Analysis
-
max time kernel
150s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-09-2024 05:55
Static task
static1
Behavioral task
behavioral1
Sample
d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe
-
Size
154KB
-
MD5
d7aced5edc6532c16991a1e8c5873d40
-
SHA1
61580e4d3fe2ec1385e2352d51967ce6a5d5da1c
-
SHA256
c999634888d1c08817538f4171e0cb75cfe4831d56d02d87cadd8a5cf2aa4e45
-
SHA512
57a6fd6ba5306c4168572b2b58a8d573a31981ce7f7b237b22592a8725b9a1aa8af6868976c3622c4c31fe94cc8547cddab44f7571c004a17380d285ace6e60e
-
SSDEEP
3072:jMPrpmjM78IWjdJWZdSleKY5MG0inih23hGB2odHwQxswNoqMbFNh:jKyIWJS+49vnXhGB2C3swUt
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings 2 TTPs 21 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnpkm1.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnpkm1.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnpkm1.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnpkm1.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnpkm1.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnpkm1.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnpkm1.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnpkm1.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnpkm1.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnpkm1.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnpkm1.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnpkm1.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnpkm1.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnpkm1.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnpkm1.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnpkm1.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnpkm1.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnpkm1.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnpkm1.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wnpkm1.exe -
Deletes itself 1 IoCs
pid Process 3808 wnpkm1.exe -
Executes dropped EXE 40 IoCs
pid Process 1184 wnpkm1.exe 3808 wnpkm1.exe 4532 wnpkm1.exe 3324 wnpkm1.exe 3780 wnpkm1.exe 1132 wnpkm1.exe 4068 wnpkm1.exe 2136 wnpkm1.exe 3576 wnpkm1.exe 4984 wnpkm1.exe 4440 wnpkm1.exe 4104 wnpkm1.exe 216 wnpkm1.exe 2140 wnpkm1.exe 400 wnpkm1.exe 5092 wnpkm1.exe 2584 wnpkm1.exe 1524 wnpkm1.exe 3820 wnpkm1.exe 3440 wnpkm1.exe 1828 wnpkm1.exe 2424 wnpkm1.exe 1988 wnpkm1.exe 1924 wnpkm1.exe 208 wnpkm1.exe 2684 wnpkm1.exe 396 wnpkm1.exe 3716 wnpkm1.exe 4076 wnpkm1.exe 2912 wnpkm1.exe 4244 wnpkm1.exe 4264 wnpkm1.exe 3200 wnpkm1.exe 628 wnpkm1.exe 4636 wnpkm1.exe 2504 wnpkm1.exe 996 wnpkm1.exe 3032 wnpkm1.exe 1444 wnpkm1.exe 4996 wnpkm1.exe -
resource yara_rule behavioral2/memory/2000-0-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/2000-2-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/2000-3-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/2000-4-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/2000-38-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/3808-43-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/3808-44-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/3808-45-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/3808-47-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/3324-54-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/1132-61-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/2136-67-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4984-72-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4984-73-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4984-76-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4104-83-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/2140-90-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/5092-97-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/1524-103-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/3440-110-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/2424-118-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/1924-127-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/2684-135-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/3716-144-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/2912-152-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4264-160-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/628-168-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/2504-176-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/3032-184-0x0000000000400000-0x000000000046C000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 42 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm1.exe -
Drops file in System32 directory 42 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File opened for modification C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File created C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File opened for modification C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File opened for modification C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File opened for modification C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File opened for modification C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File opened for modification C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File opened for modification C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File created C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File created C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File created C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File opened for modification C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File created C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File created C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File created C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File created C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File opened for modification C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File opened for modification C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File opened for modification C:\Windows\SysWOW64\wnpkm1.exe d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe File created C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File created C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File created C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File opened for modification C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File opened for modification C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File opened for modification C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File opened for modification C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File created C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File created C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File created C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File created C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File created C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File created C:\Windows\SysWOW64\wnpkm1.exe d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe File created C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File created C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File opened for modification C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File opened for modification C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File created C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File opened for modification C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File created C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File opened for modification C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe File opened for modification C:\Windows\SysWOW64\wnpkm1.exe wnpkm1.exe -
Suspicious use of SetThreadContext 21 IoCs
description pid Process procid_target PID 4496 set thread context of 2000 4496 d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe 87 PID 1184 set thread context of 3808 1184 wnpkm1.exe 94 PID 4532 set thread context of 3324 4532 wnpkm1.exe 98 PID 3780 set thread context of 1132 3780 wnpkm1.exe 100 PID 4068 set thread context of 2136 4068 wnpkm1.exe 102 PID 3576 set thread context of 4984 3576 wnpkm1.exe 105 PID 4440 set thread context of 4104 4440 wnpkm1.exe 108 PID 216 set thread context of 2140 216 wnpkm1.exe 110 PID 400 set thread context of 5092 400 wnpkm1.exe 112 PID 2584 set thread context of 1524 2584 wnpkm1.exe 114 PID 3820 set thread context of 3440 3820 wnpkm1.exe 116 PID 1828 set thread context of 2424 1828 wnpkm1.exe 118 PID 1988 set thread context of 1924 1988 wnpkm1.exe 120 PID 208 set thread context of 2684 208 wnpkm1.exe 122 PID 396 set thread context of 3716 396 wnpkm1.exe 124 PID 4076 set thread context of 2912 4076 wnpkm1.exe 126 PID 4244 set thread context of 4264 4244 wnpkm1.exe 128 PID 3200 set thread context of 628 3200 wnpkm1.exe 130 PID 4636 set thread context of 2504 4636 wnpkm1.exe 132 PID 996 set thread context of 3032 996 wnpkm1.exe 134 PID 1444 set thread context of 4996 1444 wnpkm1.exe 136 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 42 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm1.exe -
Modifies registry class 21 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm1.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 2000 d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe 2000 d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe 3808 wnpkm1.exe 3808 wnpkm1.exe 3324 wnpkm1.exe 3324 wnpkm1.exe 1132 wnpkm1.exe 1132 wnpkm1.exe 2136 wnpkm1.exe 2136 wnpkm1.exe 4984 wnpkm1.exe 4984 wnpkm1.exe 4104 wnpkm1.exe 4104 wnpkm1.exe 2140 wnpkm1.exe 2140 wnpkm1.exe 5092 wnpkm1.exe 5092 wnpkm1.exe 1524 wnpkm1.exe 1524 wnpkm1.exe 3440 wnpkm1.exe 3440 wnpkm1.exe 2424 wnpkm1.exe 2424 wnpkm1.exe 1924 wnpkm1.exe 1924 wnpkm1.exe 2684 wnpkm1.exe 2684 wnpkm1.exe 3716 wnpkm1.exe 3716 wnpkm1.exe 2912 wnpkm1.exe 2912 wnpkm1.exe 4264 wnpkm1.exe 4264 wnpkm1.exe 628 wnpkm1.exe 628 wnpkm1.exe 2504 wnpkm1.exe 2504 wnpkm1.exe 3032 wnpkm1.exe 3032 wnpkm1.exe 4996 wnpkm1.exe 4996 wnpkm1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4496 wrote to memory of 2000 4496 d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe 87 PID 4496 wrote to memory of 2000 4496 d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe 87 PID 4496 wrote to memory of 2000 4496 d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe 87 PID 4496 wrote to memory of 2000 4496 d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe 87 PID 4496 wrote to memory of 2000 4496 d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe 87 PID 4496 wrote to memory of 2000 4496 d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe 87 PID 4496 wrote to memory of 2000 4496 d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe 87 PID 2000 wrote to memory of 1184 2000 d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe 92 PID 2000 wrote to memory of 1184 2000 d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe 92 PID 2000 wrote to memory of 1184 2000 d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe 92 PID 1184 wrote to memory of 3808 1184 wnpkm1.exe 94 PID 1184 wrote to memory of 3808 1184 wnpkm1.exe 94 PID 1184 wrote to memory of 3808 1184 wnpkm1.exe 94 PID 1184 wrote to memory of 3808 1184 wnpkm1.exe 94 PID 1184 wrote to memory of 3808 1184 wnpkm1.exe 94 PID 1184 wrote to memory of 3808 1184 wnpkm1.exe 94 PID 1184 wrote to memory of 3808 1184 wnpkm1.exe 94 PID 3808 wrote to memory of 4532 3808 wnpkm1.exe 97 PID 3808 wrote to memory of 4532 3808 wnpkm1.exe 97 PID 3808 wrote to memory of 4532 3808 wnpkm1.exe 97 PID 4532 wrote to memory of 3324 4532 wnpkm1.exe 98 PID 4532 wrote to memory of 3324 4532 wnpkm1.exe 98 PID 4532 wrote to memory of 3324 4532 wnpkm1.exe 98 PID 4532 wrote to memory of 3324 4532 wnpkm1.exe 98 PID 4532 wrote to memory of 3324 4532 wnpkm1.exe 98 PID 4532 wrote to memory of 3324 4532 wnpkm1.exe 98 PID 4532 wrote to memory of 3324 4532 wnpkm1.exe 98 PID 3324 wrote to memory of 3780 3324 wnpkm1.exe 99 PID 3324 wrote to memory of 3780 3324 wnpkm1.exe 99 PID 3324 wrote to memory of 3780 3324 wnpkm1.exe 99 PID 3780 wrote to memory of 1132 3780 wnpkm1.exe 100 PID 3780 wrote to memory of 1132 3780 wnpkm1.exe 100 PID 3780 wrote to memory of 1132 3780 wnpkm1.exe 100 PID 3780 wrote to memory of 1132 3780 wnpkm1.exe 100 PID 3780 wrote to memory of 1132 3780 wnpkm1.exe 100 PID 3780 wrote to memory of 1132 3780 wnpkm1.exe 100 PID 3780 wrote to memory of 1132 3780 wnpkm1.exe 100 PID 1132 wrote to memory of 4068 1132 wnpkm1.exe 101 PID 1132 wrote to memory of 4068 1132 wnpkm1.exe 101 PID 1132 wrote to memory of 4068 1132 wnpkm1.exe 101 PID 4068 wrote to memory of 2136 4068 wnpkm1.exe 102 PID 4068 wrote to memory of 2136 4068 wnpkm1.exe 102 PID 4068 wrote to memory of 2136 4068 wnpkm1.exe 102 PID 4068 wrote to memory of 2136 4068 wnpkm1.exe 102 PID 4068 wrote to memory of 2136 4068 wnpkm1.exe 102 PID 4068 wrote to memory of 2136 4068 wnpkm1.exe 102 PID 4068 wrote to memory of 2136 4068 wnpkm1.exe 102 PID 2136 wrote to memory of 3576 2136 wnpkm1.exe 104 PID 2136 wrote to memory of 3576 2136 wnpkm1.exe 104 PID 2136 wrote to memory of 3576 2136 wnpkm1.exe 104 PID 3576 wrote to memory of 4984 3576 wnpkm1.exe 105 PID 3576 wrote to memory of 4984 3576 wnpkm1.exe 105 PID 3576 wrote to memory of 4984 3576 wnpkm1.exe 105 PID 3576 wrote to memory of 4984 3576 wnpkm1.exe 105 PID 3576 wrote to memory of 4984 3576 wnpkm1.exe 105 PID 3576 wrote to memory of 4984 3576 wnpkm1.exe 105 PID 3576 wrote to memory of 4984 3576 wnpkm1.exe 105 PID 4984 wrote to memory of 4440 4984 wnpkm1.exe 107 PID 4984 wrote to memory of 4440 4984 wnpkm1.exe 107 PID 4984 wrote to memory of 4440 4984 wnpkm1.exe 107 PID 4440 wrote to memory of 4104 4440 wnpkm1.exe 108 PID 4440 wrote to memory of 4104 4440 wnpkm1.exe 108 PID 4440 wrote to memory of 4104 4440 wnpkm1.exe 108 PID 4440 wrote to memory of 4104 4440 wnpkm1.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Users\Admin\AppData\Local\Temp\D7ACED~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Users\Admin\AppData\Local\Temp\D7ACED~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4104 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:216 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2140 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:400 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5092 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2584 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1524 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3820 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3440 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1828 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2424 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1988 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1924 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:208 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2684 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:396 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3716 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4076 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe32⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2912 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4244 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe34⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4264 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3200 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe36⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:628 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4636 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe38⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2504 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:996 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe40⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3032 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1444 -
C:\Windows\SysWOW64\wnpkm1.exe"C:\Windows\system32\wnpkm1.exe" C:\Windows\SysWOW64\wnpkm1.exe42⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4996
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
154KB
MD5d7aced5edc6532c16991a1e8c5873d40
SHA161580e4d3fe2ec1385e2352d51967ce6a5d5da1c
SHA256c999634888d1c08817538f4171e0cb75cfe4831d56d02d87cadd8a5cf2aa4e45
SHA51257a6fd6ba5306c4168572b2b58a8d573a31981ce7f7b237b22592a8725b9a1aa8af6868976c3622c4c31fe94cc8547cddab44f7571c004a17380d285ace6e60e