Analysis
-
max time kernel
149s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-09-2024 05:17
Static task
static1
Behavioral task
behavioral1
Sample
f159c382f46c05919a301e23586caad9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f159c382f46c05919a301e23586caad9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f159c382f46c05919a301e23586caad9_JaffaCakes118.exe
-
Size
201KB
-
MD5
f159c382f46c05919a301e23586caad9
-
SHA1
d837758c35108bc709b368cd01789525d9828ba9
-
SHA256
b893d2a2ea7f10413c2b6b22bae8855696bf9b7b69feb3387b8cf6580558dd23
-
SHA512
a31b7eade34112f4deb32fca733744df7f58eb6fc6dbad74de6a3c5db3982dbcc13622478a670b1772d7a62d73bc1febd5e973dde82f0ae835a279f45ef06d12
-
SSDEEP
3072:BaDpZ+xJi1hHw7U3M4PjuRlMAzjn9disWutnL6v0bAAyZ615vPEuAMjPFUBUGE:BSvhHw7pM0jn9UfuN6v0cBev8ugUGE
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings 2 TTPs 15 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation wmpdtv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation wmpdtv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation wmpdtv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation wmpdtv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation f159c382f46c05919a301e23586caad9_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation wmpdtv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation wmpdtv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation wmpdtv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation wmpdtv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation wmpdtv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation wmpdtv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation wmpdtv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation wmpdtv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation wmpdtv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation wmpdtv32.exe -
Deletes itself 1 IoCs
pid Process 812 wmpdtv32.exe -
Executes dropped EXE 30 IoCs
pid Process 3440 wmpdtv32.exe 812 wmpdtv32.exe 3084 wmpdtv32.exe 1156 wmpdtv32.exe 4260 wmpdtv32.exe 1604 wmpdtv32.exe 3328 wmpdtv32.exe 1948 wmpdtv32.exe 3108 wmpdtv32.exe 4244 wmpdtv32.exe 1244 wmpdtv32.exe 2928 wmpdtv32.exe 1916 wmpdtv32.exe 4344 wmpdtv32.exe 436 wmpdtv32.exe 3684 wmpdtv32.exe 2648 wmpdtv32.exe 1460 wmpdtv32.exe 2252 wmpdtv32.exe 3668 wmpdtv32.exe 1492 wmpdtv32.exe 4492 wmpdtv32.exe 232 wmpdtv32.exe 3792 wmpdtv32.exe 1904 wmpdtv32.exe 1316 wmpdtv32.exe 1376 wmpdtv32.exe 3420 wmpdtv32.exe 4568 wmpdtv32.exe 4608 wmpdtv32.exe -
resource yara_rule behavioral2/memory/4572-0-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4572-2-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4572-3-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4572-4-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4572-32-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4572-41-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/812-47-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/812-48-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/812-53-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1156-58-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1156-61-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1156-64-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1604-73-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1948-81-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4244-89-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/2928-97-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4344-105-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/3684-113-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1460-121-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/3668-129-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4492-137-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/3792-145-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1316-153-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/3420-161-0x0000000000400000-0x000000000045A000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 32 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 f159c382f46c05919a301e23586caad9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum f159c382f46c05919a301e23586caad9_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe -
Drops file in System32 directory 46 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ f159c382f46c05919a301e23586caad9_JaffaCakes118.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe f159c382f46c05919a301e23586caad9_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe f159c382f46c05919a301e23586caad9_JaffaCakes118.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe -
Suspicious use of SetThreadContext 16 IoCs
description pid Process procid_target PID 1940 set thread context of 4572 1940 f159c382f46c05919a301e23586caad9_JaffaCakes118.exe 83 PID 3440 set thread context of 812 3440 wmpdtv32.exe 89 PID 3084 set thread context of 1156 3084 wmpdtv32.exe 94 PID 4260 set thread context of 1604 4260 wmpdtv32.exe 97 PID 3328 set thread context of 1948 3328 wmpdtv32.exe 100 PID 3108 set thread context of 4244 3108 wmpdtv32.exe 102 PID 1244 set thread context of 2928 1244 wmpdtv32.exe 104 PID 1916 set thread context of 4344 1916 wmpdtv32.exe 106 PID 436 set thread context of 3684 436 wmpdtv32.exe 108 PID 2648 set thread context of 1460 2648 wmpdtv32.exe 110 PID 2252 set thread context of 3668 2252 wmpdtv32.exe 112 PID 1492 set thread context of 4492 1492 wmpdtv32.exe 114 PID 232 set thread context of 3792 232 wmpdtv32.exe 116 PID 1904 set thread context of 1316 1904 wmpdtv32.exe 118 PID 1376 set thread context of 3420 1376 wmpdtv32.exe 120 PID 4568 set thread context of 4608 4568 wmpdtv32.exe 122 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 31 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f159c382f46c05919a301e23586caad9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f159c382f46c05919a301e23586caad9_JaffaCakes118.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ f159c382f46c05919a301e23586caad9_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtv32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4572 f159c382f46c05919a301e23586caad9_JaffaCakes118.exe 4572 f159c382f46c05919a301e23586caad9_JaffaCakes118.exe 4572 f159c382f46c05919a301e23586caad9_JaffaCakes118.exe 4572 f159c382f46c05919a301e23586caad9_JaffaCakes118.exe 812 wmpdtv32.exe 812 wmpdtv32.exe 812 wmpdtv32.exe 812 wmpdtv32.exe 1156 wmpdtv32.exe 1156 wmpdtv32.exe 1156 wmpdtv32.exe 1156 wmpdtv32.exe 1604 wmpdtv32.exe 1604 wmpdtv32.exe 1604 wmpdtv32.exe 1604 wmpdtv32.exe 1948 wmpdtv32.exe 1948 wmpdtv32.exe 1948 wmpdtv32.exe 1948 wmpdtv32.exe 4244 wmpdtv32.exe 4244 wmpdtv32.exe 4244 wmpdtv32.exe 4244 wmpdtv32.exe 2928 wmpdtv32.exe 2928 wmpdtv32.exe 2928 wmpdtv32.exe 2928 wmpdtv32.exe 4344 wmpdtv32.exe 4344 wmpdtv32.exe 4344 wmpdtv32.exe 4344 wmpdtv32.exe 3684 wmpdtv32.exe 3684 wmpdtv32.exe 3684 wmpdtv32.exe 3684 wmpdtv32.exe 1460 wmpdtv32.exe 1460 wmpdtv32.exe 1460 wmpdtv32.exe 1460 wmpdtv32.exe 3668 wmpdtv32.exe 3668 wmpdtv32.exe 3668 wmpdtv32.exe 3668 wmpdtv32.exe 4492 wmpdtv32.exe 4492 wmpdtv32.exe 4492 wmpdtv32.exe 4492 wmpdtv32.exe 3792 wmpdtv32.exe 3792 wmpdtv32.exe 3792 wmpdtv32.exe 3792 wmpdtv32.exe 1316 wmpdtv32.exe 1316 wmpdtv32.exe 1316 wmpdtv32.exe 1316 wmpdtv32.exe 3420 wmpdtv32.exe 3420 wmpdtv32.exe 3420 wmpdtv32.exe 3420 wmpdtv32.exe 4608 wmpdtv32.exe 4608 wmpdtv32.exe 4608 wmpdtv32.exe 4608 wmpdtv32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1940 wrote to memory of 4572 1940 f159c382f46c05919a301e23586caad9_JaffaCakes118.exe 83 PID 1940 wrote to memory of 4572 1940 f159c382f46c05919a301e23586caad9_JaffaCakes118.exe 83 PID 1940 wrote to memory of 4572 1940 f159c382f46c05919a301e23586caad9_JaffaCakes118.exe 83 PID 1940 wrote to memory of 4572 1940 f159c382f46c05919a301e23586caad9_JaffaCakes118.exe 83 PID 1940 wrote to memory of 4572 1940 f159c382f46c05919a301e23586caad9_JaffaCakes118.exe 83 PID 1940 wrote to memory of 4572 1940 f159c382f46c05919a301e23586caad9_JaffaCakes118.exe 83 PID 1940 wrote to memory of 4572 1940 f159c382f46c05919a301e23586caad9_JaffaCakes118.exe 83 PID 4572 wrote to memory of 3440 4572 f159c382f46c05919a301e23586caad9_JaffaCakes118.exe 86 PID 4572 wrote to memory of 3440 4572 f159c382f46c05919a301e23586caad9_JaffaCakes118.exe 86 PID 4572 wrote to memory of 3440 4572 f159c382f46c05919a301e23586caad9_JaffaCakes118.exe 86 PID 3440 wrote to memory of 812 3440 wmpdtv32.exe 89 PID 3440 wrote to memory of 812 3440 wmpdtv32.exe 89 PID 3440 wrote to memory of 812 3440 wmpdtv32.exe 89 PID 3440 wrote to memory of 812 3440 wmpdtv32.exe 89 PID 3440 wrote to memory of 812 3440 wmpdtv32.exe 89 PID 3440 wrote to memory of 812 3440 wmpdtv32.exe 89 PID 3440 wrote to memory of 812 3440 wmpdtv32.exe 89 PID 812 wrote to memory of 3084 812 wmpdtv32.exe 93 PID 812 wrote to memory of 3084 812 wmpdtv32.exe 93 PID 812 wrote to memory of 3084 812 wmpdtv32.exe 93 PID 3084 wrote to memory of 1156 3084 wmpdtv32.exe 94 PID 3084 wrote to memory of 1156 3084 wmpdtv32.exe 94 PID 3084 wrote to memory of 1156 3084 wmpdtv32.exe 94 PID 3084 wrote to memory of 1156 3084 wmpdtv32.exe 94 PID 3084 wrote to memory of 1156 3084 wmpdtv32.exe 94 PID 3084 wrote to memory of 1156 3084 wmpdtv32.exe 94 PID 3084 wrote to memory of 1156 3084 wmpdtv32.exe 94 PID 1156 wrote to memory of 4260 1156 wmpdtv32.exe 96 PID 1156 wrote to memory of 4260 1156 wmpdtv32.exe 96 PID 1156 wrote to memory of 4260 1156 wmpdtv32.exe 96 PID 4260 wrote to memory of 1604 4260 wmpdtv32.exe 97 PID 4260 wrote to memory of 1604 4260 wmpdtv32.exe 97 PID 4260 wrote to memory of 1604 4260 wmpdtv32.exe 97 PID 4260 wrote to memory of 1604 4260 wmpdtv32.exe 97 PID 4260 wrote to memory of 1604 4260 wmpdtv32.exe 97 PID 4260 wrote to memory of 1604 4260 wmpdtv32.exe 97 PID 4260 wrote to memory of 1604 4260 wmpdtv32.exe 97 PID 1604 wrote to memory of 3328 1604 wmpdtv32.exe 99 PID 1604 wrote to memory of 3328 1604 wmpdtv32.exe 99 PID 1604 wrote to memory of 3328 1604 wmpdtv32.exe 99 PID 3328 wrote to memory of 1948 3328 wmpdtv32.exe 100 PID 3328 wrote to memory of 1948 3328 wmpdtv32.exe 100 PID 3328 wrote to memory of 1948 3328 wmpdtv32.exe 100 PID 3328 wrote to memory of 1948 3328 wmpdtv32.exe 100 PID 3328 wrote to memory of 1948 3328 wmpdtv32.exe 100 PID 3328 wrote to memory of 1948 3328 wmpdtv32.exe 100 PID 3328 wrote to memory of 1948 3328 wmpdtv32.exe 100 PID 1948 wrote to memory of 3108 1948 wmpdtv32.exe 101 PID 1948 wrote to memory of 3108 1948 wmpdtv32.exe 101 PID 1948 wrote to memory of 3108 1948 wmpdtv32.exe 101 PID 3108 wrote to memory of 4244 3108 wmpdtv32.exe 102 PID 3108 wrote to memory of 4244 3108 wmpdtv32.exe 102 PID 3108 wrote to memory of 4244 3108 wmpdtv32.exe 102 PID 3108 wrote to memory of 4244 3108 wmpdtv32.exe 102 PID 3108 wrote to memory of 4244 3108 wmpdtv32.exe 102 PID 3108 wrote to memory of 4244 3108 wmpdtv32.exe 102 PID 3108 wrote to memory of 4244 3108 wmpdtv32.exe 102 PID 4244 wrote to memory of 1244 4244 wmpdtv32.exe 103 PID 4244 wrote to memory of 1244 4244 wmpdtv32.exe 103 PID 4244 wrote to memory of 1244 4244 wmpdtv32.exe 103 PID 1244 wrote to memory of 2928 1244 wmpdtv32.exe 104 PID 1244 wrote to memory of 2928 1244 wmpdtv32.exe 104 PID 1244 wrote to memory of 2928 1244 wmpdtv32.exe 104 PID 1244 wrote to memory of 2928 1244 wmpdtv32.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\f159c382f46c05919a301e23586caad9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f159c382f46c05919a301e23586caad9_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\f159c382f46c05919a301e23586caad9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f159c382f46c05919a301e23586caad9_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Users\Admin\AppData\Local\Temp\F159C3~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Users\Admin\AppData\Local\Temp\F159C3~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2928 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1916 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4344 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:436 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3684 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2648 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1460 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2252 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3668 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1492 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4492 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:232 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3792 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1904 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1316 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1376 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3420 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4568 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe32⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4608
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
201KB
MD5f159c382f46c05919a301e23586caad9
SHA1d837758c35108bc709b368cd01789525d9828ba9
SHA256b893d2a2ea7f10413c2b6b22bae8855696bf9b7b69feb3387b8cf6580558dd23
SHA512a31b7eade34112f4deb32fca733744df7f58eb6fc6dbad74de6a3c5db3982dbcc13622478a670b1772d7a62d73bc1febd5e973dde82f0ae835a279f45ef06d12