Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 23:46
Static task
static1
Behavioral task
behavioral1
Sample
eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe
-
Size
202KB
-
MD5
eeaba3069fe6a11457a9094bdcaced6f
-
SHA1
20a9c5191d7548f190ef17eb063f8274d669bfa5
-
SHA256
424cf87edbb3b884ac5b7723730563e9bb9b2823de729b59510e34b78f27854e
-
SHA512
f5efc8e993bf701fc710db97c433bccf133eee0c80b01297cc4f1c5b8d86c953be4fe6a207c92be036222c980115bbb2d098227a38a344c7483d91be25dd145a
-
SSDEEP
3072:t7PlB5s1PPDZlzxBr7o2vOSl1UeCO1vTwP+E4nKiG1TrV6TwICqjz:BK1PrZlzxJ7PlrB1rfOrYwG
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2652 wmipsdsc.exe -
Executes dropped EXE 49 IoCs
pid Process 2776 wmipsdsc.exe 2652 wmipsdsc.exe 2496 wmipsdsc.exe 2128 wmipsdsc.exe 392 wmipsdsc.exe 2828 wmipsdsc.exe 1980 wmipsdsc.exe 1704 wmipsdsc.exe 1996 wmipsdsc.exe 2740 wmipsdsc.exe 2380 wmipsdsc.exe 2472 wmipsdsc.exe 2396 wmipsdsc.exe 2192 wmipsdsc.exe 1636 wmipsdsc.exe 824 wmipsdsc.exe 2272 wmipsdsc.exe 1788 wmipsdsc.exe 3012 wmipsdsc.exe 2780 wmipsdsc.exe 2860 wmipsdsc.exe 2508 wmipsdsc.exe 1640 wmipsdsc.exe 520 wmipsdsc.exe 2848 wmipsdsc.exe 2724 wmipsdsc.exe 1796 wmipsdsc.exe 1952 wmipsdsc.exe 1924 wmipsdsc.exe 1916 wmipsdsc.exe 1632 wmipsdsc.exe 1748 wmipsdsc.exe 1328 wmipsdsc.exe 2092 wmipsdsc.exe 1148 wmipsdsc.exe 2268 wmipsdsc.exe 2464 wmipsdsc.exe 1720 wmipsdsc.exe 3056 wmipsdsc.exe 2620 wmipsdsc.exe 2008 wmipsdsc.exe 2704 wmipsdsc.exe 2524 wmipsdsc.exe 3040 wmipsdsc.exe 1052 wmipsdsc.exe 1488 wmipsdsc.exe 2700 wmipsdsc.exe 324 wmipsdsc.exe 1968 wmipsdsc.exe -
Loads dropped DLL 50 IoCs
pid Process 2236 eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe 2236 eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe 2652 wmipsdsc.exe 2652 wmipsdsc.exe 2128 wmipsdsc.exe 2128 wmipsdsc.exe 2828 wmipsdsc.exe 2828 wmipsdsc.exe 1704 wmipsdsc.exe 1704 wmipsdsc.exe 2740 wmipsdsc.exe 2740 wmipsdsc.exe 2472 wmipsdsc.exe 2472 wmipsdsc.exe 2192 wmipsdsc.exe 2192 wmipsdsc.exe 824 wmipsdsc.exe 824 wmipsdsc.exe 1788 wmipsdsc.exe 1788 wmipsdsc.exe 2780 wmipsdsc.exe 2780 wmipsdsc.exe 2508 wmipsdsc.exe 2508 wmipsdsc.exe 520 wmipsdsc.exe 520 wmipsdsc.exe 2724 wmipsdsc.exe 2724 wmipsdsc.exe 1952 wmipsdsc.exe 1952 wmipsdsc.exe 1916 wmipsdsc.exe 1916 wmipsdsc.exe 1748 wmipsdsc.exe 1748 wmipsdsc.exe 2092 wmipsdsc.exe 2092 wmipsdsc.exe 2268 wmipsdsc.exe 2268 wmipsdsc.exe 1720 wmipsdsc.exe 1720 wmipsdsc.exe 2620 wmipsdsc.exe 2620 wmipsdsc.exe 2704 wmipsdsc.exe 2704 wmipsdsc.exe 3040 wmipsdsc.exe 3040 wmipsdsc.exe 1488 wmipsdsc.exe 1488 wmipsdsc.exe 324 wmipsdsc.exe 324 wmipsdsc.exe -
resource yara_rule behavioral1/memory/2236-12-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2236-11-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2236-10-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2236-9-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2236-6-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2236-5-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2236-4-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2236-26-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2652-36-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2652-39-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2652-37-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2652-38-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2652-47-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2128-59-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2128-67-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2128-64-0x0000000003260000-0x0000000003272000-memory.dmp upx behavioral1/memory/2828-78-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2828-79-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2828-80-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2828-89-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1704-101-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1704-109-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2740-122-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2740-129-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2472-141-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2472-148-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2192-161-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2192-169-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/824-182-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/824-191-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1788-204-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1788-211-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2780-224-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2780-233-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2508-245-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2508-253-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/520-265-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/520-272-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2724-285-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2724-294-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1952-306-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1952-311-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1916-321-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1916-327-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1916-323-0x0000000003230000-0x0000000003242000-memory.dmp upx behavioral1/memory/1748-338-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1748-344-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2092-356-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2092-361-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2268-372-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 50 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe -
Drops file in System32 directory 50 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe -
Suspicious use of SetThreadContext 25 IoCs
description pid Process procid_target PID 800 set thread context of 2236 800 eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe 28 PID 2776 set thread context of 2652 2776 wmipsdsc.exe 30 PID 2496 set thread context of 2128 2496 wmipsdsc.exe 32 PID 392 set thread context of 2828 392 wmipsdsc.exe 34 PID 1980 set thread context of 1704 1980 wmipsdsc.exe 36 PID 1996 set thread context of 2740 1996 wmipsdsc.exe 38 PID 2380 set thread context of 2472 2380 wmipsdsc.exe 42 PID 2396 set thread context of 2192 2396 wmipsdsc.exe 44 PID 1636 set thread context of 824 1636 wmipsdsc.exe 46 PID 2272 set thread context of 1788 2272 wmipsdsc.exe 48 PID 3012 set thread context of 2780 3012 wmipsdsc.exe 50 PID 2860 set thread context of 2508 2860 wmipsdsc.exe 52 PID 1640 set thread context of 520 1640 wmipsdsc.exe 54 PID 2848 set thread context of 2724 2848 wmipsdsc.exe 56 PID 1796 set thread context of 1952 1796 wmipsdsc.exe 58 PID 1924 set thread context of 1916 1924 wmipsdsc.exe 60 PID 1632 set thread context of 1748 1632 wmipsdsc.exe 62 PID 1328 set thread context of 2092 1328 wmipsdsc.exe 64 PID 1148 set thread context of 2268 1148 wmipsdsc.exe 66 PID 2464 set thread context of 1720 2464 wmipsdsc.exe 68 PID 3056 set thread context of 2620 3056 wmipsdsc.exe 70 PID 2008 set thread context of 2704 2008 wmipsdsc.exe 72 PID 2524 set thread context of 3040 2524 wmipsdsc.exe 74 PID 1052 set thread context of 1488 1052 wmipsdsc.exe 76 PID 2700 set thread context of 324 2700 wmipsdsc.exe 78 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 50 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2236 eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe 2652 wmipsdsc.exe 2128 wmipsdsc.exe 2828 wmipsdsc.exe 1704 wmipsdsc.exe 2740 wmipsdsc.exe 2472 wmipsdsc.exe 2192 wmipsdsc.exe 824 wmipsdsc.exe 1788 wmipsdsc.exe 2780 wmipsdsc.exe 2508 wmipsdsc.exe 520 wmipsdsc.exe 2724 wmipsdsc.exe 1952 wmipsdsc.exe 1916 wmipsdsc.exe 1748 wmipsdsc.exe 2092 wmipsdsc.exe 2268 wmipsdsc.exe 1720 wmipsdsc.exe 2620 wmipsdsc.exe 2704 wmipsdsc.exe 3040 wmipsdsc.exe 1488 wmipsdsc.exe 324 wmipsdsc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 800 wrote to memory of 2236 800 eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe 28 PID 800 wrote to memory of 2236 800 eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe 28 PID 800 wrote to memory of 2236 800 eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe 28 PID 800 wrote to memory of 2236 800 eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe 28 PID 800 wrote to memory of 2236 800 eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe 28 PID 800 wrote to memory of 2236 800 eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe 28 PID 800 wrote to memory of 2236 800 eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe 28 PID 2236 wrote to memory of 2776 2236 eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe 29 PID 2236 wrote to memory of 2776 2236 eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe 29 PID 2236 wrote to memory of 2776 2236 eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe 29 PID 2236 wrote to memory of 2776 2236 eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe 29 PID 2776 wrote to memory of 2652 2776 wmipsdsc.exe 30 PID 2776 wrote to memory of 2652 2776 wmipsdsc.exe 30 PID 2776 wrote to memory of 2652 2776 wmipsdsc.exe 30 PID 2776 wrote to memory of 2652 2776 wmipsdsc.exe 30 PID 2776 wrote to memory of 2652 2776 wmipsdsc.exe 30 PID 2776 wrote to memory of 2652 2776 wmipsdsc.exe 30 PID 2776 wrote to memory of 2652 2776 wmipsdsc.exe 30 PID 2652 wrote to memory of 2496 2652 wmipsdsc.exe 31 PID 2652 wrote to memory of 2496 2652 wmipsdsc.exe 31 PID 2652 wrote to memory of 2496 2652 wmipsdsc.exe 31 PID 2652 wrote to memory of 2496 2652 wmipsdsc.exe 31 PID 2496 wrote to memory of 2128 2496 wmipsdsc.exe 32 PID 2496 wrote to memory of 2128 2496 wmipsdsc.exe 32 PID 2496 wrote to memory of 2128 2496 wmipsdsc.exe 32 PID 2496 wrote to memory of 2128 2496 wmipsdsc.exe 32 PID 2496 wrote to memory of 2128 2496 wmipsdsc.exe 32 PID 2496 wrote to memory of 2128 2496 wmipsdsc.exe 32 PID 2496 wrote to memory of 2128 2496 wmipsdsc.exe 32 PID 2128 wrote to memory of 392 2128 wmipsdsc.exe 33 PID 2128 wrote to memory of 392 2128 wmipsdsc.exe 33 PID 2128 wrote to memory of 392 2128 wmipsdsc.exe 33 PID 2128 wrote to memory of 392 2128 wmipsdsc.exe 33 PID 392 wrote to memory of 2828 392 wmipsdsc.exe 34 PID 392 wrote to memory of 2828 392 wmipsdsc.exe 34 PID 392 wrote to memory of 2828 392 wmipsdsc.exe 34 PID 392 wrote to memory of 2828 392 wmipsdsc.exe 34 PID 392 wrote to memory of 2828 392 wmipsdsc.exe 34 PID 392 wrote to memory of 2828 392 wmipsdsc.exe 34 PID 392 wrote to memory of 2828 392 wmipsdsc.exe 34 PID 2828 wrote to memory of 1980 2828 wmipsdsc.exe 35 PID 2828 wrote to memory of 1980 2828 wmipsdsc.exe 35 PID 2828 wrote to memory of 1980 2828 wmipsdsc.exe 35 PID 2828 wrote to memory of 1980 2828 wmipsdsc.exe 35 PID 1980 wrote to memory of 1704 1980 wmipsdsc.exe 36 PID 1980 wrote to memory of 1704 1980 wmipsdsc.exe 36 PID 1980 wrote to memory of 1704 1980 wmipsdsc.exe 36 PID 1980 wrote to memory of 1704 1980 wmipsdsc.exe 36 PID 1980 wrote to memory of 1704 1980 wmipsdsc.exe 36 PID 1980 wrote to memory of 1704 1980 wmipsdsc.exe 36 PID 1980 wrote to memory of 1704 1980 wmipsdsc.exe 36 PID 1704 wrote to memory of 1996 1704 wmipsdsc.exe 37 PID 1704 wrote to memory of 1996 1704 wmipsdsc.exe 37 PID 1704 wrote to memory of 1996 1704 wmipsdsc.exe 37 PID 1704 wrote to memory of 1996 1704 wmipsdsc.exe 37 PID 1996 wrote to memory of 2740 1996 wmipsdsc.exe 38 PID 1996 wrote to memory of 2740 1996 wmipsdsc.exe 38 PID 1996 wrote to memory of 2740 1996 wmipsdsc.exe 38 PID 1996 wrote to memory of 2740 1996 wmipsdsc.exe 38 PID 1996 wrote to memory of 2740 1996 wmipsdsc.exe 38 PID 1996 wrote to memory of 2740 1996 wmipsdsc.exe 38 PID 1996 wrote to memory of 2740 1996 wmipsdsc.exe 38 PID 2740 wrote to memory of 2380 2740 wmipsdsc.exe 41 PID 2740 wrote to memory of 2380 2740 wmipsdsc.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Users\Admin\AppData\Local\Temp\eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Users\Admin\AppData\Local\Temp\EEABA3~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Users\Admin\AppData\Local\Temp\EEABA3~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2380 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2472 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2396 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2192 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1636 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:824 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2272 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1788 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3012 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2780 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2860 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2508 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1640 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:520 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2848 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2724 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1796 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1952 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1924 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1916 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1632 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe34⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1748 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1328 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe36⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2092 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1148 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe38⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2268 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2464 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe40⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1720 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3056 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe42⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2620 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2008 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe44⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2704 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2524 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe46⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3040 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1052 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe48⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1488 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2700 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe50⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:324 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe51⤵
- Executes dropped EXE
PID:1968
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202KB
MD5eeaba3069fe6a11457a9094bdcaced6f
SHA120a9c5191d7548f190ef17eb063f8274d669bfa5
SHA256424cf87edbb3b884ac5b7723730563e9bb9b2823de729b59510e34b78f27854e
SHA512f5efc8e993bf701fc710db97c433bccf133eee0c80b01297cc4f1c5b8d86c953be4fe6a207c92be036222c980115bbb2d098227a38a344c7483d91be25dd145a