Analysis
-
max time kernel
149s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 23:46
Static task
static1
Behavioral task
behavioral1
Sample
eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe
-
Size
202KB
-
MD5
eeaba3069fe6a11457a9094bdcaced6f
-
SHA1
20a9c5191d7548f190ef17eb063f8274d669bfa5
-
SHA256
424cf87edbb3b884ac5b7723730563e9bb9b2823de729b59510e34b78f27854e
-
SHA512
f5efc8e993bf701fc710db97c433bccf133eee0c80b01297cc4f1c5b8d86c953be4fe6a207c92be036222c980115bbb2d098227a38a344c7483d91be25dd145a
-
SSDEEP
3072:t7PlB5s1PPDZlzxBr7o2vOSl1UeCO1vTwP+E4nKiG1TrV6TwICqjz:BK1PrZlzxJ7PlrB1rfOrYwG
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings 2 TTPs 23 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation wmipsdsc.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation wmipsdsc.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation wmipsdsc.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation wmipsdsc.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation wmipsdsc.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation wmipsdsc.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation wmipsdsc.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation wmipsdsc.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation wmipsdsc.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation wmipsdsc.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation wmipsdsc.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation wmipsdsc.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation wmipsdsc.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation wmipsdsc.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation wmipsdsc.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation wmipsdsc.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation wmipsdsc.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation wmipsdsc.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation wmipsdsc.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation wmipsdsc.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation wmipsdsc.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation wmipsdsc.exe -
Deletes itself 1 IoCs
pid Process 3988 wmipsdsc.exe -
Executes dropped EXE 45 IoCs
pid Process 5060 wmipsdsc.exe 3988 wmipsdsc.exe 4164 wmipsdsc.exe 2904 wmipsdsc.exe 1408 wmipsdsc.exe 3712 wmipsdsc.exe 4996 wmipsdsc.exe 3412 wmipsdsc.exe 2980 wmipsdsc.exe 2152 wmipsdsc.exe 5096 wmipsdsc.exe 5064 wmipsdsc.exe 3644 wmipsdsc.exe 1764 wmipsdsc.exe 3120 wmipsdsc.exe 4384 wmipsdsc.exe 976 wmipsdsc.exe 2728 wmipsdsc.exe 4080 wmipsdsc.exe 1500 wmipsdsc.exe 3832 wmipsdsc.exe 5044 wmipsdsc.exe 3548 wmipsdsc.exe 4020 wmipsdsc.exe 1580 wmipsdsc.exe 4100 wmipsdsc.exe 4964 wmipsdsc.exe 4204 wmipsdsc.exe 4368 wmipsdsc.exe 4728 wmipsdsc.exe 4564 wmipsdsc.exe 2628 wmipsdsc.exe 2124 wmipsdsc.exe 4680 wmipsdsc.exe 1552 wmipsdsc.exe 4268 wmipsdsc.exe 232 wmipsdsc.exe 4060 wmipsdsc.exe 1332 wmipsdsc.exe 3476 wmipsdsc.exe 5092 wmipsdsc.exe 2804 wmipsdsc.exe 1428 wmipsdsc.exe 388 wmipsdsc.exe 1008 wmipsdsc.exe -
resource yara_rule behavioral2/memory/2572-1-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/2572-4-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/2572-5-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/2572-6-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/2572-42-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/3988-46-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/3988-48-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/3988-49-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/3988-50-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/2904-60-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/3712-69-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/3412-78-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/2152-88-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/5064-97-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/1764-105-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/4384-111-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/4384-112-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/4384-113-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/2728-122-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/1500-130-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/5044-139-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/4020-151-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/4100-161-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/4204-166-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/4204-173-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/4728-182-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/2628-192-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/4680-202-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/4268-212-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/4060-222-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/3476-232-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/2804-242-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/388-251-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 46 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsdsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsdsc.exe -
Drops file in System32 directory 46 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File opened for modification C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe File created C:\Windows\SysWOW64\wmipsdsc.exe wmipsdsc.exe -
Suspicious use of SetThreadContext 23 IoCs
description pid Process procid_target PID 5004 set thread context of 2572 5004 eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe 84 PID 5060 set thread context of 3988 5060 wmipsdsc.exe 89 PID 4164 set thread context of 2904 4164 wmipsdsc.exe 93 PID 1408 set thread context of 3712 1408 wmipsdsc.exe 95 PID 4996 set thread context of 3412 4996 wmipsdsc.exe 97 PID 2980 set thread context of 2152 2980 wmipsdsc.exe 101 PID 5096 set thread context of 5064 5096 wmipsdsc.exe 103 PID 3644 set thread context of 1764 3644 wmipsdsc.exe 105 PID 3120 set thread context of 4384 3120 wmipsdsc.exe 107 PID 976 set thread context of 2728 976 wmipsdsc.exe 109 PID 4080 set thread context of 1500 4080 wmipsdsc.exe 111 PID 3832 set thread context of 5044 3832 wmipsdsc.exe 113 PID 3548 set thread context of 4020 3548 wmipsdsc.exe 115 PID 1580 set thread context of 4100 1580 wmipsdsc.exe 117 PID 4964 set thread context of 4204 4964 wmipsdsc.exe 119 PID 4368 set thread context of 4728 4368 wmipsdsc.exe 121 PID 4564 set thread context of 2628 4564 wmipsdsc.exe 123 PID 2124 set thread context of 4680 2124 wmipsdsc.exe 125 PID 1552 set thread context of 4268 1552 wmipsdsc.exe 127 PID 232 set thread context of 4060 232 wmipsdsc.exe 129 PID 1332 set thread context of 3476 1332 wmipsdsc.exe 131 PID 5092 set thread context of 2804 5092 wmipsdsc.exe 133 PID 1428 set thread context of 388 1428 wmipsdsc.exe 135 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 46 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsdsc.exe -
Modifies registry class 23 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsdsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsdsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsdsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsdsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsdsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsdsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsdsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsdsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsdsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsdsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsdsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsdsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsdsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsdsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsdsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsdsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsdsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsdsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsdsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsdsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsdsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsdsc.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 2572 eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe 2572 eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe 3988 wmipsdsc.exe 3988 wmipsdsc.exe 2904 wmipsdsc.exe 2904 wmipsdsc.exe 3712 wmipsdsc.exe 3712 wmipsdsc.exe 3412 wmipsdsc.exe 3412 wmipsdsc.exe 2152 wmipsdsc.exe 2152 wmipsdsc.exe 5064 wmipsdsc.exe 5064 wmipsdsc.exe 1764 wmipsdsc.exe 1764 wmipsdsc.exe 4384 wmipsdsc.exe 4384 wmipsdsc.exe 2728 wmipsdsc.exe 2728 wmipsdsc.exe 1500 wmipsdsc.exe 1500 wmipsdsc.exe 5044 wmipsdsc.exe 5044 wmipsdsc.exe 4020 wmipsdsc.exe 4020 wmipsdsc.exe 4100 wmipsdsc.exe 4100 wmipsdsc.exe 4204 wmipsdsc.exe 4204 wmipsdsc.exe 4728 wmipsdsc.exe 4728 wmipsdsc.exe 2628 wmipsdsc.exe 2628 wmipsdsc.exe 4680 wmipsdsc.exe 4680 wmipsdsc.exe 4268 wmipsdsc.exe 4268 wmipsdsc.exe 4060 wmipsdsc.exe 4060 wmipsdsc.exe 3476 wmipsdsc.exe 3476 wmipsdsc.exe 2804 wmipsdsc.exe 2804 wmipsdsc.exe 388 wmipsdsc.exe 388 wmipsdsc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5004 wrote to memory of 2572 5004 eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe 84 PID 5004 wrote to memory of 2572 5004 eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe 84 PID 5004 wrote to memory of 2572 5004 eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe 84 PID 5004 wrote to memory of 2572 5004 eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe 84 PID 5004 wrote to memory of 2572 5004 eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe 84 PID 5004 wrote to memory of 2572 5004 eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe 84 PID 5004 wrote to memory of 2572 5004 eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe 84 PID 2572 wrote to memory of 5060 2572 eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe 87 PID 2572 wrote to memory of 5060 2572 eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe 87 PID 2572 wrote to memory of 5060 2572 eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe 87 PID 5060 wrote to memory of 3988 5060 wmipsdsc.exe 89 PID 5060 wrote to memory of 3988 5060 wmipsdsc.exe 89 PID 5060 wrote to memory of 3988 5060 wmipsdsc.exe 89 PID 5060 wrote to memory of 3988 5060 wmipsdsc.exe 89 PID 5060 wrote to memory of 3988 5060 wmipsdsc.exe 89 PID 5060 wrote to memory of 3988 5060 wmipsdsc.exe 89 PID 5060 wrote to memory of 3988 5060 wmipsdsc.exe 89 PID 3988 wrote to memory of 4164 3988 wmipsdsc.exe 92 PID 3988 wrote to memory of 4164 3988 wmipsdsc.exe 92 PID 3988 wrote to memory of 4164 3988 wmipsdsc.exe 92 PID 4164 wrote to memory of 2904 4164 wmipsdsc.exe 93 PID 4164 wrote to memory of 2904 4164 wmipsdsc.exe 93 PID 4164 wrote to memory of 2904 4164 wmipsdsc.exe 93 PID 4164 wrote to memory of 2904 4164 wmipsdsc.exe 93 PID 4164 wrote to memory of 2904 4164 wmipsdsc.exe 93 PID 4164 wrote to memory of 2904 4164 wmipsdsc.exe 93 PID 4164 wrote to memory of 2904 4164 wmipsdsc.exe 93 PID 2904 wrote to memory of 1408 2904 wmipsdsc.exe 94 PID 2904 wrote to memory of 1408 2904 wmipsdsc.exe 94 PID 2904 wrote to memory of 1408 2904 wmipsdsc.exe 94 PID 1408 wrote to memory of 3712 1408 wmipsdsc.exe 95 PID 1408 wrote to memory of 3712 1408 wmipsdsc.exe 95 PID 1408 wrote to memory of 3712 1408 wmipsdsc.exe 95 PID 1408 wrote to memory of 3712 1408 wmipsdsc.exe 95 PID 1408 wrote to memory of 3712 1408 wmipsdsc.exe 95 PID 1408 wrote to memory of 3712 1408 wmipsdsc.exe 95 PID 1408 wrote to memory of 3712 1408 wmipsdsc.exe 95 PID 3712 wrote to memory of 4996 3712 wmipsdsc.exe 96 PID 3712 wrote to memory of 4996 3712 wmipsdsc.exe 96 PID 3712 wrote to memory of 4996 3712 wmipsdsc.exe 96 PID 4996 wrote to memory of 3412 4996 wmipsdsc.exe 97 PID 4996 wrote to memory of 3412 4996 wmipsdsc.exe 97 PID 4996 wrote to memory of 3412 4996 wmipsdsc.exe 97 PID 4996 wrote to memory of 3412 4996 wmipsdsc.exe 97 PID 4996 wrote to memory of 3412 4996 wmipsdsc.exe 97 PID 4996 wrote to memory of 3412 4996 wmipsdsc.exe 97 PID 4996 wrote to memory of 3412 4996 wmipsdsc.exe 97 PID 3412 wrote to memory of 2980 3412 wmipsdsc.exe 99 PID 3412 wrote to memory of 2980 3412 wmipsdsc.exe 99 PID 3412 wrote to memory of 2980 3412 wmipsdsc.exe 99 PID 2980 wrote to memory of 2152 2980 wmipsdsc.exe 101 PID 2980 wrote to memory of 2152 2980 wmipsdsc.exe 101 PID 2980 wrote to memory of 2152 2980 wmipsdsc.exe 101 PID 2980 wrote to memory of 2152 2980 wmipsdsc.exe 101 PID 2980 wrote to memory of 2152 2980 wmipsdsc.exe 101 PID 2980 wrote to memory of 2152 2980 wmipsdsc.exe 101 PID 2980 wrote to memory of 2152 2980 wmipsdsc.exe 101 PID 2152 wrote to memory of 5096 2152 wmipsdsc.exe 102 PID 2152 wrote to memory of 5096 2152 wmipsdsc.exe 102 PID 2152 wrote to memory of 5096 2152 wmipsdsc.exe 102 PID 5096 wrote to memory of 5064 5096 wmipsdsc.exe 103 PID 5096 wrote to memory of 5064 5096 wmipsdsc.exe 103 PID 5096 wrote to memory of 5064 5096 wmipsdsc.exe 103 PID 5096 wrote to memory of 5064 5096 wmipsdsc.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eeaba3069fe6a11457a9094bdcaced6f_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Users\Admin\AppData\Local\Temp\EEABA3~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Users\Admin\AppData\Local\Temp\EEABA3~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5064 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3644 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1764 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3120 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4384 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:976 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2728 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4080 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1500 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3832 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5044 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3548 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4020 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1580 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4100 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4964 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4204 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4368 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe32⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4728 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4564 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe34⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2628 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2124 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe36⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4680 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1552 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe38⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4268 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:232 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe40⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4060 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1332 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe42⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3476 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5092 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe44⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2804 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1428 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\SysWOW64\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe46⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:388 -
C:\Windows\SysWOW64\wmipsdsc.exe"C:\Windows\system32\wmipsdsc.exe" C:\Windows\SysWOW64\wmipsdsc.exe47⤵
- Executes dropped EXE
PID:1008
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202KB
MD5eeaba3069fe6a11457a9094bdcaced6f
SHA120a9c5191d7548f190ef17eb063f8274d669bfa5
SHA256424cf87edbb3b884ac5b7723730563e9bb9b2823de729b59510e34b78f27854e
SHA512f5efc8e993bf701fc710db97c433bccf133eee0c80b01297cc4f1c5b8d86c953be4fe6a207c92be036222c980115bbb2d098227a38a344c7483d91be25dd145a