Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 21:01
Static task
static1
Behavioral task
behavioral1
Sample
e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe
-
Size
220KB
-
MD5
e1073e377d4732875de30629e06d77fb
-
SHA1
7e2bc5324d02c1040c660c2f2dbb40ebcc06f5dd
-
SHA256
3e68bf6ed3ceaf0b2058bd762d9549fd4ce4d3877fb252003d3865995ad17d44
-
SHA512
e8e22e8ed87f96c678f8d48367492476e429a84de5d5f0c8e5da1d3da6c60e2447b9d10c4fea91f404e6c90aa30bc95f97f96703939350f1cebf4968caa270b6
-
SSDEEP
3072:0weV9Lijj7mOxtDIip1ucq0pq+eQ6wFvbqG43yl86UqC:0weKIMupqTgwtbqP3yl8l
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings 2 TTPs 15 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation wmpdnc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation wmpdnc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation wmpdnc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation wmpdnc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation wmpdnc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation wmpdnc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation wmpdnc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation wmpdnc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation wmpdnc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation wmpdnc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation wmpdnc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation wmpdnc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation wmpdnc32.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation wmpdnc32.exe -
Deletes itself 1 IoCs
pid Process 3032 wmpdnc32.exe -
Executes dropped EXE 30 IoCs
pid Process 760 wmpdnc32.exe 3032 wmpdnc32.exe 3884 wmpdnc32.exe 2780 wmpdnc32.exe 2520 wmpdnc32.exe 2032 wmpdnc32.exe 1576 wmpdnc32.exe 800 wmpdnc32.exe 4692 wmpdnc32.exe 3968 wmpdnc32.exe 4336 wmpdnc32.exe 4320 wmpdnc32.exe 1536 wmpdnc32.exe 1060 wmpdnc32.exe 4036 wmpdnc32.exe 1564 wmpdnc32.exe 2536 wmpdnc32.exe 4448 wmpdnc32.exe 776 wmpdnc32.exe 4896 wmpdnc32.exe 2084 wmpdnc32.exe 4040 wmpdnc32.exe 3884 wmpdnc32.exe 4020 wmpdnc32.exe 1620 wmpdnc32.exe 4864 wmpdnc32.exe 2736 wmpdnc32.exe 3480 wmpdnc32.exe 4260 wmpdnc32.exe 2588 wmpdnc32.exe -
resource yara_rule behavioral2/memory/5024-0-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/5024-2-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/5024-3-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/5024-4-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/5024-31-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/3032-43-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/5024-47-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/3032-48-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/3032-51-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/2780-58-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/2780-60-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/2780-63-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/2032-71-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/800-79-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/800-82-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/3968-88-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/3968-91-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/1060-101-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/4320-99-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/1060-105-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/1060-110-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/1564-114-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/1564-118-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/4448-122-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/4896-128-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/4896-132-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/4040-137-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/4040-141-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/4020-149-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/4020-153-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/4864-158-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/3480-169-0x0000000000400000-0x0000000000451000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 32 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdnc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdnc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdnc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdnc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdnc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdnc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdnc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdnc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdnc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdnc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdnc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdnc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdnc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdnc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdnc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdnc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdnc32.exe -
Drops file in System32 directory 46 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File created C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File created C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\wmpdnc32.exe e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdnc32.exe File created C:\Windows\SysWOW64\wmpdnc32.exe e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File created C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File created C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File created C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File created C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File created C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File created C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File created C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File created C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File created C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File created C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File created C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\ e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdnc32.exe File created C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe File opened for modification C:\Windows\SysWOW64\wmpdnc32.exe wmpdnc32.exe -
Suspicious use of SetThreadContext 16 IoCs
description pid Process procid_target PID 3128 set thread context of 5024 3128 e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe 84 PID 760 set thread context of 3032 760 wmpdnc32.exe 95 PID 3884 set thread context of 2780 3884 wmpdnc32.exe 97 PID 2520 set thread context of 2032 2520 wmpdnc32.exe 100 PID 1576 set thread context of 800 1576 wmpdnc32.exe 103 PID 4692 set thread context of 3968 4692 wmpdnc32.exe 105 PID 4336 set thread context of 4320 4336 wmpdnc32.exe 107 PID 1536 set thread context of 1060 1536 wmpdnc32.exe 109 PID 4036 set thread context of 1564 4036 wmpdnc32.exe 111 PID 2536 set thread context of 4448 2536 wmpdnc32.exe 113 PID 776 set thread context of 4896 776 wmpdnc32.exe 115 PID 2084 set thread context of 4040 2084 wmpdnc32.exe 117 PID 3884 set thread context of 4020 3884 wmpdnc32.exe 119 PID 1620 set thread context of 4864 1620 wmpdnc32.exe 121 PID 2736 set thread context of 3480 2736 wmpdnc32.exe 123 PID 4260 set thread context of 2588 4260 wmpdnc32.exe 125 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 31 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdnc32.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdnc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdnc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdnc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdnc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdnc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdnc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdnc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdnc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdnc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdnc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdnc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdnc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdnc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdnc32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5024 e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe 5024 e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe 5024 e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe 5024 e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe 3032 wmpdnc32.exe 3032 wmpdnc32.exe 3032 wmpdnc32.exe 3032 wmpdnc32.exe 2780 wmpdnc32.exe 2780 wmpdnc32.exe 2780 wmpdnc32.exe 2780 wmpdnc32.exe 2032 wmpdnc32.exe 2032 wmpdnc32.exe 2032 wmpdnc32.exe 2032 wmpdnc32.exe 800 wmpdnc32.exe 800 wmpdnc32.exe 800 wmpdnc32.exe 800 wmpdnc32.exe 3968 wmpdnc32.exe 3968 wmpdnc32.exe 3968 wmpdnc32.exe 3968 wmpdnc32.exe 4320 wmpdnc32.exe 4320 wmpdnc32.exe 4320 wmpdnc32.exe 4320 wmpdnc32.exe 1060 wmpdnc32.exe 1060 wmpdnc32.exe 1060 wmpdnc32.exe 1060 wmpdnc32.exe 1564 wmpdnc32.exe 1564 wmpdnc32.exe 1564 wmpdnc32.exe 1564 wmpdnc32.exe 4448 wmpdnc32.exe 4448 wmpdnc32.exe 4448 wmpdnc32.exe 4448 wmpdnc32.exe 4896 wmpdnc32.exe 4896 wmpdnc32.exe 4896 wmpdnc32.exe 4896 wmpdnc32.exe 4040 wmpdnc32.exe 4040 wmpdnc32.exe 4040 wmpdnc32.exe 4040 wmpdnc32.exe 4020 wmpdnc32.exe 4020 wmpdnc32.exe 4020 wmpdnc32.exe 4020 wmpdnc32.exe 4864 wmpdnc32.exe 4864 wmpdnc32.exe 4864 wmpdnc32.exe 4864 wmpdnc32.exe 3480 wmpdnc32.exe 3480 wmpdnc32.exe 3480 wmpdnc32.exe 3480 wmpdnc32.exe 2588 wmpdnc32.exe 2588 wmpdnc32.exe 2588 wmpdnc32.exe 2588 wmpdnc32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3128 wrote to memory of 5024 3128 e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe 84 PID 3128 wrote to memory of 5024 3128 e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe 84 PID 3128 wrote to memory of 5024 3128 e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe 84 PID 3128 wrote to memory of 5024 3128 e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe 84 PID 3128 wrote to memory of 5024 3128 e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe 84 PID 3128 wrote to memory of 5024 3128 e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe 84 PID 3128 wrote to memory of 5024 3128 e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe 84 PID 5024 wrote to memory of 760 5024 e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe 94 PID 5024 wrote to memory of 760 5024 e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe 94 PID 5024 wrote to memory of 760 5024 e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe 94 PID 760 wrote to memory of 3032 760 wmpdnc32.exe 95 PID 760 wrote to memory of 3032 760 wmpdnc32.exe 95 PID 760 wrote to memory of 3032 760 wmpdnc32.exe 95 PID 760 wrote to memory of 3032 760 wmpdnc32.exe 95 PID 760 wrote to memory of 3032 760 wmpdnc32.exe 95 PID 760 wrote to memory of 3032 760 wmpdnc32.exe 95 PID 760 wrote to memory of 3032 760 wmpdnc32.exe 95 PID 3032 wrote to memory of 3884 3032 wmpdnc32.exe 96 PID 3032 wrote to memory of 3884 3032 wmpdnc32.exe 96 PID 3032 wrote to memory of 3884 3032 wmpdnc32.exe 96 PID 3884 wrote to memory of 2780 3884 wmpdnc32.exe 97 PID 3884 wrote to memory of 2780 3884 wmpdnc32.exe 97 PID 3884 wrote to memory of 2780 3884 wmpdnc32.exe 97 PID 3884 wrote to memory of 2780 3884 wmpdnc32.exe 97 PID 3884 wrote to memory of 2780 3884 wmpdnc32.exe 97 PID 3884 wrote to memory of 2780 3884 wmpdnc32.exe 97 PID 3884 wrote to memory of 2780 3884 wmpdnc32.exe 97 PID 2780 wrote to memory of 2520 2780 wmpdnc32.exe 99 PID 2780 wrote to memory of 2520 2780 wmpdnc32.exe 99 PID 2780 wrote to memory of 2520 2780 wmpdnc32.exe 99 PID 2520 wrote to memory of 2032 2520 wmpdnc32.exe 100 PID 2520 wrote to memory of 2032 2520 wmpdnc32.exe 100 PID 2520 wrote to memory of 2032 2520 wmpdnc32.exe 100 PID 2520 wrote to memory of 2032 2520 wmpdnc32.exe 100 PID 2520 wrote to memory of 2032 2520 wmpdnc32.exe 100 PID 2520 wrote to memory of 2032 2520 wmpdnc32.exe 100 PID 2520 wrote to memory of 2032 2520 wmpdnc32.exe 100 PID 2032 wrote to memory of 1576 2032 wmpdnc32.exe 102 PID 2032 wrote to memory of 1576 2032 wmpdnc32.exe 102 PID 2032 wrote to memory of 1576 2032 wmpdnc32.exe 102 PID 1576 wrote to memory of 800 1576 wmpdnc32.exe 103 PID 1576 wrote to memory of 800 1576 wmpdnc32.exe 103 PID 1576 wrote to memory of 800 1576 wmpdnc32.exe 103 PID 1576 wrote to memory of 800 1576 wmpdnc32.exe 103 PID 1576 wrote to memory of 800 1576 wmpdnc32.exe 103 PID 1576 wrote to memory of 800 1576 wmpdnc32.exe 103 PID 1576 wrote to memory of 800 1576 wmpdnc32.exe 103 PID 800 wrote to memory of 4692 800 wmpdnc32.exe 104 PID 800 wrote to memory of 4692 800 wmpdnc32.exe 104 PID 800 wrote to memory of 4692 800 wmpdnc32.exe 104 PID 4692 wrote to memory of 3968 4692 wmpdnc32.exe 105 PID 4692 wrote to memory of 3968 4692 wmpdnc32.exe 105 PID 4692 wrote to memory of 3968 4692 wmpdnc32.exe 105 PID 4692 wrote to memory of 3968 4692 wmpdnc32.exe 105 PID 4692 wrote to memory of 3968 4692 wmpdnc32.exe 105 PID 4692 wrote to memory of 3968 4692 wmpdnc32.exe 105 PID 4692 wrote to memory of 3968 4692 wmpdnc32.exe 105 PID 3968 wrote to memory of 4336 3968 wmpdnc32.exe 106 PID 3968 wrote to memory of 4336 3968 wmpdnc32.exe 106 PID 3968 wrote to memory of 4336 3968 wmpdnc32.exe 106 PID 4336 wrote to memory of 4320 4336 wmpdnc32.exe 107 PID 4336 wrote to memory of 4320 4336 wmpdnc32.exe 107 PID 4336 wrote to memory of 4320 4336 wmpdnc32.exe 107 PID 4336 wrote to memory of 4320 4336 wmpdnc32.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e1073e377d4732875de30629e06d77fb_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Users\Admin\AppData\Local\Temp\E1073E~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Users\Admin\AppData\Local\Temp\E1073E~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4320 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1536 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1060 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4036 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1564 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2536 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4448 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:776 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4896 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2084 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4040 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3884 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4020 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1620 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4864 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2736 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3480 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4260 -
C:\Windows\SysWOW64\wmpdnc32.exe"C:\Windows\system32\wmpdnc32.exe" C:\Windows\SysWOW64\wmpdnc32.exe32⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2588
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
220KB
MD5e1073e377d4732875de30629e06d77fb
SHA17e2bc5324d02c1040c660c2f2dbb40ebcc06f5dd
SHA2563e68bf6ed3ceaf0b2058bd762d9549fd4ce4d3877fb252003d3865995ad17d44
SHA512e8e22e8ed87f96c678f8d48367492476e429a84de5d5f0c8e5da1d3da6c60e2447b9d10c4fea91f404e6c90aa30bc95f97f96703939350f1cebf4968caa270b6