Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 02:35
Static task
static1
Behavioral task
behavioral1
Sample
e189feb2abd4f0705dd9857e1ef3d011_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e189feb2abd4f0705dd9857e1ef3d011_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e189feb2abd4f0705dd9857e1ef3d011_JaffaCakes118.exe
-
Size
173KB
-
MD5
e189feb2abd4f0705dd9857e1ef3d011
-
SHA1
0bf9cdf7d76ff16330aeb500635ec6dc6c2b9fee
-
SHA256
905d3ef8ccef644ebb75dfd2c6581e60f160f45c48690a6fd44e2a59529e9c36
-
SHA512
de82b6baf6fcd7708919d8f34078ae9e553be9b79cdef11e3cf060a8c727e0571be6a6be4d531db94908684e46b7396c5f773e6b95cf157fed4f6328410de642
-
SSDEEP
3072:lCH44oraCJ/+rzxc3N80h/B+chaZi+VST3c1KxIn+DoR/E6atw3kJeN46kSGJ:t4o5Q480h/MucwLc1KxI+Ehd0em7
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2804 MsPfClient.exe -
Executes dropped EXE 64 IoCs
pid Process 1848 MsPfClient.exe 2804 MsPfClient.exe 3020 MsPfClient.exe 2628 MsPfClient.exe 2068 MsPfClient.exe 2312 MsPfClient.exe 2868 MsPfClient.exe 1760 MsPfClient.exe 2872 MsPfClient.exe 1948 MsPfClient.exe 2692 MsPfClient.exe 2028 MsPfClient.exe 1060 MsPfClient.exe 2320 MsPfClient.exe 2836 MsPfClient.exe 288 MsPfClient.exe 1520 MsPfClient.exe 272 MsPfClient.exe 2108 MsPfClient.exe 2072 MsPfClient.exe 2352 MsPfClient.exe 1576 MsPfClient.exe 1716 MsPfClient.exe 1268 MsPfClient.exe 2880 MsPfClient.exe 2908 MsPfClient.exe 2656 MsPfClient.exe 2724 MsPfClient.exe 548 MsPfClient.exe 536 MsPfClient.exe 2664 MsPfClient.exe 2008 MsPfClient.exe 2364 MsPfClient.exe 1284 MsPfClient.exe 2916 MsPfClient.exe 316 MsPfClient.exe 1788 MsPfClient.exe 2184 MsPfClient.exe 1908 MsPfClient.exe 2984 MsPfClient.exe 2096 MsPfClient.exe 2428 MsPfClient.exe 2104 MsPfClient.exe 1856 MsPfClient.exe 2452 MsPfClient.exe 2032 MsPfClient.exe 2172 MsPfClient.exe 1588 MsPfClient.exe 2532 MsPfClient.exe 1224 MsPfClient.exe 2732 MsPfClient.exe 2756 MsPfClient.exe 2132 MsPfClient.exe 2960 MsPfClient.exe 1556 MsPfClient.exe 1932 MsPfClient.exe 2832 MsPfClient.exe 2664 MsPfClient.exe 860 MsPfClient.exe 2912 MsPfClient.exe 1312 MsPfClient.exe 2064 MsPfClient.exe 1824 MsPfClient.exe 2152 MsPfClient.exe -
Loads dropped DLL 64 IoCs
pid Process 1700 e189feb2abd4f0705dd9857e1ef3d011_JaffaCakes118.exe 1700 e189feb2abd4f0705dd9857e1ef3d011_JaffaCakes118.exe 2804 MsPfClient.exe 2804 MsPfClient.exe 2628 MsPfClient.exe 2628 MsPfClient.exe 2312 MsPfClient.exe 2312 MsPfClient.exe 1760 MsPfClient.exe 1760 MsPfClient.exe 1948 MsPfClient.exe 1948 MsPfClient.exe 2028 MsPfClient.exe 2028 MsPfClient.exe 2320 MsPfClient.exe 2320 MsPfClient.exe 288 MsPfClient.exe 288 MsPfClient.exe 272 MsPfClient.exe 272 MsPfClient.exe 2072 MsPfClient.exe 2072 MsPfClient.exe 1576 MsPfClient.exe 1576 MsPfClient.exe 1268 MsPfClient.exe 1268 MsPfClient.exe 2908 MsPfClient.exe 2908 MsPfClient.exe 2724 MsPfClient.exe 2724 MsPfClient.exe 536 MsPfClient.exe 536 MsPfClient.exe 2008 MsPfClient.exe 2008 MsPfClient.exe 1284 MsPfClient.exe 1284 MsPfClient.exe 316 MsPfClient.exe 316 MsPfClient.exe 2184 MsPfClient.exe 2184 MsPfClient.exe 2984 MsPfClient.exe 2984 MsPfClient.exe 2428 MsPfClient.exe 2428 MsPfClient.exe 1856 MsPfClient.exe 1856 MsPfClient.exe 2032 MsPfClient.exe 2032 MsPfClient.exe 1588 MsPfClient.exe 1588 MsPfClient.exe 1224 MsPfClient.exe 1224 MsPfClient.exe 2756 MsPfClient.exe 2756 MsPfClient.exe 2960 MsPfClient.exe 2960 MsPfClient.exe 1932 MsPfClient.exe 1932 MsPfClient.exe 2664 MsPfClient.exe 2664 MsPfClient.exe 2912 MsPfClient.exe 2912 MsPfClient.exe 2064 MsPfClient.exe 2064 MsPfClient.exe -
resource yara_rule behavioral1/memory/1700-4-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1700-7-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1700-3-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1700-2-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1700-9-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1700-8-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1700-22-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2804-31-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2804-32-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2804-33-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2804-34-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2804-40-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2628-50-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2628-49-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2628-51-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2628-58-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2312-74-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1760-83-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1760-91-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1948-101-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1948-108-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2028-118-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2028-125-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2320-134-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2320-142-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/288-153-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/288-159-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/272-168-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/272-176-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2072-192-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1576-201-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1576-209-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1268-225-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2908-236-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2908-240-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2724-252-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/536-261-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/536-265-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2008-277-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1284-289-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/316-301-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2184-313-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2984-325-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2428-337-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1856-346-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1856-350-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2032-362-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1588-372-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1588-375-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1224-387-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2756-399-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2960-408-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2960-412-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1932-421-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1932-425-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2664-437-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2912-445-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2912-450-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2064-459-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2064-463-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2152-472-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2152-476-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2216-485-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2216-489-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsPfClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsPfClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsPfClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsPfClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum e189feb2abd4f0705dd9857e1ef3d011_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsPfClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsPfClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsPfClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsPfClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsPfClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 e189feb2abd4f0705dd9857e1ef3d011_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsPfClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsPfClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsPfClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsPfClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsPfClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsPfClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsPfClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsPfClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsPfClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsPfClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsPfClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsPfClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsPfClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsPfClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsPfClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsPfClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsPfClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsPfClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsPfClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsPfClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsPfClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsPfClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsPfClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsPfClient.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File created C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File opened for modification C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File created C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File created C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File opened for modification C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File created C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File opened for modification C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File opened for modification C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File opened for modification C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File created C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File created C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File opened for modification C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File created C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File opened for modification C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File created C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File created C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File created C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File opened for modification C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File opened for modification C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File opened for modification C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File created C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File opened for modification C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File opened for modification C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File created C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File created C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File opened for modification C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File created C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File opened for modification C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File opened for modification C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File opened for modification C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File created C:\Windows\SysWOW64\MsPfClient.exe e189feb2abd4f0705dd9857e1ef3d011_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File opened for modification C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File created C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File opened for modification C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File opened for modification C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File created C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File created C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File created C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File created C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File created C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File created C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File opened for modification C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File created C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File created C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File opened for modification C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File created C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File opened for modification C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File opened for modification C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File opened for modification C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File opened for modification C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File opened for modification C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File opened for modification C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File created C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File opened for modification C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File opened for modification C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File created C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File created C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File opened for modification C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File created C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File created C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File opened for modification C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe File opened for modification C:\Windows\SysWOW64\MsPfClient.exe MsPfClient.exe -
Suspicious use of SetThreadContext 41 IoCs
description pid Process procid_target PID 2548 set thread context of 1700 2548 e189feb2abd4f0705dd9857e1ef3d011_JaffaCakes118.exe 30 PID 1848 set thread context of 2804 1848 MsPfClient.exe 32 PID 3020 set thread context of 2628 3020 MsPfClient.exe 34 PID 2068 set thread context of 2312 2068 MsPfClient.exe 37 PID 2868 set thread context of 1760 2868 MsPfClient.exe 39 PID 2872 set thread context of 1948 2872 MsPfClient.exe 41 PID 2692 set thread context of 2028 2692 MsPfClient.exe 43 PID 1060 set thread context of 2320 1060 MsPfClient.exe 45 PID 2836 set thread context of 288 2836 MsPfClient.exe 47 PID 1520 set thread context of 272 1520 MsPfClient.exe 49 PID 2108 set thread context of 2072 2108 MsPfClient.exe 51 PID 2352 set thread context of 1576 2352 MsPfClient.exe 53 PID 1716 set thread context of 1268 1716 MsPfClient.exe 55 PID 2880 set thread context of 2908 2880 MsPfClient.exe 57 PID 2656 set thread context of 2724 2656 MsPfClient.exe 59 PID 548 set thread context of 536 548 MsPfClient.exe 61 PID 2664 set thread context of 2008 2664 MsPfClient.exe 63 PID 2364 set thread context of 1284 2364 MsPfClient.exe 65 PID 2916 set thread context of 316 2916 MsPfClient.exe 67 PID 1788 set thread context of 2184 1788 MsPfClient.exe 69 PID 1908 set thread context of 2984 1908 MsPfClient.exe 71 PID 2096 set thread context of 2428 2096 MsPfClient.exe 73 PID 2104 set thread context of 1856 2104 MsPfClient.exe 75 PID 2452 set thread context of 2032 2452 MsPfClient.exe 77 PID 2172 set thread context of 1588 2172 MsPfClient.exe 79 PID 2532 set thread context of 1224 2532 MsPfClient.exe 81 PID 2732 set thread context of 2756 2732 MsPfClient.exe 83 PID 2132 set thread context of 2960 2132 MsPfClient.exe 85 PID 1556 set thread context of 1932 1556 MsPfClient.exe 87 PID 2832 set thread context of 2664 2832 MsPfClient.exe 89 PID 860 set thread context of 2912 860 MsPfClient.exe 91 PID 1312 set thread context of 2064 1312 MsPfClient.exe 93 PID 1824 set thread context of 2152 1824 MsPfClient.exe 95 PID 2788 set thread context of 2216 2788 MsPfClient.exe 97 PID 1504 set thread context of 932 1504 MsPfClient.exe 99 PID 1940 set thread context of 760 1940 MsPfClient.exe 101 PID 2392 set thread context of 700 2392 MsPfClient.exe 103 PID 1044 set thread context of 2564 1044 MsPfClient.exe 105 PID 2384 set thread context of 880 2384 MsPfClient.exe 107 PID 2824 set thread context of 2404 2824 MsPfClient.exe 109 PID 2924 set thread context of 1848 2924 MsPfClient.exe 111 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e189feb2abd4f0705dd9857e1ef3d011_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e189feb2abd4f0705dd9857e1ef3d011_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsPfClient.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2548 wrote to memory of 1700 2548 e189feb2abd4f0705dd9857e1ef3d011_JaffaCakes118.exe 30 PID 2548 wrote to memory of 1700 2548 e189feb2abd4f0705dd9857e1ef3d011_JaffaCakes118.exe 30 PID 2548 wrote to memory of 1700 2548 e189feb2abd4f0705dd9857e1ef3d011_JaffaCakes118.exe 30 PID 2548 wrote to memory of 1700 2548 e189feb2abd4f0705dd9857e1ef3d011_JaffaCakes118.exe 30 PID 2548 wrote to memory of 1700 2548 e189feb2abd4f0705dd9857e1ef3d011_JaffaCakes118.exe 30 PID 2548 wrote to memory of 1700 2548 e189feb2abd4f0705dd9857e1ef3d011_JaffaCakes118.exe 30 PID 2548 wrote to memory of 1700 2548 e189feb2abd4f0705dd9857e1ef3d011_JaffaCakes118.exe 30 PID 1700 wrote to memory of 1848 1700 e189feb2abd4f0705dd9857e1ef3d011_JaffaCakes118.exe 31 PID 1700 wrote to memory of 1848 1700 e189feb2abd4f0705dd9857e1ef3d011_JaffaCakes118.exe 31 PID 1700 wrote to memory of 1848 1700 e189feb2abd4f0705dd9857e1ef3d011_JaffaCakes118.exe 31 PID 1700 wrote to memory of 1848 1700 e189feb2abd4f0705dd9857e1ef3d011_JaffaCakes118.exe 31 PID 1848 wrote to memory of 2804 1848 MsPfClient.exe 32 PID 1848 wrote to memory of 2804 1848 MsPfClient.exe 32 PID 1848 wrote to memory of 2804 1848 MsPfClient.exe 32 PID 1848 wrote to memory of 2804 1848 MsPfClient.exe 32 PID 1848 wrote to memory of 2804 1848 MsPfClient.exe 32 PID 1848 wrote to memory of 2804 1848 MsPfClient.exe 32 PID 1848 wrote to memory of 2804 1848 MsPfClient.exe 32 PID 2804 wrote to memory of 3020 2804 MsPfClient.exe 33 PID 2804 wrote to memory of 3020 2804 MsPfClient.exe 33 PID 2804 wrote to memory of 3020 2804 MsPfClient.exe 33 PID 2804 wrote to memory of 3020 2804 MsPfClient.exe 33 PID 3020 wrote to memory of 2628 3020 MsPfClient.exe 34 PID 3020 wrote to memory of 2628 3020 MsPfClient.exe 34 PID 3020 wrote to memory of 2628 3020 MsPfClient.exe 34 PID 3020 wrote to memory of 2628 3020 MsPfClient.exe 34 PID 3020 wrote to memory of 2628 3020 MsPfClient.exe 34 PID 3020 wrote to memory of 2628 3020 MsPfClient.exe 34 PID 3020 wrote to memory of 2628 3020 MsPfClient.exe 34 PID 2628 wrote to memory of 2068 2628 MsPfClient.exe 36 PID 2628 wrote to memory of 2068 2628 MsPfClient.exe 36 PID 2628 wrote to memory of 2068 2628 MsPfClient.exe 36 PID 2628 wrote to memory of 2068 2628 MsPfClient.exe 36 PID 2068 wrote to memory of 2312 2068 MsPfClient.exe 37 PID 2068 wrote to memory of 2312 2068 MsPfClient.exe 37 PID 2068 wrote to memory of 2312 2068 MsPfClient.exe 37 PID 2068 wrote to memory of 2312 2068 MsPfClient.exe 37 PID 2068 wrote to memory of 2312 2068 MsPfClient.exe 37 PID 2068 wrote to memory of 2312 2068 MsPfClient.exe 37 PID 2068 wrote to memory of 2312 2068 MsPfClient.exe 37 PID 2312 wrote to memory of 2868 2312 MsPfClient.exe 38 PID 2312 wrote to memory of 2868 2312 MsPfClient.exe 38 PID 2312 wrote to memory of 2868 2312 MsPfClient.exe 38 PID 2312 wrote to memory of 2868 2312 MsPfClient.exe 38 PID 2868 wrote to memory of 1760 2868 MsPfClient.exe 39 PID 2868 wrote to memory of 1760 2868 MsPfClient.exe 39 PID 2868 wrote to memory of 1760 2868 MsPfClient.exe 39 PID 2868 wrote to memory of 1760 2868 MsPfClient.exe 39 PID 2868 wrote to memory of 1760 2868 MsPfClient.exe 39 PID 2868 wrote to memory of 1760 2868 MsPfClient.exe 39 PID 2868 wrote to memory of 1760 2868 MsPfClient.exe 39 PID 1760 wrote to memory of 2872 1760 MsPfClient.exe 40 PID 1760 wrote to memory of 2872 1760 MsPfClient.exe 40 PID 1760 wrote to memory of 2872 1760 MsPfClient.exe 40 PID 1760 wrote to memory of 2872 1760 MsPfClient.exe 40 PID 2872 wrote to memory of 1948 2872 MsPfClient.exe 41 PID 2872 wrote to memory of 1948 2872 MsPfClient.exe 41 PID 2872 wrote to memory of 1948 2872 MsPfClient.exe 41 PID 2872 wrote to memory of 1948 2872 MsPfClient.exe 41 PID 2872 wrote to memory of 1948 2872 MsPfClient.exe 41 PID 2872 wrote to memory of 1948 2872 MsPfClient.exe 41 PID 2872 wrote to memory of 1948 2872 MsPfClient.exe 41 PID 1948 wrote to memory of 2692 1948 MsPfClient.exe 42 PID 1948 wrote to memory of 2692 1948 MsPfClient.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\e189feb2abd4f0705dd9857e1ef3d011_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e189feb2abd4f0705dd9857e1ef3d011_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\e189feb2abd4f0705dd9857e1ef3d011_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e189feb2abd4f0705dd9857e1ef3d011_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\system32\MsPfClient.exe" C:\Users\Admin\AppData\Local\Temp\E189FE~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\SysWOW64\MsPfClient.exe" C:\Users\Admin\AppData\Local\Temp\E189FE~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\system32\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\SysWOW64\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\system32\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\SysWOW64\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\system32\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\SysWOW64\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\system32\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\SysWOW64\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\system32\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2692 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\SysWOW64\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
PID:2028 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\system32\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1060 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\SysWOW64\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2320 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\system32\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2836 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\SysWOW64\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
PID:288 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\system32\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1520 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\SysWOW64\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:272 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\system32\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2108 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\SysWOW64\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2072 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\system32\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2352 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\SysWOW64\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1576 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\system32\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1716 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\SysWOW64\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1268 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\system32\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2880 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\SysWOW64\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2908 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\system32\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2656 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\SysWOW64\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
PID:2724 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\system32\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:548 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\SysWOW64\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:536 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\system32\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2664 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\SysWOW64\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE34⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2008 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\system32\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2364 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\SysWOW64\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE36⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1284 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\system32\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2916 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\SysWOW64\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE38⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:316 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\system32\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1788 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\SysWOW64\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE40⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2184 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\system32\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1908 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\SysWOW64\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE42⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2984 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\system32\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2096 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\SysWOW64\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE44⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2428 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\system32\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2104 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\SysWOW64\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE46⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1856 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\system32\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2452 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\SysWOW64\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE48⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2032 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\system32\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2172 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\SysWOW64\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE50⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1588 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\system32\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2532 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\SysWOW64\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE52⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
PID:1224 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\system32\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2732 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\SysWOW64\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE54⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2756 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\system32\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2132 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\SysWOW64\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE56⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2960 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\system32\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1556 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\SysWOW64\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE58⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1932 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\system32\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2832 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\SysWOW64\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE60⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2664 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\system32\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:860 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\SysWOW64\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE62⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2912 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\system32\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1312 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\SysWOW64\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE64⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2064 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\system32\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1824 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\SysWOW64\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE66⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
PID:2152 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\system32\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE67⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2788 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\SysWOW64\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE68⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2216 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\system32\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE69⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1504 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\SysWOW64\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE70⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:932 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\system32\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE71⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1940 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\SysWOW64\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE72⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:760 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\system32\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE73⤵
- Suspicious use of SetThreadContext
PID:2392 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\SysWOW64\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE74⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:700 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\system32\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE75⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1044 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\SysWOW64\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE76⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2564 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\system32\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE77⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2384 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\SysWOW64\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE78⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:880 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\system32\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE79⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2824 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\SysWOW64\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE80⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2404 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\system32\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE81⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2924 -
C:\Windows\SysWOW64\MsPfClient.exe"C:\Windows\SysWOW64\MsPfClient.exe" C:\Windows\SysWOW64\MSPFCL~1.EXE82⤵
- Maps connected drives based on registry
PID:1848
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
173KB
MD5e189feb2abd4f0705dd9857e1ef3d011
SHA10bf9cdf7d76ff16330aeb500635ec6dc6c2b9fee
SHA256905d3ef8ccef644ebb75dfd2c6581e60f160f45c48690a6fd44e2a59529e9c36
SHA512de82b6baf6fcd7708919d8f34078ae9e553be9b79cdef11e3cf060a8c727e0571be6a6be4d531db94908684e46b7396c5f773e6b95cf157fed4f6328410de642