Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-09-2024 00:05

General

  • Target

    df231f3dc9b26bc2833154a727605d91_JaffaCakes118.exe

  • Size

    149KB

  • MD5

    df231f3dc9b26bc2833154a727605d91

  • SHA1

    bafd9bbf0fa223b501708f273176f6c6d519bb36

  • SHA256

    d923f46b1c0d0660ddc0bb3354ecfb548661def894d185d753571d23af0911fa

  • SHA512

    ca1ca3701a8b09a3e6e6e767cc68cad20df6677afa37253a5cf47f3a863678456fc863668d14e5b24a573d30ec0ea9929ecae753539f9c05a393a8fdcddd9c58

  • SSDEEP

    3072:1Yknf95/09PD69ajp6hZIt947R7gQV8D2RToWHfV4kuBnaj2KNgc:j95M974uCItmN7lV8aRToWHfkaj2KNX

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 54 IoCs
  • Loads dropped DLL 64 IoCs
  • UPX packed file 62 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 56 IoCs
  • Suspicious use of SetThreadContext 28 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 56 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df231f3dc9b26bc2833154a727605d91_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\df231f3dc9b26bc2833154a727605d91_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Users\Admin\AppData\Local\Temp\df231f3dc9b26bc2833154a727605d91_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\df231f3dc9b26bc2833154a727605d91_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2812
      • C:\Windows\SysWOW64\wmpsd1.exe
        "C:\Windows\system32\wmpsd1.exe" C:\Users\Admin\AppData\Local\Temp\DF231F~1.EXE
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2952
        • C:\Windows\SysWOW64\wmpsd1.exe
          "C:\Windows\system32\wmpsd1.exe" C:\Users\Admin\AppData\Local\Temp\DF231F~1.EXE
          4⤵
          • Deletes itself
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1304
          • C:\Windows\SysWOW64\wmpsd1.exe
            "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2948
            • C:\Windows\SysWOW64\wmpsd1.exe
              "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:1328
              • C:\Windows\SysWOW64\wmpsd1.exe
                "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2280
                • C:\Windows\SysWOW64\wmpsd1.exe
                  "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Drops file in System32 directory
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:2432
                  • C:\Windows\SysWOW64\wmpsd1.exe
                    "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                    9⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetThreadContext
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:1544
                    • C:\Windows\SysWOW64\wmpsd1.exe
                      "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                      10⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Drops file in System32 directory
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of WriteProcessMemory
                      PID:2172
                      • C:\Windows\SysWOW64\wmpsd1.exe
                        "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                        11⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of SetThreadContext
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of WriteProcessMemory
                        PID:1600
                        • C:\Windows\SysWOW64\wmpsd1.exe
                          "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                          12⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Drops file in System32 directory
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2808
                          • C:\Windows\SysWOW64\wmpsd1.exe
                            "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                            13⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            PID:2980
                            • C:\Windows\SysWOW64\wmpsd1.exe
                              "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                              14⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Drops file in System32 directory
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:1552
                              • C:\Windows\SysWOW64\wmpsd1.exe
                                "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                15⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Suspicious use of SetThreadContext
                                • System Location Discovery: System Language Discovery
                                PID:3024
                                • C:\Windows\SysWOW64\wmpsd1.exe
                                  "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                  16⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Drops file in System32 directory
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:1372
                                  • C:\Windows\SysWOW64\wmpsd1.exe
                                    "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                    17⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Suspicious use of SetThreadContext
                                    • System Location Discovery: System Language Discovery
                                    PID:1752
                                    • C:\Windows\SysWOW64\wmpsd1.exe
                                      "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                      18⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Drops file in System32 directory
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:2268
                                      • C:\Windows\SysWOW64\wmpsd1.exe
                                        "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                        19⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Suspicious use of SetThreadContext
                                        • System Location Discovery: System Language Discovery
                                        PID:1028
                                        • C:\Windows\SysWOW64\wmpsd1.exe
                                          "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                          20⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Drops file in System32 directory
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:1100
                                          • C:\Windows\SysWOW64\wmpsd1.exe
                                            "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                            21⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Suspicious use of SetThreadContext
                                            • System Location Discovery: System Language Discovery
                                            PID:1648
                                            • C:\Windows\SysWOW64\wmpsd1.exe
                                              "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                              22⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              • Drops file in System32 directory
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:2000
                                              • C:\Windows\SysWOW64\wmpsd1.exe
                                                "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                                23⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Suspicious use of SetThreadContext
                                                • System Location Discovery: System Language Discovery
                                                PID:2740
                                                • C:\Windows\SysWOW64\wmpsd1.exe
                                                  "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                                  24⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Drops file in System32 directory
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:2744
                                                  • C:\Windows\SysWOW64\wmpsd1.exe
                                                    "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                                    25⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    • Suspicious use of SetThreadContext
                                                    • System Location Discovery: System Language Discovery
                                                    PID:1560
                                                    • C:\Windows\SysWOW64\wmpsd1.exe
                                                      "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                                      26⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      • Drops file in System32 directory
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:2320
                                                      • C:\Windows\SysWOW64\wmpsd1.exe
                                                        "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                                        27⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • Suspicious use of SetThreadContext
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2412
                                                        • C:\Windows\SysWOW64\wmpsd1.exe
                                                          "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                                          28⤵
                                                          • Executes dropped EXE
                                                          • Loads dropped DLL
                                                          • Drops file in System32 directory
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:1976
                                                          • C:\Windows\SysWOW64\wmpsd1.exe
                                                            "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                                            29⤵
                                                            • Executes dropped EXE
                                                            • Loads dropped DLL
                                                            • Suspicious use of SetThreadContext
                                                            • System Location Discovery: System Language Discovery
                                                            PID:1760
                                                            • C:\Windows\SysWOW64\wmpsd1.exe
                                                              "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                                              30⤵
                                                              • Executes dropped EXE
                                                              • Loads dropped DLL
                                                              • Drops file in System32 directory
                                                              • System Location Discovery: System Language Discovery
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:2420
                                                              • C:\Windows\SysWOW64\wmpsd1.exe
                                                                "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                                                31⤵
                                                                • Executes dropped EXE
                                                                • Loads dropped DLL
                                                                • Suspicious use of SetThreadContext
                                                                • System Location Discovery: System Language Discovery
                                                                PID:1264
                                                                • C:\Windows\SysWOW64\wmpsd1.exe
                                                                  "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                                                  32⤵
                                                                  • Executes dropped EXE
                                                                  • Loads dropped DLL
                                                                  • Drops file in System32 directory
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  PID:2924
                                                                  • C:\Windows\SysWOW64\wmpsd1.exe
                                                                    "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                                                    33⤵
                                                                    • Executes dropped EXE
                                                                    • Loads dropped DLL
                                                                    • Suspicious use of SetThreadContext
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:2148
                                                                    • C:\Windows\SysWOW64\wmpsd1.exe
                                                                      "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                                                      34⤵
                                                                      • Executes dropped EXE
                                                                      • Loads dropped DLL
                                                                      • Drops file in System32 directory
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      PID:1944
                                                                      • C:\Windows\SysWOW64\wmpsd1.exe
                                                                        "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                                                        35⤵
                                                                        • Executes dropped EXE
                                                                        • Loads dropped DLL
                                                                        • Suspicious use of SetThreadContext
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:1620
                                                                        • C:\Windows\SysWOW64\wmpsd1.exe
                                                                          "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                                                          36⤵
                                                                          • Executes dropped EXE
                                                                          • Loads dropped DLL
                                                                          • Drops file in System32 directory
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          PID:1916
                                                                          • C:\Windows\SysWOW64\wmpsd1.exe
                                                                            "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                                                            37⤵
                                                                            • Executes dropped EXE
                                                                            • Loads dropped DLL
                                                                            • Suspicious use of SetThreadContext
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:2884
                                                                            • C:\Windows\SysWOW64\wmpsd1.exe
                                                                              "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                                                              38⤵
                                                                              • Executes dropped EXE
                                                                              • Loads dropped DLL
                                                                              • Drops file in System32 directory
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              PID:628
                                                                              • C:\Windows\SysWOW64\wmpsd1.exe
                                                                                "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                                                                39⤵
                                                                                • Executes dropped EXE
                                                                                • Loads dropped DLL
                                                                                • Suspicious use of SetThreadContext
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:2496
                                                                                • C:\Windows\SysWOW64\wmpsd1.exe
                                                                                  "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                                                                  40⤵
                                                                                  • Executes dropped EXE
                                                                                  • Loads dropped DLL
                                                                                  • Drops file in System32 directory
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  PID:2312
                                                                                  • C:\Windows\SysWOW64\wmpsd1.exe
                                                                                    "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                                                                    41⤵
                                                                                    • Executes dropped EXE
                                                                                    • Loads dropped DLL
                                                                                    • Suspicious use of SetThreadContext
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:2256
                                                                                    • C:\Windows\SysWOW64\wmpsd1.exe
                                                                                      "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                                                                      42⤵
                                                                                      • Executes dropped EXE
                                                                                      • Loads dropped DLL
                                                                                      • Drops file in System32 directory
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      PID:2288
                                                                                      • C:\Windows\SysWOW64\wmpsd1.exe
                                                                                        "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                                                                        43⤵
                                                                                        • Executes dropped EXE
                                                                                        • Suspicious use of SetThreadContext
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        PID:1588
                                                                                        • C:\Windows\SysWOW64\wmpsd1.exe
                                                                                          "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                                                                          44⤵
                                                                                          • Executes dropped EXE
                                                                                          • Drops file in System32 directory
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                          PID:2424
                                                                                          • C:\Windows\SysWOW64\wmpsd1.exe
                                                                                            "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                                                                            45⤵
                                                                                            • Executes dropped EXE
                                                                                            • Suspicious use of SetThreadContext
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:2912
                                                                                            • C:\Windows\SysWOW64\wmpsd1.exe
                                                                                              "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                                                                              46⤵
                                                                                              • Executes dropped EXE
                                                                                              • Drops file in System32 directory
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              PID:2564
                                                                                              • C:\Windows\SysWOW64\wmpsd1.exe
                                                                                                "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                                                                                47⤵
                                                                                                • Executes dropped EXE
                                                                                                • Suspicious use of SetThreadContext
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:2524
                                                                                                • C:\Windows\SysWOW64\wmpsd1.exe
                                                                                                  "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                                                                                  48⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Drops file in System32 directory
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  PID:1728
                                                                                                  • C:\Windows\SysWOW64\wmpsd1.exe
                                                                                                    "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                                                                                    49⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Suspicious use of SetThreadContext
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    PID:844
                                                                                                    • C:\Windows\SysWOW64\wmpsd1.exe
                                                                                                      "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                                                                                      50⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Drops file in System32 directory
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      PID:1708
                                                                                                      • C:\Windows\SysWOW64\wmpsd1.exe
                                                                                                        "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                                                                                        51⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Suspicious use of SetThreadContext
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:3032
                                                                                                        • C:\Windows\SysWOW64\wmpsd1.exe
                                                                                                          "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                                                                                          52⤵
                                                                                                          • Executes dropped EXE
                                                                                                          • Drops file in System32 directory
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          PID:2568
                                                                                                          • C:\Windows\SysWOW64\wmpsd1.exe
                                                                                                            "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                                                                                            53⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • Suspicious use of SetThreadContext
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:2856
                                                                                                            • C:\Windows\SysWOW64\wmpsd1.exe
                                                                                                              "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                                                                                              54⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Drops file in System32 directory
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                              PID:1652
                                                                                                              • C:\Windows\SysWOW64\wmpsd1.exe
                                                                                                                "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                                                                                                55⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • Suspicious use of SetThreadContext
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                PID:2528
                                                                                                                • C:\Windows\SysWOW64\wmpsd1.exe
                                                                                                                  "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                                                                                                  56⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Drops file in System32 directory
                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                  PID:1464
                                                                                                                  • C:\Windows\SysWOW64\wmpsd1.exe
                                                                                                                    "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                                                                                                    57⤵
                                                                                                                      PID:2008
                                                                                                                      • C:\Windows\SysWOW64\wmpsd1.exe
                                                                                                                        "C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe
                                                                                                                        58⤵
                                                                                                                          PID:2732

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • \Users\Admin\AppData\Local\Temp\AIJ.dll

        Filesize

        5KB

        MD5

        278d3864e98a1620991854ddeb0b771c

        SHA1

        c27a6eec37f0392a132496b8715d46217c2e73cf

        SHA256

        839511592e34a655edbeebda7f8c78a39bdfa834e9f4c54d8b0498537694f11f

        SHA512

        4addead42833157043042aa05ea448b4bd97be5d18085d99a8ab85eab2c6508be7db55a9d7163a521240ca55034ba68057e17875a92d4a3c868e15294aec8dcc

      • \Windows\SysWOW64\wmpsd1.exe

        Filesize

        149KB

        MD5

        df231f3dc9b26bc2833154a727605d91

        SHA1

        bafd9bbf0fa223b501708f273176f6c6d519bb36

        SHA256

        d923f46b1c0d0660ddc0bb3354ecfb548661def894d185d753571d23af0911fa

        SHA512

        ca1ca3701a8b09a3e6e6e767cc68cad20df6677afa37253a5cf47f3a863678456fc863668d14e5b24a573d30ec0ea9929ecae753539f9c05a393a8fdcddd9c58

      • memory/628-922-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/628-918-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/1100-520-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/1100-514-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/1304-116-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/1304-110-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/1304-109-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/1304-108-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/1328-179-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/1328-159-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/1372-434-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/1372-411-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/1464-1323-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/1464-1341-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/1552-383-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/1552-361-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/1652-1315-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/1708-1212-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/1708-1189-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/1728-1162-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/1728-1143-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/1916-877-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/1916-874-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/1944-829-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/1944-847-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/1976-693-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/1976-699-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2000-562-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2000-558-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2172-265-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2172-258-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2268-496-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2280-203-0x0000000000240000-0x0000000000250000-memory.dmp

        Filesize

        64KB

      • memory/2280-201-0x0000000000240000-0x0000000000250000-memory.dmp

        Filesize

        64KB

      • memory/2288-1009-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2288-1037-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2312-963-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2312-983-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2320-668-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2320-648-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2420-744-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2420-739-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2424-1054-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2424-1059-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2432-217-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2564-1097-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2564-1108-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2568-1237-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2568-1234-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2732-1368-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2744-609-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2744-603-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2792-45-0x00000000002A0000-0x00000000002B0000-memory.dmp

        Filesize

        64KB

      • memory/2792-23-0x00000000002A0000-0x00000000002B0000-memory.dmp

        Filesize

        64KB

      • memory/2792-29-0x00000000002A0000-0x00000000002B0000-memory.dmp

        Filesize

        64KB

      • memory/2792-22-0x00000000002A0000-0x00000000002B0000-memory.dmp

        Filesize

        64KB

      • memory/2792-39-0x00000000002A0000-0x00000000002B0000-memory.dmp

        Filesize

        64KB

      • memory/2792-28-0x00000000002A0000-0x00000000002B0000-memory.dmp

        Filesize

        64KB

      • memory/2792-37-0x00000000002A0000-0x00000000002B0000-memory.dmp

        Filesize

        64KB

      • memory/2792-38-0x00000000002A0000-0x00000000002B0000-memory.dmp

        Filesize

        64KB

      • memory/2808-310-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2808-332-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2812-47-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2812-48-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2812-40-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2812-86-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2812-49-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2812-43-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2812-32-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2812-34-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2812-30-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2812-50-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2924-783-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2924-802-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2948-151-0x00000000008D0000-0x00000000008E0000-memory.dmp

        Filesize

        64KB

      • memory/2948-155-0x00000000008D0000-0x00000000008E0000-memory.dmp

        Filesize

        64KB

      • memory/2948-153-0x00000000008D0000-0x00000000008E0000-memory.dmp

        Filesize

        64KB

      • memory/2952-101-0x00000000002B0000-0x00000000002C0000-memory.dmp

        Filesize

        64KB

      • memory/2952-105-0x00000000002B0000-0x00000000002C0000-memory.dmp

        Filesize

        64KB

      • memory/2952-103-0x00000000002B0000-0x00000000002C0000-memory.dmp

        Filesize

        64KB