Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-09-2024 05:55
Static task
static1
Behavioral task
behavioral1
Sample
d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe
-
Size
154KB
-
MD5
d7aced5edc6532c16991a1e8c5873d40
-
SHA1
61580e4d3fe2ec1385e2352d51967ce6a5d5da1c
-
SHA256
c999634888d1c08817538f4171e0cb75cfe4831d56d02d87cadd8a5cf2aa4e45
-
SHA512
57a6fd6ba5306c4168572b2b58a8d573a31981ce7f7b237b22592a8725b9a1aa8af6868976c3622c4c31fe94cc8547cddab44f7571c004a17380d285ace6e60e
-
SSDEEP
3072:jMPrpmjM78IWjdJWZdSleKY5MG0inih23hGB2odHwQxswNoqMbFNh:jKyIWJS+49vnXhGB2C3swUt
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2980 wnpkm1.exe -
Executes dropped EXE 38 IoCs
pid Process 2760 wnpkm1.exe 2980 wnpkm1.exe 2592 wnpkm1.exe 2688 wnpkm1.exe 3052 wnpkm1.exe 1548 wnpkm1.exe 2788 wnpkm1.exe 2672 wnpkm1.exe 3020 wnpkm1.exe 2176 wnpkm1.exe 684 wnpkm1.exe 2196 wnpkm1.exe 680 wnpkm1.exe 1860 wnpkm1.exe 2272 wnpkm1.exe 940 wnpkm1.exe 1744 wnpkm1.exe 604 wnpkm1.exe 2308 wnpkm1.exe 1596 wnpkm1.exe 352 wnpkm1.exe 2760 wnpkm1.exe 2596 wnpkm1.exe 2592 wnpkm1.exe 2620 wnpkm1.exe 1756 wnpkm1.exe 2900 wnpkm1.exe 1852 wnpkm1.exe 1976 wnpkm1.exe 2668 wnpkm1.exe 2052 wnpkm1.exe 864 wnpkm1.exe 1188 wnpkm1.exe 1100 wnpkm1.exe 2992 wnpkm1.exe 2256 wnpkm1.exe 1672 wnpkm1.exe 2300 wnpkm1.exe -
Loads dropped DLL 19 IoCs
pid Process 1652 d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe 2980 wnpkm1.exe 2688 wnpkm1.exe 1548 wnpkm1.exe 2672 wnpkm1.exe 2176 wnpkm1.exe 2196 wnpkm1.exe 1860 wnpkm1.exe 940 wnpkm1.exe 604 wnpkm1.exe 1596 wnpkm1.exe 2760 wnpkm1.exe 2592 wnpkm1.exe 1756 wnpkm1.exe 1852 wnpkm1.exe 2668 wnpkm1.exe 864 wnpkm1.exe 1100 wnpkm1.exe 2256 wnpkm1.exe -
resource yara_rule behavioral1/memory/1652-9-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1652-10-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1652-11-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1652-8-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1652-6-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1652-2-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1652-5-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1652-21-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2980-33-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2980-32-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2980-31-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2980-39-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2688-50-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2688-56-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1548-67-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1548-72-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2672-83-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2672-89-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2176-100-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2176-105-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2196-116-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2196-122-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1860-133-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1860-137-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/940-149-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/940-154-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/604-165-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/604-171-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1596-182-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1596-187-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2760-196-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2760-204-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2592-213-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2592-220-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1756-235-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1852-251-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2668-266-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/864-282-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1100-297-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2256-309-0x0000000000400000-0x000000000046C000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 40 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkm1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkm1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkm1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkm1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkm1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkm1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkm1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkm1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkm1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkm1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm1.exe -
Drops file in System32 directory 40 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File opened for modification C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File created C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File opened for modification C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File created C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File created C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File created C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File opened for modification C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File created C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File opened for modification C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File created C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File opened for modification C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File created C:\Windows\SysWOW64\wnpkm1.exe d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe File created C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File opened for modification C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File created C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File opened for modification C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File opened for modification C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File opened for modification C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File opened for modification C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File opened for modification C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File created C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File opened for modification C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File created C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File opened for modification C:\Windows\SysWOW64\wnpkm1.exe d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe File created C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File created C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File created C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File opened for modification C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File opened for modification C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File opened for modification C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File created C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File created C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File created C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File created C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File opened for modification C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File opened for modification C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File created C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File opened for modification C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File created C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe -
Suspicious use of SetThreadContext 20 IoCs
description pid Process procid_target PID 2480 set thread context of 1652 2480 d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe 31 PID 2760 set thread context of 2980 2760 wnpkm1.exe 33 PID 2592 set thread context of 2688 2592 wnpkm1.exe 35 PID 3052 set thread context of 1548 3052 wnpkm1.exe 37 PID 2788 set thread context of 2672 2788 wnpkm1.exe 39 PID 3020 set thread context of 2176 3020 wnpkm1.exe 41 PID 684 set thread context of 2196 684 wnpkm1.exe 43 PID 680 set thread context of 1860 680 wnpkm1.exe 45 PID 2272 set thread context of 940 2272 wnpkm1.exe 47 PID 1744 set thread context of 604 1744 wnpkm1.exe 49 PID 2308 set thread context of 1596 2308 wnpkm1.exe 51 PID 352 set thread context of 2760 352 wnpkm1.exe 54 PID 2596 set thread context of 2592 2596 wnpkm1.exe 56 PID 2620 set thread context of 1756 2620 wnpkm1.exe 58 PID 2900 set thread context of 1852 2900 wnpkm1.exe 60 PID 1976 set thread context of 2668 1976 wnpkm1.exe 62 PID 2052 set thread context of 864 2052 wnpkm1.exe 64 PID 1188 set thread context of 1100 1188 wnpkm1.exe 66 PID 2992 set thread context of 2256 2992 wnpkm1.exe 68 PID 1672 set thread context of 2300 1672 wnpkm1.exe 70 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 40 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1652 d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe 2980 wnpkm1.exe 2688 wnpkm1.exe 1548 wnpkm1.exe 2672 wnpkm1.exe 2176 wnpkm1.exe 2196 wnpkm1.exe 1860 wnpkm1.exe 940 wnpkm1.exe 604 wnpkm1.exe 1596 wnpkm1.exe 2760 wnpkm1.exe 2592 wnpkm1.exe 1756 wnpkm1.exe 1852 wnpkm1.exe 2668 wnpkm1.exe 864 wnpkm1.exe 1100 wnpkm1.exe 2256 wnpkm1.exe 2300 wnpkm1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2480 wrote to memory of 1652 2480 d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe 31 PID 2480 wrote to memory of 1652 2480 d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe 31 PID 2480 wrote to memory of 1652 2480 d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe 31 PID 2480 wrote to memory of 1652 2480 d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe 31 PID 2480 wrote to memory of 1652 2480 d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe 31 PID 2480 wrote to memory of 1652 2480 d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe 31 PID 2480 wrote to memory of 1652 2480 d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe 31 PID 1652 wrote to memory of 2760 1652 d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe 32 PID 1652 wrote to memory of 2760 1652 d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe 32 PID 1652 wrote to memory of 2760 1652 d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe 32 PID 1652 wrote to memory of 2760 1652 d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe 32 PID 2760 wrote to memory of 2980 2760 wnpkm1.exe 33 PID 2760 wrote to memory of 2980 2760 wnpkm1.exe 33 PID 2760 wrote to memory of 2980 2760 wnpkm1.exe 33 PID 2760 wrote to memory of 2980 2760 wnpkm1.exe 33 PID 2760 wrote to memory of 2980 2760 wnpkm1.exe 33 PID 2760 wrote to memory of 2980 2760 wnpkm1.exe 33 PID 2760 wrote to memory of 2980 2760 wnpkm1.exe 33 PID 2980 wrote to memory of 2592 2980 wnpkm1.exe 34 PID 2980 wrote to memory of 2592 2980 wnpkm1.exe 34 PID 2980 wrote to memory of 2592 2980 wnpkm1.exe 34 PID 2980 wrote to memory of 2592 2980 wnpkm1.exe 34 PID 2592 wrote to memory of 2688 2592 wnpkm1.exe 35 PID 2592 wrote to memory of 2688 2592 wnpkm1.exe 35 PID 2592 wrote to memory of 2688 2592 wnpkm1.exe 35 PID 2592 wrote to memory of 2688 2592 wnpkm1.exe 35 PID 2592 wrote to memory of 2688 2592 wnpkm1.exe 35 PID 2592 wrote to memory of 2688 2592 wnpkm1.exe 35 PID 2592 wrote to memory of 2688 2592 wnpkm1.exe 35 PID 2688 wrote to memory of 3052 2688 wnpkm1.exe 36 PID 2688 wrote to memory of 3052 2688 wnpkm1.exe 36 PID 2688 wrote to memory of 3052 2688 wnpkm1.exe 36 PID 2688 wrote to memory of 3052 2688 wnpkm1.exe 36 PID 3052 wrote to memory of 1548 3052 wnpkm1.exe 37 PID 3052 wrote to memory of 1548 3052 wnpkm1.exe 37 PID 3052 wrote to memory of 1548 3052 wnpkm1.exe 37 PID 3052 wrote to memory of 1548 3052 wnpkm1.exe 37 PID 3052 wrote to memory of 1548 3052 wnpkm1.exe 37 PID 3052 wrote to memory of 1548 3052 wnpkm1.exe 37 PID 3052 wrote to memory of 1548 3052 wnpkm1.exe 37 PID 1548 wrote to memory of 2788 1548 wnpkm1.exe 38 PID 1548 wrote to memory of 2788 1548 wnpkm1.exe 38 PID 1548 wrote to memory of 2788 1548 wnpkm1.exe 38 PID 1548 wrote to memory of 2788 1548 wnpkm1.exe 38 PID 2788 wrote to memory of 2672 2788 wnpkm1.exe 39 PID 2788 wrote to memory of 2672 2788 wnpkm1.exe 39 PID 2788 wrote to memory of 2672 2788 wnpkm1.exe 39 PID 2788 wrote to memory of 2672 2788 wnpkm1.exe 39 PID 2788 wrote to memory of 2672 2788 wnpkm1.exe 39 PID 2788 wrote to memory of 2672 2788 wnpkm1.exe 39 PID 2788 wrote to memory of 2672 2788 wnpkm1.exe 39 PID 2672 wrote to memory of 3020 2672 wnpkm1.exe 40 PID 2672 wrote to memory of 3020 2672 wnpkm1.exe 40 PID 2672 wrote to memory of 3020 2672 wnpkm1.exe 40 PID 2672 wrote to memory of 3020 2672 wnpkm1.exe 40 PID 3020 wrote to memory of 2176 3020 wnpkm1.exe 41 PID 3020 wrote to memory of 2176 3020 wnpkm1.exe 41 PID 3020 wrote to memory of 2176 3020 wnpkm1.exe 41 PID 3020 wrote to memory of 2176 3020 wnpkm1.exe 41 PID 3020 wrote to memory of 2176 3020 wnpkm1.exe 41 PID 3020 wrote to memory of 2176 3020 wnpkm1.exe 41 PID 3020 wrote to memory of 2176 3020 wnpkm1.exe 41 PID 2176 wrote to memory of 684 2176 wnpkm1.exe 42 PID 2176 wrote to memory of 684 2176 wnpkm1.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Users\Admin\AppData\Local\Temp\D7ACED~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Users\Admin\AppData\Local\Temp\D7ACED~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:684 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2196 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:680 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1860 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2272 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:940 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1744 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:604 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2308 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1596 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:352 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2760 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2596 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2592 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2620 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1756 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2900 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1852 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1976 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2668 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2052 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe34⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:864 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1188 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe36⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1100 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2992 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe38⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2256 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1672 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2300
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
154KB
MD5d7aced5edc6532c16991a1e8c5873d40
SHA161580e4d3fe2ec1385e2352d51967ce6a5d5da1c
SHA256c999634888d1c08817538f4171e0cb75cfe4831d56d02d87cadd8a5cf2aa4e45
SHA51257a6fd6ba5306c4168572b2b58a8d573a31981ce7f7b237b22592a8725b9a1aa8af6868976c3622c4c31fe94cc8547cddab44f7571c004a17380d285ace6e60e