Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-09-2024 11:21
Static task
static1
Behavioral task
behavioral1
Sample
d82bc76a2cea2d2db0b73a9f115d2b04_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d82bc76a2cea2d2db0b73a9f115d2b04_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d82bc76a2cea2d2db0b73a9f115d2b04_JaffaCakes118.exe
-
Size
131KB
-
MD5
d82bc76a2cea2d2db0b73a9f115d2b04
-
SHA1
84a6c0f4407506f0a3cede9677960c0903024ab9
-
SHA256
6efc702100a2916a908d244f5f494ac4bc7cc39d80e0f5465d0a01f84c058c9d
-
SHA512
5af98c8032b1b9072ae764c2710a7abc23bed7d60117a7402354b8b060ae7c2fbec677df8ab111b9ef4afb1be1dc48444baf6b54fc98b007bdeb851d150a6795
-
SSDEEP
3072:pVtA1eMEZHjyTZPLXZyVkauOKFHypCplp:pVtYSDKjZk8ypCpr
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2892 wnpkv1.exe -
Executes dropped EXE 54 IoCs
pid Process 2820 wnpkv1.exe 2892 wnpkv1.exe 1504 wnpkv1.exe 1256 wnpkv1.exe 2376 wnpkv1.exe 604 wnpkv1.exe 2520 wnpkv1.exe 1708 wnpkv1.exe 988 wnpkv1.exe 2936 wnpkv1.exe 1736 wnpkv1.exe 2236 wnpkv1.exe 1952 wnpkv1.exe 560 wnpkv1.exe 1780 wnpkv1.exe 1464 wnpkv1.exe 2364 wnpkv1.exe 2040 wnpkv1.exe 2248 wnpkv1.exe 1556 wnpkv1.exe 2756 wnpkv1.exe 2696 wnpkv1.exe 2736 wnpkv1.exe 2676 wnpkv1.exe 3024 wnpkv1.exe 1416 wnpkv1.exe 2096 wnpkv1.exe 536 wnpkv1.exe 2600 wnpkv1.exe 1660 wnpkv1.exe 2940 wnpkv1.exe 2224 wnpkv1.exe 2180 wnpkv1.exe 1364 wnpkv1.exe 1168 wnpkv1.exe 920 wnpkv1.exe 1476 wnpkv1.exe 1640 wnpkv1.exe 2444 wnpkv1.exe 2020 wnpkv1.exe 2228 wnpkv1.exe 1080 wnpkv1.exe 1684 wnpkv1.exe 2112 wnpkv1.exe 1516 wnpkv1.exe 2436 wnpkv1.exe 2504 wnpkv1.exe 2836 wnpkv1.exe 2372 wnpkv1.exe 2496 wnpkv1.exe 2044 wnpkv1.exe 1932 wnpkv1.exe 2416 wnpkv1.exe 2620 wnpkv1.exe -
Loads dropped DLL 28 IoCs
pid Process 2700 d82bc76a2cea2d2db0b73a9f115d2b04_JaffaCakes118.exe 2820 wnpkv1.exe 2892 wnpkv1.exe 1256 wnpkv1.exe 604 wnpkv1.exe 1708 wnpkv1.exe 2936 wnpkv1.exe 2236 wnpkv1.exe 560 wnpkv1.exe 1464 wnpkv1.exe 2040 wnpkv1.exe 1556 wnpkv1.exe 2696 wnpkv1.exe 2676 wnpkv1.exe 1416 wnpkv1.exe 536 wnpkv1.exe 1660 wnpkv1.exe 2224 wnpkv1.exe 1364 wnpkv1.exe 920 wnpkv1.exe 1640 wnpkv1.exe 2020 wnpkv1.exe 1080 wnpkv1.exe 2112 wnpkv1.exe 2436 wnpkv1.exe 2836 wnpkv1.exe 2496 wnpkv1.exe 1932 wnpkv1.exe -
resource yara_rule behavioral1/memory/2700-4-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2700-10-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2700-11-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2700-9-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2700-8-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2700-6-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2700-2-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2700-21-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2892-32-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2892-34-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2892-33-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2892-39-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1256-49-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1256-48-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1256-50-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1256-54-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/604-65-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/604-71-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1708-80-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1708-88-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2936-98-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2936-104-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2236-113-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2236-120-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/560-130-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/560-136-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1464-146-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1464-153-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2040-162-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2040-169-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1556-179-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1556-186-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2696-195-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2696-202-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2676-217-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1416-227-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1416-233-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/536-243-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/536-250-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1660-260-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1660-266-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2224-281-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1364-291-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1364-295-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/920-307-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1640-317-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1640-320-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2020-328-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2020-333-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1080-342-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1080-346-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2112-355-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2112-359-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2436-371-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2836-383-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2496-391-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2496-396-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1932-405-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1932-409-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2620-418-0x0000000000400000-0x0000000000458000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 54 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkv1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkv1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkv1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkv1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkv1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkv1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 d82bc76a2cea2d2db0b73a9f115d2b04_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkv1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum d82bc76a2cea2d2db0b73a9f115d2b04_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkv1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkv1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkv1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkv1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkv1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkv1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkv1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkv1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkv1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkv1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkv1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkv1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkv1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkv1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkv1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkv1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkv1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkv1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkv1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkv1.exe -
Drops file in System32 directory 54 IoCs
description ioc Process File created C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File created C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File opened for modification C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File opened for modification C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File opened for modification C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File created C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File created C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File opened for modification C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File opened for modification C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File opened for modification C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File opened for modification C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File opened for modification C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File opened for modification C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File created C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File opened for modification C:\Windows\SysWOW64\wnpkv1.exe d82bc76a2cea2d2db0b73a9f115d2b04_JaffaCakes118.exe File created C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File opened for modification C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File created C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File opened for modification C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File created C:\Windows\SysWOW64\wnpkv1.exe d82bc76a2cea2d2db0b73a9f115d2b04_JaffaCakes118.exe File created C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File created C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File opened for modification C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File created C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File created C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File opened for modification C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File created C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File created C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File created C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File created C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File opened for modification C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File created C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File created C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File created C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File opened for modification C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File opened for modification C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File opened for modification C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File opened for modification C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File opened for modification C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File opened for modification C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File created C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File created C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File opened for modification C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File opened for modification C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File created C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File opened for modification C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File created C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File created C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File created C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File created C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File opened for modification C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File opened for modification C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File opened for modification C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe File created C:\Windows\SysWOW64\wnpkv1.exe wnpkv1.exe -
Suspicious use of SetThreadContext 28 IoCs
description pid Process procid_target PID 2680 set thread context of 2700 2680 d82bc76a2cea2d2db0b73a9f115d2b04_JaffaCakes118.exe 31 PID 2820 set thread context of 2892 2820 wnpkv1.exe 33 PID 1504 set thread context of 1256 1504 wnpkv1.exe 35 PID 2376 set thread context of 604 2376 wnpkv1.exe 37 PID 2520 set thread context of 1708 2520 wnpkv1.exe 39 PID 988 set thread context of 2936 988 wnpkv1.exe 41 PID 1736 set thread context of 2236 1736 wnpkv1.exe 43 PID 1952 set thread context of 560 1952 wnpkv1.exe 45 PID 1780 set thread context of 1464 1780 wnpkv1.exe 47 PID 2364 set thread context of 2040 2364 wnpkv1.exe 49 PID 2248 set thread context of 1556 2248 wnpkv1.exe 51 PID 2756 set thread context of 2696 2756 wnpkv1.exe 53 PID 2736 set thread context of 2676 2736 wnpkv1.exe 55 PID 3024 set thread context of 1416 3024 wnpkv1.exe 57 PID 2096 set thread context of 536 2096 wnpkv1.exe 59 PID 2600 set thread context of 1660 2600 wnpkv1.exe 61 PID 2940 set thread context of 2224 2940 wnpkv1.exe 64 PID 2180 set thread context of 1364 2180 wnpkv1.exe 66 PID 1168 set thread context of 920 1168 wnpkv1.exe 68 PID 1476 set thread context of 1640 1476 wnpkv1.exe 70 PID 2444 set thread context of 2020 2444 wnpkv1.exe 72 PID 2228 set thread context of 1080 2228 wnpkv1.exe 74 PID 1684 set thread context of 2112 1684 wnpkv1.exe 76 PID 1516 set thread context of 2436 1516 wnpkv1.exe 78 PID 2504 set thread context of 2836 2504 wnpkv1.exe 80 PID 2372 set thread context of 2496 2372 wnpkv1.exe 82 PID 2044 set thread context of 1932 2044 wnpkv1.exe 84 PID 2416 set thread context of 2620 2416 wnpkv1.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 55 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d82bc76a2cea2d2db0b73a9f115d2b04_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d82bc76a2cea2d2db0b73a9f115d2b04_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkv1.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 2700 d82bc76a2cea2d2db0b73a9f115d2b04_JaffaCakes118.exe 2892 wnpkv1.exe 1256 wnpkv1.exe 604 wnpkv1.exe 1708 wnpkv1.exe 2936 wnpkv1.exe 2236 wnpkv1.exe 560 wnpkv1.exe 1464 wnpkv1.exe 2040 wnpkv1.exe 1556 wnpkv1.exe 2696 wnpkv1.exe 2676 wnpkv1.exe 1416 wnpkv1.exe 536 wnpkv1.exe 1660 wnpkv1.exe 2224 wnpkv1.exe 1364 wnpkv1.exe 920 wnpkv1.exe 1640 wnpkv1.exe 2020 wnpkv1.exe 1080 wnpkv1.exe 2112 wnpkv1.exe 2436 wnpkv1.exe 2836 wnpkv1.exe 2496 wnpkv1.exe 1932 wnpkv1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2700 2680 d82bc76a2cea2d2db0b73a9f115d2b04_JaffaCakes118.exe 31 PID 2680 wrote to memory of 2700 2680 d82bc76a2cea2d2db0b73a9f115d2b04_JaffaCakes118.exe 31 PID 2680 wrote to memory of 2700 2680 d82bc76a2cea2d2db0b73a9f115d2b04_JaffaCakes118.exe 31 PID 2680 wrote to memory of 2700 2680 d82bc76a2cea2d2db0b73a9f115d2b04_JaffaCakes118.exe 31 PID 2680 wrote to memory of 2700 2680 d82bc76a2cea2d2db0b73a9f115d2b04_JaffaCakes118.exe 31 PID 2680 wrote to memory of 2700 2680 d82bc76a2cea2d2db0b73a9f115d2b04_JaffaCakes118.exe 31 PID 2680 wrote to memory of 2700 2680 d82bc76a2cea2d2db0b73a9f115d2b04_JaffaCakes118.exe 31 PID 2700 wrote to memory of 2820 2700 d82bc76a2cea2d2db0b73a9f115d2b04_JaffaCakes118.exe 32 PID 2700 wrote to memory of 2820 2700 d82bc76a2cea2d2db0b73a9f115d2b04_JaffaCakes118.exe 32 PID 2700 wrote to memory of 2820 2700 d82bc76a2cea2d2db0b73a9f115d2b04_JaffaCakes118.exe 32 PID 2700 wrote to memory of 2820 2700 d82bc76a2cea2d2db0b73a9f115d2b04_JaffaCakes118.exe 32 PID 2820 wrote to memory of 2892 2820 wnpkv1.exe 33 PID 2820 wrote to memory of 2892 2820 wnpkv1.exe 33 PID 2820 wrote to memory of 2892 2820 wnpkv1.exe 33 PID 2820 wrote to memory of 2892 2820 wnpkv1.exe 33 PID 2820 wrote to memory of 2892 2820 wnpkv1.exe 33 PID 2820 wrote to memory of 2892 2820 wnpkv1.exe 33 PID 2820 wrote to memory of 2892 2820 wnpkv1.exe 33 PID 2892 wrote to memory of 1504 2892 wnpkv1.exe 34 PID 2892 wrote to memory of 1504 2892 wnpkv1.exe 34 PID 2892 wrote to memory of 1504 2892 wnpkv1.exe 34 PID 2892 wrote to memory of 1504 2892 wnpkv1.exe 34 PID 1504 wrote to memory of 1256 1504 wnpkv1.exe 35 PID 1504 wrote to memory of 1256 1504 wnpkv1.exe 35 PID 1504 wrote to memory of 1256 1504 wnpkv1.exe 35 PID 1504 wrote to memory of 1256 1504 wnpkv1.exe 35 PID 1504 wrote to memory of 1256 1504 wnpkv1.exe 35 PID 1504 wrote to memory of 1256 1504 wnpkv1.exe 35 PID 1504 wrote to memory of 1256 1504 wnpkv1.exe 35 PID 1256 wrote to memory of 2376 1256 wnpkv1.exe 36 PID 1256 wrote to memory of 2376 1256 wnpkv1.exe 36 PID 1256 wrote to memory of 2376 1256 wnpkv1.exe 36 PID 1256 wrote to memory of 2376 1256 wnpkv1.exe 36 PID 2376 wrote to memory of 604 2376 wnpkv1.exe 37 PID 2376 wrote to memory of 604 2376 wnpkv1.exe 37 PID 2376 wrote to memory of 604 2376 wnpkv1.exe 37 PID 2376 wrote to memory of 604 2376 wnpkv1.exe 37 PID 2376 wrote to memory of 604 2376 wnpkv1.exe 37 PID 2376 wrote to memory of 604 2376 wnpkv1.exe 37 PID 2376 wrote to memory of 604 2376 wnpkv1.exe 37 PID 604 wrote to memory of 2520 604 wnpkv1.exe 38 PID 604 wrote to memory of 2520 604 wnpkv1.exe 38 PID 604 wrote to memory of 2520 604 wnpkv1.exe 38 PID 604 wrote to memory of 2520 604 wnpkv1.exe 38 PID 2520 wrote to memory of 1708 2520 wnpkv1.exe 39 PID 2520 wrote to memory of 1708 2520 wnpkv1.exe 39 PID 2520 wrote to memory of 1708 2520 wnpkv1.exe 39 PID 2520 wrote to memory of 1708 2520 wnpkv1.exe 39 PID 2520 wrote to memory of 1708 2520 wnpkv1.exe 39 PID 2520 wrote to memory of 1708 2520 wnpkv1.exe 39 PID 2520 wrote to memory of 1708 2520 wnpkv1.exe 39 PID 1708 wrote to memory of 988 1708 wnpkv1.exe 40 PID 1708 wrote to memory of 988 1708 wnpkv1.exe 40 PID 1708 wrote to memory of 988 1708 wnpkv1.exe 40 PID 1708 wrote to memory of 988 1708 wnpkv1.exe 40 PID 988 wrote to memory of 2936 988 wnpkv1.exe 41 PID 988 wrote to memory of 2936 988 wnpkv1.exe 41 PID 988 wrote to memory of 2936 988 wnpkv1.exe 41 PID 988 wrote to memory of 2936 988 wnpkv1.exe 41 PID 988 wrote to memory of 2936 988 wnpkv1.exe 41 PID 988 wrote to memory of 2936 988 wnpkv1.exe 41 PID 988 wrote to memory of 2936 988 wnpkv1.exe 41 PID 2936 wrote to memory of 1736 2936 wnpkv1.exe 42 PID 2936 wrote to memory of 1736 2936 wnpkv1.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\d82bc76a2cea2d2db0b73a9f115d2b04_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d82bc76a2cea2d2db0b73a9f115d2b04_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\d82bc76a2cea2d2db0b73a9f115d2b04_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d82bc76a2cea2d2db0b73a9f115d2b04_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Users\Admin\AppData\Local\Temp\D82BC7~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Users\Admin\AppData\Local\Temp\D82BC7~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1736 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2236 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1952 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:560 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1780 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1464 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2364 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2040 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2248 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1556 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2756 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2696 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2736 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2676 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3024 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1416 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2096 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:536 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2600 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1660 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2940 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe34⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2224 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2180 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe36⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1364 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1168 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe38⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:920 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1476 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe40⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1640 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2444 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe42⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2020 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2228 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe44⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1080 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1684 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe46⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2112 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1516 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe48⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2436 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2504 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe50⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2836 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2372 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe52⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2496 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2044 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe54⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1932 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2416 -
C:\Windows\SysWOW64\wnpkv1.exe"C:\Windows\system32\wnpkv1.exe" C:\Windows\SysWOW64\wnpkv1.exe56⤵
- Executes dropped EXE
PID:2620
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
131KB
MD5d82bc76a2cea2d2db0b73a9f115d2b04
SHA184a6c0f4407506f0a3cede9677960c0903024ab9
SHA2566efc702100a2916a908d244f5f494ac4bc7cc39d80e0f5465d0a01f84c058c9d
SHA5125af98c8032b1b9072ae764c2710a7abc23bed7d60117a7402354b8b060ae7c2fbec677df8ab111b9ef4afb1be1dc48444baf6b54fc98b007bdeb851d150a6795