Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 00:05
Static task
static1
Behavioral task
behavioral1
Sample
df231f3dc9b26bc2833154a727605d91_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df231f3dc9b26bc2833154a727605d91_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
df231f3dc9b26bc2833154a727605d91_JaffaCakes118.exe
-
Size
149KB
-
MD5
df231f3dc9b26bc2833154a727605d91
-
SHA1
bafd9bbf0fa223b501708f273176f6c6d519bb36
-
SHA256
d923f46b1c0d0660ddc0bb3354ecfb548661def894d185d753571d23af0911fa
-
SHA512
ca1ca3701a8b09a3e6e6e767cc68cad20df6677afa37253a5cf47f3a863678456fc863668d14e5b24a573d30ec0ea9929ecae753539f9c05a393a8fdcddd9c58
-
SSDEEP
3072:1Yknf95/09PD69ajp6hZIt947R7gQV8D2RToWHfV4kuBnaj2KNgc:j95M974uCItmN7lV8aRToWHfkaj2KNX
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 1304 wmpsd1.exe -
Executes dropped EXE 54 IoCs
pid Process 2952 wmpsd1.exe 1304 wmpsd1.exe 2948 wmpsd1.exe 1328 wmpsd1.exe 2280 wmpsd1.exe 2432 wmpsd1.exe 1544 wmpsd1.exe 2172 wmpsd1.exe 1600 wmpsd1.exe 2808 wmpsd1.exe 2980 wmpsd1.exe 1552 wmpsd1.exe 3024 wmpsd1.exe 1372 wmpsd1.exe 1752 wmpsd1.exe 2268 wmpsd1.exe 1028 wmpsd1.exe 1100 wmpsd1.exe 1648 wmpsd1.exe 2000 wmpsd1.exe 2740 wmpsd1.exe 2744 wmpsd1.exe 1560 wmpsd1.exe 2320 wmpsd1.exe 2412 wmpsd1.exe 1976 wmpsd1.exe 1760 wmpsd1.exe 2420 wmpsd1.exe 1264 wmpsd1.exe 2924 wmpsd1.exe 2148 wmpsd1.exe 1944 wmpsd1.exe 1620 wmpsd1.exe 1916 wmpsd1.exe 2884 wmpsd1.exe 628 wmpsd1.exe 2496 wmpsd1.exe 2312 wmpsd1.exe 2256 wmpsd1.exe 2288 wmpsd1.exe 1588 wmpsd1.exe 2424 wmpsd1.exe 2912 wmpsd1.exe 2564 wmpsd1.exe 2524 wmpsd1.exe 1728 wmpsd1.exe 844 wmpsd1.exe 1708 wmpsd1.exe 3032 wmpsd1.exe 2568 wmpsd1.exe 2856 wmpsd1.exe 1652 wmpsd1.exe 2528 wmpsd1.exe 1464 wmpsd1.exe -
Loads dropped DLL 64 IoCs
pid Process 2792 df231f3dc9b26bc2833154a727605d91_JaffaCakes118.exe 2812 df231f3dc9b26bc2833154a727605d91_JaffaCakes118.exe 2812 df231f3dc9b26bc2833154a727605d91_JaffaCakes118.exe 2952 wmpsd1.exe 2952 wmpsd1.exe 1304 wmpsd1.exe 1304 wmpsd1.exe 2948 wmpsd1.exe 1328 wmpsd1.exe 1328 wmpsd1.exe 2280 wmpsd1.exe 2432 wmpsd1.exe 2432 wmpsd1.exe 1544 wmpsd1.exe 2172 wmpsd1.exe 2172 wmpsd1.exe 1600 wmpsd1.exe 2808 wmpsd1.exe 2808 wmpsd1.exe 2980 wmpsd1.exe 1552 wmpsd1.exe 1552 wmpsd1.exe 3024 wmpsd1.exe 1372 wmpsd1.exe 1372 wmpsd1.exe 1752 wmpsd1.exe 2268 wmpsd1.exe 2268 wmpsd1.exe 1028 wmpsd1.exe 1100 wmpsd1.exe 1100 wmpsd1.exe 1648 wmpsd1.exe 2000 wmpsd1.exe 2000 wmpsd1.exe 2740 wmpsd1.exe 2744 wmpsd1.exe 2744 wmpsd1.exe 1560 wmpsd1.exe 2320 wmpsd1.exe 2320 wmpsd1.exe 2412 wmpsd1.exe 1976 wmpsd1.exe 1976 wmpsd1.exe 1760 wmpsd1.exe 2420 wmpsd1.exe 2420 wmpsd1.exe 1264 wmpsd1.exe 2924 wmpsd1.exe 2924 wmpsd1.exe 2148 wmpsd1.exe 1944 wmpsd1.exe 1944 wmpsd1.exe 1620 wmpsd1.exe 1916 wmpsd1.exe 1916 wmpsd1.exe 2884 wmpsd1.exe 628 wmpsd1.exe 628 wmpsd1.exe 2496 wmpsd1.exe 2312 wmpsd1.exe 2312 wmpsd1.exe 2256 wmpsd1.exe 2288 wmpsd1.exe 2288 wmpsd1.exe -
resource yara_rule behavioral1/memory/2812-32-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2812-49-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2812-50-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2812-48-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2812-47-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2812-43-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2812-34-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1304-108-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1304-109-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2812-86-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1304-110-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1304-116-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1328-159-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1328-179-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2432-217-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2172-258-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2172-265-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2808-310-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1552-361-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2808-332-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1552-383-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1372-411-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1372-434-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2268-496-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1100-514-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1100-520-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2000-558-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2000-562-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2744-603-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2744-609-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2320-648-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2320-668-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1976-693-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1976-699-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2420-739-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2420-744-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2924-783-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2924-802-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1944-829-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1944-847-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1916-874-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1916-877-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/628-918-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/628-922-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2312-963-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2312-983-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2288-1009-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2288-1037-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2424-1054-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2424-1059-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2564-1097-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2564-1108-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1728-1143-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1728-1162-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1708-1189-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1708-1212-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2568-1234-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2568-1237-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1464-1323-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1652-1315-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1464-1341-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2732-1368-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Drops file in System32 directory 56 IoCs
description ioc Process File created C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File opened for modification C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File created C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File created C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File opened for modification C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File created C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File opened for modification C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File opened for modification C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File created C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File opened for modification C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File opened for modification C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File opened for modification C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File opened for modification C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File created C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File created C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File created C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File opened for modification C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File opened for modification C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File created C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File opened for modification C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File opened for modification C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File opened for modification C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File opened for modification C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File created C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File created C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File opened for modification C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File opened for modification C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File created C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File created C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File created C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File created C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File opened for modification C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File created C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File created C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File opened for modification C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File created C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File created C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File opened for modification C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File opened for modification C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File created C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File opened for modification C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File created C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File created C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File created C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File created C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File opened for modification C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File created C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File opened for modification C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File opened for modification C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File opened for modification C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File opened for modification C:\Windows\SysWOW64\wmpsd1.exe df231f3dc9b26bc2833154a727605d91_JaffaCakes118.exe File created C:\Windows\SysWOW64\wmpsd1.exe df231f3dc9b26bc2833154a727605d91_JaffaCakes118.exe File created C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File opened for modification C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File created C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe File opened for modification C:\Windows\SysWOW64\wmpsd1.exe wmpsd1.exe -
Suspicious use of SetThreadContext 28 IoCs
description pid Process procid_target PID 2792 set thread context of 2812 2792 df231f3dc9b26bc2833154a727605d91_JaffaCakes118.exe 30 PID 2952 set thread context of 1304 2952 wmpsd1.exe 32 PID 2948 set thread context of 1328 2948 wmpsd1.exe 34 PID 2280 set thread context of 2432 2280 wmpsd1.exe 36 PID 1544 set thread context of 2172 1544 wmpsd1.exe 38 PID 1600 set thread context of 2808 1600 wmpsd1.exe 40 PID 2980 set thread context of 1552 2980 wmpsd1.exe 42 PID 3024 set thread context of 1372 3024 wmpsd1.exe 44 PID 1752 set thread context of 2268 1752 wmpsd1.exe 46 PID 1028 set thread context of 1100 1028 wmpsd1.exe 48 PID 1648 set thread context of 2000 1648 wmpsd1.exe 50 PID 2740 set thread context of 2744 2740 wmpsd1.exe 52 PID 1560 set thread context of 2320 1560 wmpsd1.exe 54 PID 2412 set thread context of 1976 2412 wmpsd1.exe 56 PID 1760 set thread context of 2420 1760 wmpsd1.exe 58 PID 1264 set thread context of 2924 1264 wmpsd1.exe 60 PID 2148 set thread context of 1944 2148 wmpsd1.exe 63 PID 1620 set thread context of 1916 1620 wmpsd1.exe 65 PID 2884 set thread context of 628 2884 wmpsd1.exe 67 PID 2496 set thread context of 2312 2496 wmpsd1.exe 69 PID 2256 set thread context of 2288 2256 wmpsd1.exe 71 PID 1588 set thread context of 2424 1588 wmpsd1.exe 73 PID 2912 set thread context of 2564 2912 wmpsd1.exe 75 PID 2524 set thread context of 1728 2524 wmpsd1.exe 77 PID 844 set thread context of 1708 844 wmpsd1.exe 79 PID 3032 set thread context of 2568 3032 wmpsd1.exe 81 PID 2856 set thread context of 1652 2856 wmpsd1.exe 83 PID 2528 set thread context of 1464 2528 wmpsd1.exe 85 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 56 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df231f3dc9b26bc2833154a727605d91_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df231f3dc9b26bc2833154a727605d91_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd1.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2812 df231f3dc9b26bc2833154a727605d91_JaffaCakes118.exe 1304 wmpsd1.exe 1328 wmpsd1.exe 2432 wmpsd1.exe 2172 wmpsd1.exe 2808 wmpsd1.exe 1552 wmpsd1.exe 1372 wmpsd1.exe 2268 wmpsd1.exe 1100 wmpsd1.exe 2000 wmpsd1.exe 2744 wmpsd1.exe 2320 wmpsd1.exe 1976 wmpsd1.exe 2420 wmpsd1.exe 2924 wmpsd1.exe 1944 wmpsd1.exe 1916 wmpsd1.exe 628 wmpsd1.exe 2312 wmpsd1.exe 2288 wmpsd1.exe 2424 wmpsd1.exe 2564 wmpsd1.exe 1728 wmpsd1.exe 1708 wmpsd1.exe 2568 wmpsd1.exe 1652 wmpsd1.exe 1464 wmpsd1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2812 2792 df231f3dc9b26bc2833154a727605d91_JaffaCakes118.exe 30 PID 2792 wrote to memory of 2812 2792 df231f3dc9b26bc2833154a727605d91_JaffaCakes118.exe 30 PID 2792 wrote to memory of 2812 2792 df231f3dc9b26bc2833154a727605d91_JaffaCakes118.exe 30 PID 2792 wrote to memory of 2812 2792 df231f3dc9b26bc2833154a727605d91_JaffaCakes118.exe 30 PID 2792 wrote to memory of 2812 2792 df231f3dc9b26bc2833154a727605d91_JaffaCakes118.exe 30 PID 2792 wrote to memory of 2812 2792 df231f3dc9b26bc2833154a727605d91_JaffaCakes118.exe 30 PID 2792 wrote to memory of 2812 2792 df231f3dc9b26bc2833154a727605d91_JaffaCakes118.exe 30 PID 2792 wrote to memory of 2812 2792 df231f3dc9b26bc2833154a727605d91_JaffaCakes118.exe 30 PID 2812 wrote to memory of 2952 2812 df231f3dc9b26bc2833154a727605d91_JaffaCakes118.exe 31 PID 2812 wrote to memory of 2952 2812 df231f3dc9b26bc2833154a727605d91_JaffaCakes118.exe 31 PID 2812 wrote to memory of 2952 2812 df231f3dc9b26bc2833154a727605d91_JaffaCakes118.exe 31 PID 2812 wrote to memory of 2952 2812 df231f3dc9b26bc2833154a727605d91_JaffaCakes118.exe 31 PID 2952 wrote to memory of 1304 2952 wmpsd1.exe 32 PID 2952 wrote to memory of 1304 2952 wmpsd1.exe 32 PID 2952 wrote to memory of 1304 2952 wmpsd1.exe 32 PID 2952 wrote to memory of 1304 2952 wmpsd1.exe 32 PID 2952 wrote to memory of 1304 2952 wmpsd1.exe 32 PID 2952 wrote to memory of 1304 2952 wmpsd1.exe 32 PID 2952 wrote to memory of 1304 2952 wmpsd1.exe 32 PID 2952 wrote to memory of 1304 2952 wmpsd1.exe 32 PID 1304 wrote to memory of 2948 1304 wmpsd1.exe 33 PID 1304 wrote to memory of 2948 1304 wmpsd1.exe 33 PID 1304 wrote to memory of 2948 1304 wmpsd1.exe 33 PID 1304 wrote to memory of 2948 1304 wmpsd1.exe 33 PID 2948 wrote to memory of 1328 2948 wmpsd1.exe 34 PID 2948 wrote to memory of 1328 2948 wmpsd1.exe 34 PID 2948 wrote to memory of 1328 2948 wmpsd1.exe 34 PID 2948 wrote to memory of 1328 2948 wmpsd1.exe 34 PID 2948 wrote to memory of 1328 2948 wmpsd1.exe 34 PID 2948 wrote to memory of 1328 2948 wmpsd1.exe 34 PID 2948 wrote to memory of 1328 2948 wmpsd1.exe 34 PID 2948 wrote to memory of 1328 2948 wmpsd1.exe 34 PID 1328 wrote to memory of 2280 1328 wmpsd1.exe 35 PID 1328 wrote to memory of 2280 1328 wmpsd1.exe 35 PID 1328 wrote to memory of 2280 1328 wmpsd1.exe 35 PID 1328 wrote to memory of 2280 1328 wmpsd1.exe 35 PID 2280 wrote to memory of 2432 2280 wmpsd1.exe 36 PID 2280 wrote to memory of 2432 2280 wmpsd1.exe 36 PID 2280 wrote to memory of 2432 2280 wmpsd1.exe 36 PID 2280 wrote to memory of 2432 2280 wmpsd1.exe 36 PID 2280 wrote to memory of 2432 2280 wmpsd1.exe 36 PID 2280 wrote to memory of 2432 2280 wmpsd1.exe 36 PID 2280 wrote to memory of 2432 2280 wmpsd1.exe 36 PID 2280 wrote to memory of 2432 2280 wmpsd1.exe 36 PID 2432 wrote to memory of 1544 2432 wmpsd1.exe 37 PID 2432 wrote to memory of 1544 2432 wmpsd1.exe 37 PID 2432 wrote to memory of 1544 2432 wmpsd1.exe 37 PID 2432 wrote to memory of 1544 2432 wmpsd1.exe 37 PID 1544 wrote to memory of 2172 1544 wmpsd1.exe 38 PID 1544 wrote to memory of 2172 1544 wmpsd1.exe 38 PID 1544 wrote to memory of 2172 1544 wmpsd1.exe 38 PID 1544 wrote to memory of 2172 1544 wmpsd1.exe 38 PID 1544 wrote to memory of 2172 1544 wmpsd1.exe 38 PID 1544 wrote to memory of 2172 1544 wmpsd1.exe 38 PID 1544 wrote to memory of 2172 1544 wmpsd1.exe 38 PID 1544 wrote to memory of 2172 1544 wmpsd1.exe 38 PID 2172 wrote to memory of 1600 2172 wmpsd1.exe 39 PID 2172 wrote to memory of 1600 2172 wmpsd1.exe 39 PID 2172 wrote to memory of 1600 2172 wmpsd1.exe 39 PID 2172 wrote to memory of 1600 2172 wmpsd1.exe 39 PID 1600 wrote to memory of 2808 1600 wmpsd1.exe 40 PID 1600 wrote to memory of 2808 1600 wmpsd1.exe 40 PID 1600 wrote to memory of 2808 1600 wmpsd1.exe 40 PID 1600 wrote to memory of 2808 1600 wmpsd1.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\df231f3dc9b26bc2833154a727605d91_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\df231f3dc9b26bc2833154a727605d91_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\df231f3dc9b26bc2833154a727605d91_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\df231f3dc9b26bc2833154a727605d91_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Users\Admin\AppData\Local\Temp\DF231F~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Users\Admin\AppData\Local\Temp\DF231F~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2808 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2980 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1552 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3024 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1372 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1752 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2268 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1028 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1100 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1648 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2000 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2740 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2744 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1560 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2320 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2412 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1976 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1760 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2420 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1264 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2924 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe33⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2148 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe34⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1944 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe35⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1620 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe36⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1916 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe37⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2884 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe38⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:628 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe39⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2496 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe40⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2312 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe41⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2256 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe42⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2288 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1588 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe44⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2424 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2912 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2564 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2524 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe48⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1728 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:844 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1708 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3032 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe52⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2568 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2856 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1652 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2528 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe56⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1464 -
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe57⤵PID:2008
-
C:\Windows\SysWOW64\wmpsd1.exe"C:\Windows\system32\wmpsd1.exe" C:\Windows\SysWOW64\wmpsd1.exe58⤵PID:2732
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5278d3864e98a1620991854ddeb0b771c
SHA1c27a6eec37f0392a132496b8715d46217c2e73cf
SHA256839511592e34a655edbeebda7f8c78a39bdfa834e9f4c54d8b0498537694f11f
SHA5124addead42833157043042aa05ea448b4bd97be5d18085d99a8ab85eab2c6508be7db55a9d7163a521240ca55034ba68057e17875a92d4a3c868e15294aec8dcc
-
Filesize
149KB
MD5df231f3dc9b26bc2833154a727605d91
SHA1bafd9bbf0fa223b501708f273176f6c6d519bb36
SHA256d923f46b1c0d0660ddc0bb3354ecfb548661def894d185d753571d23af0911fa
SHA512ca1ca3701a8b09a3e6e6e767cc68cad20df6677afa37253a5cf47f3a863678456fc863668d14e5b24a573d30ec0ea9929ecae753539f9c05a393a8fdcddd9c58