Analysis
-
max time kernel
149s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 21:01
Static task
static1
Behavioral task
behavioral1
Sample
e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe
-
Size
220KB
-
MD5
e1073e377d4732875de30629e06d77fb
-
SHA1
7e2bc5324d02c1040c660c2f2dbb40ebcc06f5dd
-
SHA256
3e68bf6ed3ceaf0b2058bd762d9549fd4ce4d3877fb252003d3865995ad17d44
-
SHA512
e8e22e8ed87f96c678f8d48367492476e429a84de5d5f0c8e5da1d3da6c60e2447b9d10c4fea91f404e6c90aa30bc95f97f96703939350f1cebf4968caa270b6
-
SSDEEP
3072:0weV9Lijj7mOxtDIip1ucq0pq+eQ6wFvbqG43yl86UqC:0weKIMupqTgwtbqP3yl8l
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2956 wmpdnc32.exe -
Executes dropped EXE 32 IoCs
pid Process 2980 wmpdnc32.exe 2956 wmpdnc32.exe 872 wmpdnc32.exe 2280 wmpdnc32.exe 1416 wmpdnc32.exe 764 wmpdnc32.exe 1048 wmpdnc32.exe 2100 wmpdnc32.exe 2216 wmpdnc32.exe 2532 wmpdnc32.exe 2164 wmpdnc32.exe 1552 wmpdnc32.exe 1644 wmpdnc32.exe 2072 wmpdnc32.exe 1020 wmpdnc32.exe 264 wmpdnc32.exe 1780 wmpdnc32.exe 1396 wmpdnc32.exe 2932 wmpdnc32.exe 2840 wmpdnc32.exe 2748 wmpdnc32.exe 2744 wmpdnc32.exe 1340 wmpdnc32.exe 2536 wmpdnc32.exe 3048 wmpdnc32.exe 568 wmpdnc32.exe 2436 wmpdnc32.exe 236 wmpdnc32.exe 1500 wmpdnc32.exe 1956 wmpdnc32.exe 1932 wmpdnc32.exe 2236 wmpdnc32.exe -
Loads dropped DLL 64 IoCs
pid Process 2376 e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe 2376 e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe 2980 wmpdnc32.exe 2980 wmpdnc32.exe 2956 wmpdnc32.exe 2956 wmpdnc32.exe 872 wmpdnc32.exe 872 wmpdnc32.exe 2280 wmpdnc32.exe 2280 wmpdnc32.exe 1416 wmpdnc32.exe 1416 wmpdnc32.exe 764 wmpdnc32.exe 764 wmpdnc32.exe 1048 wmpdnc32.exe 1048 wmpdnc32.exe 2100 wmpdnc32.exe 2100 wmpdnc32.exe 2216 wmpdnc32.exe 2216 wmpdnc32.exe 2532 wmpdnc32.exe 2532 wmpdnc32.exe 2164 wmpdnc32.exe 2164 wmpdnc32.exe 1552 wmpdnc32.exe 1552 wmpdnc32.exe 1644 wmpdnc32.exe 1644 wmpdnc32.exe 2072 wmpdnc32.exe 2072 wmpdnc32.exe 1020 wmpdnc32.exe 1020 wmpdnc32.exe 264 wmpdnc32.exe 264 wmpdnc32.exe 1780 wmpdnc32.exe 1780 wmpdnc32.exe 1396 wmpdnc32.exe 1396 wmpdnc32.exe 2932 wmpdnc32.exe 2932 wmpdnc32.exe 2840 wmpdnc32.exe 2840 wmpdnc32.exe 2748 wmpdnc32.exe 2748 wmpdnc32.exe 2744 wmpdnc32.exe 2744 wmpdnc32.exe 1340 wmpdnc32.exe 1340 wmpdnc32.exe 2536 wmpdnc32.exe 2536 wmpdnc32.exe 3048 wmpdnc32.exe 3048 wmpdnc32.exe 568 wmpdnc32.exe 568 wmpdnc32.exe 2436 wmpdnc32.exe 2436 wmpdnc32.exe 236 wmpdnc32.exe 236 wmpdnc32.exe 1500 wmpdnc32.exe 1500 wmpdnc32.exe 1956 wmpdnc32.exe 1956 wmpdnc32.exe 1932 wmpdnc32.exe 1932 wmpdnc32.exe -
resource yara_rule behavioral1/memory/2376-2-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2376-5-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2376-10-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2376-9-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2376-8-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2376-4-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2376-11-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2376-14-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2376-25-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2956-38-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2956-37-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2956-39-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2956-41-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2956-40-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2956-42-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2956-49-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2280-61-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2280-62-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2280-68-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/764-79-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/764-80-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/764-81-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/764-89-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2100-101-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2532-117-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2100-120-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2100-115-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2532-127-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/1552-139-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/1552-146-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2072-158-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2072-166-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/264-178-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/264-185-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/1396-197-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2840-213-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/1396-212-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2840-224-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2840-228-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2744-226-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2536-237-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2744-241-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2536-251-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/568-253-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/568-257-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/236-266-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/236-270-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/1956-279-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/1956-290-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2236-292-0x0000000000400000-0x0000000000451000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 34 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdnc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdnc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdnc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdnc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdnc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdnc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdnc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdnc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdnc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdnc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdnc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdnc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdnc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdnc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdnc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdnc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdnc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdnc32.exe -
Drops file in System32 directory 48 IoCs
description ioc Process File created C:\Windows\SysWOW64\wmpdnc32.exe e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ wmpdnc32.exe File created C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File created C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File created C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File created C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File created C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdnc32.exe File created C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdnc32.exe File created C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\ e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe File created C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File created C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File created C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File created C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File created C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdnc32.exe File created C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\wmpdnc32.exe e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdnc32.exe File created C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdnc32.exe File created C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe -
Suspicious use of SetThreadContext 17 IoCs
description pid Process procid_target PID 1760 set thread context of 2376 1760 e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe 30 PID 2980 set thread context of 2956 2980 wmpdnc32.exe 32 PID 872 set thread context of 2280 872 wmpdnc32.exe 34 PID 1416 set thread context of 764 1416 wmpdnc32.exe 36 PID 1048 set thread context of 2100 1048 wmpdnc32.exe 38 PID 2216 set thread context of 2532 2216 wmpdnc32.exe 40 PID 2164 set thread context of 1552 2164 wmpdnc32.exe 42 PID 1644 set thread context of 2072 1644 wmpdnc32.exe 44 PID 1020 set thread context of 264 1020 wmpdnc32.exe 46 PID 1780 set thread context of 1396 1780 wmpdnc32.exe 48 PID 2932 set thread context of 2840 2932 wmpdnc32.exe 50 PID 2748 set thread context of 2744 2748 wmpdnc32.exe 52 PID 1340 set thread context of 2536 1340 wmpdnc32.exe 54 PID 3048 set thread context of 568 3048 wmpdnc32.exe 56 PID 2436 set thread context of 236 2436 wmpdnc32.exe 58 PID 1500 set thread context of 1956 1500 wmpdnc32.exe 60 PID 1932 set thread context of 2236 1932 wmpdnc32.exe 62 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 33 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 2376 e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe 2376 e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe 2956 wmpdnc32.exe 2956 wmpdnc32.exe 2280 wmpdnc32.exe 2280 wmpdnc32.exe 764 wmpdnc32.exe 764 wmpdnc32.exe 2100 wmpdnc32.exe 2100 wmpdnc32.exe 2532 wmpdnc32.exe 2532 wmpdnc32.exe 1552 wmpdnc32.exe 1552 wmpdnc32.exe 2072 wmpdnc32.exe 2072 wmpdnc32.exe 264 wmpdnc32.exe 264 wmpdnc32.exe 1396 wmpdnc32.exe 1396 wmpdnc32.exe 2840 wmpdnc32.exe 2840 wmpdnc32.exe 2744 wmpdnc32.exe 2744 wmpdnc32.exe 2536 wmpdnc32.exe 2536 wmpdnc32.exe 568 wmpdnc32.exe 568 wmpdnc32.exe 236 wmpdnc32.exe 236 wmpdnc32.exe 1956 wmpdnc32.exe 1956 wmpdnc32.exe 2236 wmpdnc32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1760 wrote to memory of 2376 1760 e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe 30 PID 1760 wrote to memory of 2376 1760 e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe 30 PID 1760 wrote to memory of 2376 1760 e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe 30 PID 1760 wrote to memory of 2376 1760 e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe 30 PID 1760 wrote to memory of 2376 1760 e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe 30 PID 1760 wrote to memory of 2376 1760 e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe 30 PID 1760 wrote to memory of 2376 1760 e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe 30 PID 2376 wrote to memory of 2980 2376 e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe 31 PID 2376 wrote to memory of 2980 2376 e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe 31 PID 2376 wrote to memory of 2980 2376 e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe 31 PID 2376 wrote to memory of 2980 2376 e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe 31 PID 2980 wrote to memory of 2956 2980 wmpdnc32.exe 32 PID 2980 wrote to memory of 2956 2980 wmpdnc32.exe 32 PID 2980 wrote to memory of 2956 2980 wmpdnc32.exe 32 PID 2980 wrote to memory of 2956 2980 wmpdnc32.exe 32 PID 2980 wrote to memory of 2956 2980 wmpdnc32.exe 32 PID 2980 wrote to memory of 2956 2980 wmpdnc32.exe 32 PID 2980 wrote to memory of 2956 2980 wmpdnc32.exe 32 PID 2956 wrote to memory of 872 2956 wmpdnc32.exe 33 PID 2956 wrote to memory of 872 2956 wmpdnc32.exe 33 PID 2956 wrote to memory of 872 2956 wmpdnc32.exe 33 PID 2956 wrote to memory of 872 2956 wmpdnc32.exe 33 PID 872 wrote to memory of 2280 872 wmpdnc32.exe 34 PID 872 wrote to memory of 2280 872 wmpdnc32.exe 34 PID 872 wrote to memory of 2280 872 wmpdnc32.exe 34 PID 872 wrote to memory of 2280 872 wmpdnc32.exe 34 PID 872 wrote to memory of 2280 872 wmpdnc32.exe 34 PID 872 wrote to memory of 2280 872 wmpdnc32.exe 34 PID 872 wrote to memory of 2280 872 wmpdnc32.exe 34 PID 2280 wrote to memory of 1416 2280 wmpdnc32.exe 35 PID 2280 wrote to memory of 1416 2280 wmpdnc32.exe 35 PID 2280 wrote to memory of 1416 2280 wmpdnc32.exe 35 PID 2280 wrote to memory of 1416 2280 wmpdnc32.exe 35 PID 1416 wrote to memory of 764 1416 wmpdnc32.exe 36 PID 1416 wrote to memory of 764 1416 wmpdnc32.exe 36 PID 1416 wrote to memory of 764 1416 wmpdnc32.exe 36 PID 1416 wrote to memory of 764 1416 wmpdnc32.exe 36 PID 1416 wrote to memory of 764 1416 wmpdnc32.exe 36 PID 1416 wrote to memory of 764 1416 wmpdnc32.exe 36 PID 1416 wrote to memory of 764 1416 wmpdnc32.exe 36 PID 764 wrote to memory of 1048 764 wmpdnc32.exe 37 PID 764 wrote to memory of 1048 764 wmpdnc32.exe 37 PID 764 wrote to memory of 1048 764 wmpdnc32.exe 37 PID 764 wrote to memory of 1048 764 wmpdnc32.exe 37 PID 1048 wrote to memory of 2100 1048 wmpdnc32.exe 38 PID 1048 wrote to memory of 2100 1048 wmpdnc32.exe 38 PID 1048 wrote to memory of 2100 1048 wmpdnc32.exe 38 PID 1048 wrote to memory of 2100 1048 wmpdnc32.exe 38 PID 1048 wrote to memory of 2100 1048 wmpdnc32.exe 38 PID 1048 wrote to memory of 2100 1048 wmpdnc32.exe 38 PID 1048 wrote to memory of 2100 1048 wmpdnc32.exe 38 PID 2100 wrote to memory of 2216 2100 wmpdnc32.exe 39 PID 2100 wrote to memory of 2216 2100 wmpdnc32.exe 39 PID 2100 wrote to memory of 2216 2100 wmpdnc32.exe 39 PID 2100 wrote to memory of 2216 2100 wmpdnc32.exe 39 PID 2216 wrote to memory of 2532 2216 wmpdnc32.exe 40 PID 2216 wrote to memory of 2532 2216 wmpdnc32.exe 40 PID 2216 wrote to memory of 2532 2216 wmpdnc32.exe 40 PID 2216 wrote to memory of 2532 2216 wmpdnc32.exe 40 PID 2216 wrote to memory of 2532 2216 wmpdnc32.exe 40 PID 2216 wrote to memory of 2532 2216 wmpdnc32.exe 40 PID 2216 wrote to memory of 2532 2216 wmpdnc32.exe 40 PID 2532 wrote to memory of 2164 2532 wmpdnc32.exe 41 PID 2532 wrote to memory of 2164 2532 wmpdnc32.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Users\Admin\AppData\Local\Temp\E1073E~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Users\Admin\AppData\Local\Temp\E1073E~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2164 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1552 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1644 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2072 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1020 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:264 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1780 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1396 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2932 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2840 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2748 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2744 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1340 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2536 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3048 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:568 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2436 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:236 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1500 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1956 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe33⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1932 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:2236
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
220KB
MD5e1073e377d4732875de30629e06d77fb
SHA17e2bc5324d02c1040c660c2f2dbb40ebcc06f5dd
SHA2563e68bf6ed3ceaf0b2058bd762d9549fd4ce4d3877fb252003d3865995ad17d44
SHA512e8e22e8ed87f96c678f8d48367492476e429a84de5d5f0c8e5da1d3da6c60e2447b9d10c4fea91f404e6c90aa30bc95f97f96703939350f1cebf4968caa270b6