Analysis
-
max time kernel
150s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 03:18
Static task
static1
Behavioral task
behavioral1
Sample
e19a22e76089eb77565c7fd8f685b88b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e19a22e76089eb77565c7fd8f685b88b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e19a22e76089eb77565c7fd8f685b88b_JaffaCakes118.exe
-
Size
142KB
-
MD5
e19a22e76089eb77565c7fd8f685b88b
-
SHA1
ae012a2b0a19aa837a841e1f63beb99024c8999a
-
SHA256
6219e4ec2189499c1ea6307e2578ea3d64a62550bc7206dd8d2ce507f5e2f556
-
SHA512
2bb642c3a0a47df8eab47d09530347ccd9e9a97864cff0bee5c09da6bf1d56ffe2d41f718443c28e12592784ab36367b9994bb97fff2f5911a6041076e8a7d51
-
SSDEEP
3072:evEZzUAal8HNu2dY5g5E+K4DBKwAsVMvMjWdpB6D2HgYDm:eCzBHN3b5EsdKdPvpBXu
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings 2 TTPs 16 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation e19a22e76089eb77565c7fd8f685b88b_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wmpdtk32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wmpdtk32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wmpdtk32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wmpdtk32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wmpdtk32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wmpdtk32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wmpdtk32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wmpdtk32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wmpdtk32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wmpdtk32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wmpdtk32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wmpdtk32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wmpdtk32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wmpdtk32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wmpdtk32.exe -
Deletes itself 1 IoCs
pid Process 1188 wmpdtk32.exe -
Executes dropped EXE 32 IoCs
pid Process 1028 wmpdtk32.exe 1188 wmpdtk32.exe 4904 wmpdtk32.exe 4636 wmpdtk32.exe 3644 wmpdtk32.exe 1612 wmpdtk32.exe 4972 wmpdtk32.exe 1048 wmpdtk32.exe 4308 wmpdtk32.exe 4284 wmpdtk32.exe 3148 wmpdtk32.exe 2492 wmpdtk32.exe 220 wmpdtk32.exe 2376 wmpdtk32.exe 944 wmpdtk32.exe 4340 wmpdtk32.exe 3552 wmpdtk32.exe 4432 wmpdtk32.exe 2912 wmpdtk32.exe 3696 wmpdtk32.exe 3144 wmpdtk32.exe 2500 wmpdtk32.exe 2080 wmpdtk32.exe 4800 wmpdtk32.exe 5036 wmpdtk32.exe 876 wmpdtk32.exe 4424 wmpdtk32.exe 764 wmpdtk32.exe 3924 wmpdtk32.exe 2548 wmpdtk32.exe 3704 wmpdtk32.exe 1900 wmpdtk32.exe -
resource yara_rule behavioral2/memory/2704-0-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/2704-2-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/2704-3-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/2704-4-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/2704-31-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1188-43-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/2704-47-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1188-48-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1188-55-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4636-60-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4636-65-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1612-70-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1612-73-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1048-76-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4284-81-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4284-80-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4284-85-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/2492-93-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/2492-96-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/2376-103-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4340-106-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4340-110-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4340-114-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4432-119-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4432-122-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/3696-128-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/3696-131-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/2500-136-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/2500-140-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4800-145-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4800-150-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/876-154-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/876-159-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/764-163-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/764-168-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/2548-172-0x0000000000400000-0x000000000045A000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 32 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 e19a22e76089eb77565c7fd8f685b88b_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum e19a22e76089eb77565c7fd8f685b88b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtk32.exe -
Drops file in System32 directory 48 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ e19a22e76089eb77565c7fd8f685b88b_JaffaCakes118.exe File created C:\Windows\SysWOW64\wmpdtk32.exe e19a22e76089eb77565c7fd8f685b88b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe e19a22e76089eb77565c7fd8f685b88b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe -
Suspicious use of SetThreadContext 17 IoCs
description pid Process procid_target PID 4676 set thread context of 2704 4676 e19a22e76089eb77565c7fd8f685b88b_JaffaCakes118.exe 85 PID 1028 set thread context of 1188 1028 wmpdtk32.exe 96 PID 4904 set thread context of 4636 4904 wmpdtk32.exe 98 PID 3644 set thread context of 1612 3644 wmpdtk32.exe 100 PID 4972 set thread context of 1048 4972 wmpdtk32.exe 104 PID 4308 set thread context of 4284 4308 wmpdtk32.exe 106 PID 3148 set thread context of 2492 3148 wmpdtk32.exe 108 PID 220 set thread context of 2376 220 wmpdtk32.exe 110 PID 944 set thread context of 4340 944 wmpdtk32.exe 112 PID 3552 set thread context of 4432 3552 wmpdtk32.exe 114 PID 2912 set thread context of 3696 2912 wmpdtk32.exe 116 PID 3144 set thread context of 2500 3144 wmpdtk32.exe 118 PID 2080 set thread context of 4800 2080 wmpdtk32.exe 120 PID 5036 set thread context of 876 5036 wmpdtk32.exe 122 PID 4424 set thread context of 764 4424 wmpdtk32.exe 124 PID 3924 set thread context of 2548 3924 wmpdtk32.exe 126 PID 3704 set thread context of 1900 3704 wmpdtk32.exe 128 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 33 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e19a22e76089eb77565c7fd8f685b88b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e19a22e76089eb77565c7fd8f685b88b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe -
Modifies registry class 16 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ e19a22e76089eb77565c7fd8f685b88b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtk32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2704 e19a22e76089eb77565c7fd8f685b88b_JaffaCakes118.exe 2704 e19a22e76089eb77565c7fd8f685b88b_JaffaCakes118.exe 2704 e19a22e76089eb77565c7fd8f685b88b_JaffaCakes118.exe 2704 e19a22e76089eb77565c7fd8f685b88b_JaffaCakes118.exe 1188 wmpdtk32.exe 1188 wmpdtk32.exe 1188 wmpdtk32.exe 1188 wmpdtk32.exe 4636 wmpdtk32.exe 4636 wmpdtk32.exe 4636 wmpdtk32.exe 4636 wmpdtk32.exe 1612 wmpdtk32.exe 1612 wmpdtk32.exe 1612 wmpdtk32.exe 1612 wmpdtk32.exe 1048 wmpdtk32.exe 1048 wmpdtk32.exe 1048 wmpdtk32.exe 1048 wmpdtk32.exe 4284 wmpdtk32.exe 4284 wmpdtk32.exe 4284 wmpdtk32.exe 4284 wmpdtk32.exe 2492 wmpdtk32.exe 2492 wmpdtk32.exe 2492 wmpdtk32.exe 2492 wmpdtk32.exe 2376 wmpdtk32.exe 2376 wmpdtk32.exe 2376 wmpdtk32.exe 2376 wmpdtk32.exe 4340 wmpdtk32.exe 4340 wmpdtk32.exe 4340 wmpdtk32.exe 4340 wmpdtk32.exe 4432 wmpdtk32.exe 4432 wmpdtk32.exe 4432 wmpdtk32.exe 4432 wmpdtk32.exe 3696 wmpdtk32.exe 3696 wmpdtk32.exe 3696 wmpdtk32.exe 3696 wmpdtk32.exe 2500 wmpdtk32.exe 2500 wmpdtk32.exe 2500 wmpdtk32.exe 2500 wmpdtk32.exe 4800 wmpdtk32.exe 4800 wmpdtk32.exe 4800 wmpdtk32.exe 4800 wmpdtk32.exe 876 wmpdtk32.exe 876 wmpdtk32.exe 876 wmpdtk32.exe 876 wmpdtk32.exe 764 wmpdtk32.exe 764 wmpdtk32.exe 764 wmpdtk32.exe 764 wmpdtk32.exe 2548 wmpdtk32.exe 2548 wmpdtk32.exe 2548 wmpdtk32.exe 2548 wmpdtk32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4676 wrote to memory of 2704 4676 e19a22e76089eb77565c7fd8f685b88b_JaffaCakes118.exe 85 PID 4676 wrote to memory of 2704 4676 e19a22e76089eb77565c7fd8f685b88b_JaffaCakes118.exe 85 PID 4676 wrote to memory of 2704 4676 e19a22e76089eb77565c7fd8f685b88b_JaffaCakes118.exe 85 PID 4676 wrote to memory of 2704 4676 e19a22e76089eb77565c7fd8f685b88b_JaffaCakes118.exe 85 PID 4676 wrote to memory of 2704 4676 e19a22e76089eb77565c7fd8f685b88b_JaffaCakes118.exe 85 PID 4676 wrote to memory of 2704 4676 e19a22e76089eb77565c7fd8f685b88b_JaffaCakes118.exe 85 PID 4676 wrote to memory of 2704 4676 e19a22e76089eb77565c7fd8f685b88b_JaffaCakes118.exe 85 PID 2704 wrote to memory of 1028 2704 e19a22e76089eb77565c7fd8f685b88b_JaffaCakes118.exe 95 PID 2704 wrote to memory of 1028 2704 e19a22e76089eb77565c7fd8f685b88b_JaffaCakes118.exe 95 PID 2704 wrote to memory of 1028 2704 e19a22e76089eb77565c7fd8f685b88b_JaffaCakes118.exe 95 PID 1028 wrote to memory of 1188 1028 wmpdtk32.exe 96 PID 1028 wrote to memory of 1188 1028 wmpdtk32.exe 96 PID 1028 wrote to memory of 1188 1028 wmpdtk32.exe 96 PID 1028 wrote to memory of 1188 1028 wmpdtk32.exe 96 PID 1028 wrote to memory of 1188 1028 wmpdtk32.exe 96 PID 1028 wrote to memory of 1188 1028 wmpdtk32.exe 96 PID 1028 wrote to memory of 1188 1028 wmpdtk32.exe 96 PID 1188 wrote to memory of 4904 1188 wmpdtk32.exe 97 PID 1188 wrote to memory of 4904 1188 wmpdtk32.exe 97 PID 1188 wrote to memory of 4904 1188 wmpdtk32.exe 97 PID 4904 wrote to memory of 4636 4904 wmpdtk32.exe 98 PID 4904 wrote to memory of 4636 4904 wmpdtk32.exe 98 PID 4904 wrote to memory of 4636 4904 wmpdtk32.exe 98 PID 4904 wrote to memory of 4636 4904 wmpdtk32.exe 98 PID 4904 wrote to memory of 4636 4904 wmpdtk32.exe 98 PID 4904 wrote to memory of 4636 4904 wmpdtk32.exe 98 PID 4904 wrote to memory of 4636 4904 wmpdtk32.exe 98 PID 4636 wrote to memory of 3644 4636 wmpdtk32.exe 99 PID 4636 wrote to memory of 3644 4636 wmpdtk32.exe 99 PID 4636 wrote to memory of 3644 4636 wmpdtk32.exe 99 PID 3644 wrote to memory of 1612 3644 wmpdtk32.exe 100 PID 3644 wrote to memory of 1612 3644 wmpdtk32.exe 100 PID 3644 wrote to memory of 1612 3644 wmpdtk32.exe 100 PID 3644 wrote to memory of 1612 3644 wmpdtk32.exe 100 PID 3644 wrote to memory of 1612 3644 wmpdtk32.exe 100 PID 3644 wrote to memory of 1612 3644 wmpdtk32.exe 100 PID 3644 wrote to memory of 1612 3644 wmpdtk32.exe 100 PID 1612 wrote to memory of 4972 1612 wmpdtk32.exe 103 PID 1612 wrote to memory of 4972 1612 wmpdtk32.exe 103 PID 1612 wrote to memory of 4972 1612 wmpdtk32.exe 103 PID 4972 wrote to memory of 1048 4972 wmpdtk32.exe 104 PID 4972 wrote to memory of 1048 4972 wmpdtk32.exe 104 PID 4972 wrote to memory of 1048 4972 wmpdtk32.exe 104 PID 4972 wrote to memory of 1048 4972 wmpdtk32.exe 104 PID 4972 wrote to memory of 1048 4972 wmpdtk32.exe 104 PID 4972 wrote to memory of 1048 4972 wmpdtk32.exe 104 PID 4972 wrote to memory of 1048 4972 wmpdtk32.exe 104 PID 1048 wrote to memory of 4308 1048 wmpdtk32.exe 105 PID 1048 wrote to memory of 4308 1048 wmpdtk32.exe 105 PID 1048 wrote to memory of 4308 1048 wmpdtk32.exe 105 PID 4308 wrote to memory of 4284 4308 wmpdtk32.exe 106 PID 4308 wrote to memory of 4284 4308 wmpdtk32.exe 106 PID 4308 wrote to memory of 4284 4308 wmpdtk32.exe 106 PID 4308 wrote to memory of 4284 4308 wmpdtk32.exe 106 PID 4308 wrote to memory of 4284 4308 wmpdtk32.exe 106 PID 4308 wrote to memory of 4284 4308 wmpdtk32.exe 106 PID 4308 wrote to memory of 4284 4308 wmpdtk32.exe 106 PID 4284 wrote to memory of 3148 4284 wmpdtk32.exe 107 PID 4284 wrote to memory of 3148 4284 wmpdtk32.exe 107 PID 4284 wrote to memory of 3148 4284 wmpdtk32.exe 107 PID 3148 wrote to memory of 2492 3148 wmpdtk32.exe 108 PID 3148 wrote to memory of 2492 3148 wmpdtk32.exe 108 PID 3148 wrote to memory of 2492 3148 wmpdtk32.exe 108 PID 3148 wrote to memory of 2492 3148 wmpdtk32.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\e19a22e76089eb77565c7fd8f685b88b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e19a22e76089eb77565c7fd8f685b88b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\e19a22e76089eb77565c7fd8f685b88b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e19a22e76089eb77565c7fd8f685b88b_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Users\Admin\AppData\Local\Temp\E19A22~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Users\Admin\AppData\Local\Temp\E19A22~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2492 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:220 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2376 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:944 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4340 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3552 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4432 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2912 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3696 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3144 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2500 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2080 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4800 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5036 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:876 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4424 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:764 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3924 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe32⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2548 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3704 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe34⤵
- Executes dropped EXE
PID:1900
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
142KB
MD5e19a22e76089eb77565c7fd8f685b88b
SHA1ae012a2b0a19aa837a841e1f63beb99024c8999a
SHA2566219e4ec2189499c1ea6307e2578ea3d64a62550bc7206dd8d2ce507f5e2f556
SHA5122bb642c3a0a47df8eab47d09530347ccd9e9a97864cff0bee5c09da6bf1d56ffe2d41f718443c28e12592784ab36367b9994bb97fff2f5911a6041076e8a7d51