Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 19:57
Static task
static1
Behavioral task
behavioral1
Sample
f0806d11956287ed5faa36ef7c4cfcfc_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f0806d11956287ed5faa36ef7c4cfcfc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f0806d11956287ed5faa36ef7c4cfcfc_JaffaCakes118.exe
-
Size
168KB
-
MD5
f0806d11956287ed5faa36ef7c4cfcfc
-
SHA1
3986789e5be5e5bec6668a7270cba2f1323f701f
-
SHA256
bb957cba14b716765fffb1aa49b12f7d4b98f296cbabca7e499c57f4d8ed5a16
-
SHA512
980c89a08715855b7a630a2b189b75d3837f3549841b2e2e8c540ef3fb79a9331239482383049aea36799a1a14cd9cf7a7eb3360dcc4aface14e5f0429b3bad4
-
SSDEEP
3072:tU7bCtMPU4dBMOioVb+B46Fl9B0ZDxQ5Mh86LshfdWrwvS0dC80Xl:ERdWOi3BdgZDW5Mh8qsXEw63l
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 1500 wnpxk2.exe -
Executes dropped EXE 64 IoCs
pid Process 3068 wnpxk2.exe 1500 wnpxk2.exe 2148 wnpxk2.exe 3056 wnpxk2.exe 2824 wnpxk2.exe 2076 wnpxk2.exe 1664 wnpxk2.exe 1060 wnpxk2.exe 2136 wnpxk2.exe 1628 wnpxk2.exe 2580 wnpxk2.exe 1876 wnpxk2.exe 1792 wnpxk2.exe 2524 wnpxk2.exe 2376 wnpxk2.exe 2100 wnpxk2.exe 2900 wnpxk2.exe 2336 wnpxk2.exe 1268 wnpxk2.exe 2420 wnpxk2.exe 1736 wnpxk2.exe 1264 wnpxk2.exe 2232 wnpxk2.exe 1820 wnpxk2.exe 3012 wnpxk2.exe 2476 wnpxk2.exe 1032 wnpxk2.exe 1808 wnpxk2.exe 288 wnpxk2.exe 920 wnpxk2.exe 908 wnpxk2.exe 2496 wnpxk2.exe 1916 wnpxk2.exe 2644 wnpxk2.exe 2648 wnpxk2.exe 1048 wnpxk2.exe 3040 wnpxk2.exe 2820 wnpxk2.exe 1804 wnpxk2.exe 1736 wnpxk2.exe 1700 wnpxk2.exe 2676 wnpxk2.exe 2960 wnpxk2.exe 1952 wnpxk2.exe 2400 wnpxk2.exe 1364 wnpxk2.exe 1200 wnpxk2.exe 2432 wnpxk2.exe 1568 wnpxk2.exe 2268 wnpxk2.exe 2544 wnpxk2.exe 1036 wnpxk2.exe 2628 wnpxk2.exe 880 wnpxk2.exe 2108 wnpxk2.exe 1172 wnpxk2.exe 2600 wnpxk2.exe 568 wnpxk2.exe 2588 wnpxk2.exe 1856 wnpxk2.exe 1588 wnpxk2.exe 2156 wnpxk2.exe 1000 wnpxk2.exe 2424 wnpxk2.exe -
Loads dropped DLL 64 IoCs
pid Process 2892 f0806d11956287ed5faa36ef7c4cfcfc_JaffaCakes118.exe 2892 f0806d11956287ed5faa36ef7c4cfcfc_JaffaCakes118.exe 1500 wnpxk2.exe 1500 wnpxk2.exe 3056 wnpxk2.exe 3056 wnpxk2.exe 2076 wnpxk2.exe 2076 wnpxk2.exe 1060 wnpxk2.exe 1060 wnpxk2.exe 1628 wnpxk2.exe 1628 wnpxk2.exe 1876 wnpxk2.exe 1876 wnpxk2.exe 2524 wnpxk2.exe 2524 wnpxk2.exe 2100 wnpxk2.exe 2100 wnpxk2.exe 2336 wnpxk2.exe 2336 wnpxk2.exe 2420 wnpxk2.exe 2420 wnpxk2.exe 1264 wnpxk2.exe 1264 wnpxk2.exe 1820 wnpxk2.exe 1820 wnpxk2.exe 2476 wnpxk2.exe 2476 wnpxk2.exe 1808 wnpxk2.exe 1808 wnpxk2.exe 920 wnpxk2.exe 920 wnpxk2.exe 2496 wnpxk2.exe 2496 wnpxk2.exe 2644 wnpxk2.exe 2644 wnpxk2.exe 1048 wnpxk2.exe 1048 wnpxk2.exe 2820 wnpxk2.exe 2820 wnpxk2.exe 1736 wnpxk2.exe 1736 wnpxk2.exe 2676 wnpxk2.exe 2676 wnpxk2.exe 1952 wnpxk2.exe 1952 wnpxk2.exe 1364 wnpxk2.exe 1364 wnpxk2.exe 2432 wnpxk2.exe 2432 wnpxk2.exe 2268 wnpxk2.exe 2268 wnpxk2.exe 1036 wnpxk2.exe 1036 wnpxk2.exe 880 wnpxk2.exe 880 wnpxk2.exe 1172 wnpxk2.exe 1172 wnpxk2.exe 568 wnpxk2.exe 568 wnpxk2.exe 1856 wnpxk2.exe 1856 wnpxk2.exe 2156 wnpxk2.exe 2156 wnpxk2.exe -
resource yara_rule behavioral1/memory/2892-4-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2892-6-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2892-2-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2892-8-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2892-11-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2892-9-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2892-10-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2892-24-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1500-36-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1500-35-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1500-42-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/3056-51-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/3056-52-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/3056-59-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2076-69-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2076-70-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2076-74-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1060-92-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1628-108-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1876-117-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1876-125-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2524-141-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2100-150-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2100-159-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2336-175-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2420-192-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1264-208-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1820-225-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2476-241-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1808-254-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/920-266-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2496-278-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2644-290-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1048-302-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2820-314-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1736-326-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2676-338-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1952-350-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1364-362-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2432-374-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2268-386-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1036-398-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/880-410-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1172-422-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/568-434-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1856-446-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2156-458-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2424-470-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2000-482-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2536-494-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2624-506-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2920-518-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2460-530-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2380-542-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1928-554-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/448-566-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2016-578-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2044-590-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2540-602-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1012-614-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/936-626-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2508-638-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1512-650-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2340-662-0x0000000000400000-0x0000000000468000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxk2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxk2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxk2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxk2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxk2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxk2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxk2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxk2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxk2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxk2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxk2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxk2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxk2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxk2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxk2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxk2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 f0806d11956287ed5faa36ef7c4cfcfc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxk2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxk2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxk2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxk2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxk2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxk2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxk2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxk2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxk2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxk2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxk2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxk2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxk2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxk2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxk2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxk2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxk2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxk2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxk2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxk2.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File opened for modification C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File created C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File opened for modification C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File opened for modification C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File opened for modification C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File opened for modification C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File created C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File opened for modification C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File created C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File created C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File created C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File opened for modification C:\Windows\SysWOW64\wnpxk2.exe f0806d11956287ed5faa36ef7c4cfcfc_JaffaCakes118.exe File created C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File created C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File created C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File created C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File opened for modification C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File opened for modification C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File created C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File opened for modification C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File opened for modification C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File created C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File created C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File opened for modification C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File created C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File opened for modification C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File created C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File created C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File created C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File opened for modification C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File opened for modification C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File created C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File opened for modification C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File opened for modification C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File created C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File created C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File opened for modification C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File opened for modification C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File created C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File created C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File opened for modification C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File opened for modification C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File created C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File created C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File created C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File created C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File created C:\Windows\SysWOW64\wnpxk2.exe f0806d11956287ed5faa36ef7c4cfcfc_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File created C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File opened for modification C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File created C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File created C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File created C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File opened for modification C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File opened for modification C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File opened for modification C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File opened for modification C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File created C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File opened for modification C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File opened for modification C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File created C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File created C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe File opened for modification C:\Windows\SysWOW64\wnpxk2.exe wnpxk2.exe -
Suspicious use of SetThreadContext 51 IoCs
description pid Process procid_target PID 2300 set thread context of 2892 2300 f0806d11956287ed5faa36ef7c4cfcfc_JaffaCakes118.exe 30 PID 3068 set thread context of 1500 3068 wnpxk2.exe 32 PID 2148 set thread context of 3056 2148 wnpxk2.exe 34 PID 2824 set thread context of 2076 2824 wnpxk2.exe 36 PID 1664 set thread context of 1060 1664 wnpxk2.exe 38 PID 2136 set thread context of 1628 2136 wnpxk2.exe 40 PID 2580 set thread context of 1876 2580 wnpxk2.exe 42 PID 1792 set thread context of 2524 1792 wnpxk2.exe 44 PID 2376 set thread context of 2100 2376 wnpxk2.exe 46 PID 2900 set thread context of 2336 2900 wnpxk2.exe 48 PID 1268 set thread context of 2420 1268 wnpxk2.exe 51 PID 1736 set thread context of 1264 1736 wnpxk2.exe 53 PID 2232 set thread context of 1820 2232 wnpxk2.exe 55 PID 3012 set thread context of 2476 3012 wnpxk2.exe 57 PID 1032 set thread context of 1808 1032 wnpxk2.exe 59 PID 288 set thread context of 920 288 wnpxk2.exe 61 PID 908 set thread context of 2496 908 wnpxk2.exe 63 PID 1916 set thread context of 2644 1916 wnpxk2.exe 65 PID 2648 set thread context of 1048 2648 wnpxk2.exe 67 PID 3040 set thread context of 2820 3040 wnpxk2.exe 69 PID 1804 set thread context of 1736 1804 wnpxk2.exe 71 PID 1700 set thread context of 2676 1700 wnpxk2.exe 73 PID 2960 set thread context of 1952 2960 wnpxk2.exe 75 PID 2400 set thread context of 1364 2400 wnpxk2.exe 77 PID 1200 set thread context of 2432 1200 wnpxk2.exe 79 PID 1568 set thread context of 2268 1568 wnpxk2.exe 81 PID 2544 set thread context of 1036 2544 wnpxk2.exe 83 PID 2628 set thread context of 880 2628 wnpxk2.exe 85 PID 2108 set thread context of 1172 2108 wnpxk2.exe 87 PID 2600 set thread context of 568 2600 wnpxk2.exe 89 PID 2588 set thread context of 1856 2588 wnpxk2.exe 91 PID 1588 set thread context of 2156 1588 wnpxk2.exe 93 PID 1000 set thread context of 2424 1000 wnpxk2.exe 95 PID 1632 set thread context of 2000 1632 wnpxk2.exe 97 PID 2240 set thread context of 2536 2240 wnpxk2.exe 99 PID 2440 set thread context of 2624 2440 wnpxk2.exe 101 PID 2640 set thread context of 2920 2640 wnpxk2.exe 103 PID 2520 set thread context of 2460 2520 wnpxk2.exe 105 PID 1508 set thread context of 2380 1508 wnpxk2.exe 107 PID 1440 set thread context of 1928 1440 wnpxk2.exe 109 PID 2244 set thread context of 448 2244 wnpxk2.exe 111 PID 2412 set thread context of 2016 2412 wnpxk2.exe 113 PID 308 set thread context of 2044 308 wnpxk2.exe 115 PID 2072 set thread context of 2540 2072 wnpxk2.exe 117 PID 2728 set thread context of 1012 2728 wnpxk2.exe 119 PID 896 set thread context of 936 896 wnpxk2.exe 121 PID 2404 set thread context of 2508 2404 wnpxk2.exe 123 PID 1164 set thread context of 1512 1164 wnpxk2.exe 125 PID 2576 set thread context of 2340 2576 wnpxk2.exe 127 PID 2888 set thread context of 1436 2888 wnpxk2.exe 129 PID 2552 set thread context of 1516 2552 wnpxk2.exe 131 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f0806d11956287ed5faa36ef7c4cfcfc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxk2.exe -
Suspicious behavior: EnumeratesProcesses 51 IoCs
pid Process 2892 f0806d11956287ed5faa36ef7c4cfcfc_JaffaCakes118.exe 1500 wnpxk2.exe 3056 wnpxk2.exe 2076 wnpxk2.exe 1060 wnpxk2.exe 1628 wnpxk2.exe 1876 wnpxk2.exe 2524 wnpxk2.exe 2100 wnpxk2.exe 2336 wnpxk2.exe 2420 wnpxk2.exe 1264 wnpxk2.exe 1820 wnpxk2.exe 2476 wnpxk2.exe 1808 wnpxk2.exe 920 wnpxk2.exe 2496 wnpxk2.exe 2644 wnpxk2.exe 1048 wnpxk2.exe 2820 wnpxk2.exe 1736 wnpxk2.exe 2676 wnpxk2.exe 1952 wnpxk2.exe 1364 wnpxk2.exe 2432 wnpxk2.exe 2268 wnpxk2.exe 1036 wnpxk2.exe 880 wnpxk2.exe 1172 wnpxk2.exe 568 wnpxk2.exe 1856 wnpxk2.exe 2156 wnpxk2.exe 2424 wnpxk2.exe 2000 wnpxk2.exe 2536 wnpxk2.exe 2624 wnpxk2.exe 2920 wnpxk2.exe 2460 wnpxk2.exe 2380 wnpxk2.exe 1928 wnpxk2.exe 448 wnpxk2.exe 2016 wnpxk2.exe 2044 wnpxk2.exe 2540 wnpxk2.exe 1012 wnpxk2.exe 936 wnpxk2.exe 2508 wnpxk2.exe 1512 wnpxk2.exe 2340 wnpxk2.exe 1436 wnpxk2.exe 1516 wnpxk2.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2300 wrote to memory of 2892 2300 f0806d11956287ed5faa36ef7c4cfcfc_JaffaCakes118.exe 30 PID 2300 wrote to memory of 2892 2300 f0806d11956287ed5faa36ef7c4cfcfc_JaffaCakes118.exe 30 PID 2300 wrote to memory of 2892 2300 f0806d11956287ed5faa36ef7c4cfcfc_JaffaCakes118.exe 30 PID 2300 wrote to memory of 2892 2300 f0806d11956287ed5faa36ef7c4cfcfc_JaffaCakes118.exe 30 PID 2300 wrote to memory of 2892 2300 f0806d11956287ed5faa36ef7c4cfcfc_JaffaCakes118.exe 30 PID 2300 wrote to memory of 2892 2300 f0806d11956287ed5faa36ef7c4cfcfc_JaffaCakes118.exe 30 PID 2300 wrote to memory of 2892 2300 f0806d11956287ed5faa36ef7c4cfcfc_JaffaCakes118.exe 30 PID 2892 wrote to memory of 3068 2892 f0806d11956287ed5faa36ef7c4cfcfc_JaffaCakes118.exe 31 PID 2892 wrote to memory of 3068 2892 f0806d11956287ed5faa36ef7c4cfcfc_JaffaCakes118.exe 31 PID 2892 wrote to memory of 3068 2892 f0806d11956287ed5faa36ef7c4cfcfc_JaffaCakes118.exe 31 PID 2892 wrote to memory of 3068 2892 f0806d11956287ed5faa36ef7c4cfcfc_JaffaCakes118.exe 31 PID 3068 wrote to memory of 1500 3068 wnpxk2.exe 32 PID 3068 wrote to memory of 1500 3068 wnpxk2.exe 32 PID 3068 wrote to memory of 1500 3068 wnpxk2.exe 32 PID 3068 wrote to memory of 1500 3068 wnpxk2.exe 32 PID 3068 wrote to memory of 1500 3068 wnpxk2.exe 32 PID 3068 wrote to memory of 1500 3068 wnpxk2.exe 32 PID 3068 wrote to memory of 1500 3068 wnpxk2.exe 32 PID 1500 wrote to memory of 2148 1500 wnpxk2.exe 33 PID 1500 wrote to memory of 2148 1500 wnpxk2.exe 33 PID 1500 wrote to memory of 2148 1500 wnpxk2.exe 33 PID 1500 wrote to memory of 2148 1500 wnpxk2.exe 33 PID 2148 wrote to memory of 3056 2148 wnpxk2.exe 34 PID 2148 wrote to memory of 3056 2148 wnpxk2.exe 34 PID 2148 wrote to memory of 3056 2148 wnpxk2.exe 34 PID 2148 wrote to memory of 3056 2148 wnpxk2.exe 34 PID 2148 wrote to memory of 3056 2148 wnpxk2.exe 34 PID 2148 wrote to memory of 3056 2148 wnpxk2.exe 34 PID 2148 wrote to memory of 3056 2148 wnpxk2.exe 34 PID 3056 wrote to memory of 2824 3056 wnpxk2.exe 35 PID 3056 wrote to memory of 2824 3056 wnpxk2.exe 35 PID 3056 wrote to memory of 2824 3056 wnpxk2.exe 35 PID 3056 wrote to memory of 2824 3056 wnpxk2.exe 35 PID 2824 wrote to memory of 2076 2824 wnpxk2.exe 36 PID 2824 wrote to memory of 2076 2824 wnpxk2.exe 36 PID 2824 wrote to memory of 2076 2824 wnpxk2.exe 36 PID 2824 wrote to memory of 2076 2824 wnpxk2.exe 36 PID 2824 wrote to memory of 2076 2824 wnpxk2.exe 36 PID 2824 wrote to memory of 2076 2824 wnpxk2.exe 36 PID 2824 wrote to memory of 2076 2824 wnpxk2.exe 36 PID 2076 wrote to memory of 1664 2076 wnpxk2.exe 37 PID 2076 wrote to memory of 1664 2076 wnpxk2.exe 37 PID 2076 wrote to memory of 1664 2076 wnpxk2.exe 37 PID 2076 wrote to memory of 1664 2076 wnpxk2.exe 37 PID 1664 wrote to memory of 1060 1664 wnpxk2.exe 38 PID 1664 wrote to memory of 1060 1664 wnpxk2.exe 38 PID 1664 wrote to memory of 1060 1664 wnpxk2.exe 38 PID 1664 wrote to memory of 1060 1664 wnpxk2.exe 38 PID 1664 wrote to memory of 1060 1664 wnpxk2.exe 38 PID 1664 wrote to memory of 1060 1664 wnpxk2.exe 38 PID 1664 wrote to memory of 1060 1664 wnpxk2.exe 38 PID 1060 wrote to memory of 2136 1060 wnpxk2.exe 39 PID 1060 wrote to memory of 2136 1060 wnpxk2.exe 39 PID 1060 wrote to memory of 2136 1060 wnpxk2.exe 39 PID 1060 wrote to memory of 2136 1060 wnpxk2.exe 39 PID 2136 wrote to memory of 1628 2136 wnpxk2.exe 40 PID 2136 wrote to memory of 1628 2136 wnpxk2.exe 40 PID 2136 wrote to memory of 1628 2136 wnpxk2.exe 40 PID 2136 wrote to memory of 1628 2136 wnpxk2.exe 40 PID 2136 wrote to memory of 1628 2136 wnpxk2.exe 40 PID 2136 wrote to memory of 1628 2136 wnpxk2.exe 40 PID 2136 wrote to memory of 1628 2136 wnpxk2.exe 40 PID 1628 wrote to memory of 2580 1628 wnpxk2.exe 41 PID 1628 wrote to memory of 2580 1628 wnpxk2.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0806d11956287ed5faa36ef7c4cfcfc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f0806d11956287ed5faa36ef7c4cfcfc_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\f0806d11956287ed5faa36ef7c4cfcfc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f0806d11956287ed5faa36ef7c4cfcfc_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Users\Admin\AppData\Local\Temp\F0806D~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Users\Admin\AppData\Local\Temp\F0806D~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2580 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1876 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1792 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2524 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2376 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2100 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2900 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2336 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1268 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2420 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1736 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1264 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2232 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1820 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3012 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2476 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1032 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1808 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:288 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:920 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:908 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe34⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2496 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1916 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe36⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2644 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2648 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe38⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1048 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3040 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe40⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2820 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1804 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe42⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1736 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1700 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe44⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2676 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2960 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe46⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1952 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2400 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe48⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1364 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1200 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe50⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2432 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1568 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe52⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2268 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2544 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe54⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1036 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2628 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe56⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:880 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2108 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe58⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1172 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2600 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe60⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:568 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2588 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe62⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1856 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1588 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe64⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2156 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1000 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe66⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2424 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe67⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1632 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe68⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2000 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe69⤵
- Suspicious use of SetThreadContext
PID:2240 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe70⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2536 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe71⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2440 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe72⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2624 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe73⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2640 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe74⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2920 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe75⤵
- Suspicious use of SetThreadContext
PID:2520 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe76⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2460 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe77⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1508 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe78⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2380 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe79⤵
- Suspicious use of SetThreadContext
PID:1440 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe80⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1928 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe81⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2244 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe82⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:448 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe83⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2412 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe84⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2016 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe85⤵
- Suspicious use of SetThreadContext
PID:308 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe86⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2044 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe87⤵
- Suspicious use of SetThreadContext
PID:2072 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe88⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2540 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe89⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2728 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe90⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1012 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe91⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:896 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe92⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:936 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe93⤵
- Suspicious use of SetThreadContext
PID:2404 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe94⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2508 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe95⤵
- Suspicious use of SetThreadContext
PID:1164 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe96⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1512 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe97⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2576 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe98⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2340 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe99⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2888 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe100⤵
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1436 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe101⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2552 -
C:\Windows\SysWOW64\wnpxk2.exe"C:\Windows\system32\wnpxk2.exe" C:\Windows\SysWOW64\wnpxk2.exe102⤵
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:1516
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5f0806d11956287ed5faa36ef7c4cfcfc
SHA13986789e5be5e5bec6668a7270cba2f1323f701f
SHA256bb957cba14b716765fffb1aa49b12f7d4b98f296cbabca7e499c57f4d8ed5a16
SHA512980c89a08715855b7a630a2b189b75d3837f3549841b2e2e8c540ef3fb79a9331239482383049aea36799a1a14cd9cf7a7eb3360dcc4aface14e5f0429b3bad4