 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe72⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2152 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe73⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3120 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe74⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:2784 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe75⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1636 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe76⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1800 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe77⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1380 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe78⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3040 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe79⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2856 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe80⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3312 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe81⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1620 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe82⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1136 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe83⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3080 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe84⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:4036 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe85⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2308 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe86⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1212 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe87⤵
- Suspicious use of SetThreadContext
- Modifies registry class
PID:664 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe88⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4396 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe89⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2760 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe90⤵
- Checks computer location settings
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:244 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe91⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3956 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe92⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:4932 -
C:\Windows\SysWOW64\wnplt2.exe"C:\Windows\system32\wnplt2.exe" C:\Windows\SysWOW64\wnplt2.exe93⤵PID:4848
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160KB
MD5d6e0f910f6dc906f6055af025b2ac200
SHA1f6a2b1dc32defba4d19cf6b4411c564b8c775060
SHA2562739685adca05cfa408b1f53f18e2aa4a410351faf26016ccb98feeb18f0c69c
SHA5121203962dd7d08e242c462fbf836d0dc22718874d36370a5b31d486a43e412c64ae9626b6a7a5772944ad053645d075b84a2c2f91347fffb75aa87f0efa1f45a5