Analysis
-
max time kernel
149s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-09-2024 13:13
Static task
static1
Behavioral task
behavioral1
Sample
Photo19.JPG_www.tinypic.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Photo19.JPG_www.tinypic.exe
Resource
win10v2004-20240802-en
General
-
Target
Photo19.JPG_www.tinypic.exe
-
Size
151KB
-
MD5
f9661b5a1d1f85b637f19c988c49d657
-
SHA1
1e2e92ea95b4a62134ab60c9752615427da454e6
-
SHA256
f5b1c8cb0afde9644af26732e236ceab656b16ea5ae358f43d5fa81d83b0e4f7
-
SHA512
3ae0a09d06c90a225aa051dc90237df5ddd3872ef26e6a8ddbef52b5e99a844e13ec3ecf684bdabe869818555ea0febf9c30ac72ac2fd94eaa97e93e05bf885a
-
SSDEEP
3072:j2zAHt8gc03EK2/3qHOdctCD9kyR2mg0xv6XlIz0E+4il+vDe:Q037M3SOdcti9ky8V0ZulIzF+4il+v6
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings 2 TTPs 16 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation wmpdlp32.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation wmpdlp32.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation wmpdlp32.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation wmpdlp32.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation wmpdlp32.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation wmpdlp32.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation wmpdlp32.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation wmpdlp32.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation wmpdlp32.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation wmpdlp32.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation wmpdlp32.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation Photo19.JPG_www.tinypic.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation wmpdlp32.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation wmpdlp32.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation wmpdlp32.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation wmpdlp32.exe -
Deletes itself 1 IoCs
pid Process 2300 wmpdlp32.exe -
Executes dropped EXE 32 IoCs
pid Process 2168 wmpdlp32.exe 2300 wmpdlp32.exe 4520 wmpdlp32.exe 948 wmpdlp32.exe 3984 wmpdlp32.exe 4492 wmpdlp32.exe 2380 wmpdlp32.exe 2936 wmpdlp32.exe 4708 wmpdlp32.exe 1196 wmpdlp32.exe 2820 wmpdlp32.exe 4724 wmpdlp32.exe 5056 wmpdlp32.exe 4348 wmpdlp32.exe 2676 wmpdlp32.exe 820 wmpdlp32.exe 3744 wmpdlp32.exe 2332 wmpdlp32.exe 4432 wmpdlp32.exe 2536 wmpdlp32.exe 2632 wmpdlp32.exe 4796 wmpdlp32.exe 4008 wmpdlp32.exe 3936 wmpdlp32.exe 4396 wmpdlp32.exe 2372 wmpdlp32.exe 4660 wmpdlp32.exe 2472 wmpdlp32.exe 1512 wmpdlp32.exe 4584 wmpdlp32.exe 4960 wmpdlp32.exe 2156 wmpdlp32.exe -
resource yara_rule behavioral2/memory/1732-0-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/1732-2-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/1732-4-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/1732-3-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/1732-31-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2300-43-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/1732-45-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2300-47-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2300-54-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/948-59-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/948-62-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/4492-67-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/4492-70-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2936-75-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2936-78-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/1196-84-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/1196-88-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/4724-93-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/4724-96-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/4348-101-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/4348-104-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/820-109-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/820-114-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2332-121-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2536-128-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/4796-137-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/3936-146-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2372-150-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2372-155-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2472-159-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2472-164-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/4584-169-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/4584-174-0x0000000000400000-0x0000000000456000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 34 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Photo19.JPG_www.tinypic.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 Photo19.JPG_www.tinypic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdlp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdlp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdlp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdlp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdlp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdlp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdlp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdlp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlp32.exe -
Drops file in System32 directory 48 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlp32.exe File created C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File created C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File created C:\Windows\SysWOW64\wmpdlp32.exe Photo19.JPG_www.tinypic.exe File opened for modification C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File created C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File created C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\ Photo19.JPG_www.tinypic.exe File opened for modification C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File created C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File created C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlp32.exe File created C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File created C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File created C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlp32.exe File created C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File created C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\wmpdlp32.exe Photo19.JPG_www.tinypic.exe File opened for modification C:\Windows\SysWOW64\ wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlp32.exe File created C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File created C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File created C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File created C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlp32.exe -
Suspicious use of SetThreadContext 17 IoCs
description pid Process procid_target PID 1144 set thread context of 1732 1144 Photo19.JPG_www.tinypic.exe 82 PID 2168 set thread context of 2300 2168 wmpdlp32.exe 89 PID 4520 set thread context of 948 4520 wmpdlp32.exe 93 PID 3984 set thread context of 4492 3984 wmpdlp32.exe 95 PID 2380 set thread context of 2936 2380 wmpdlp32.exe 99 PID 4708 set thread context of 1196 4708 wmpdlp32.exe 101 PID 2820 set thread context of 4724 2820 wmpdlp32.exe 103 PID 5056 set thread context of 4348 5056 wmpdlp32.exe 105 PID 2676 set thread context of 820 2676 wmpdlp32.exe 107 PID 3744 set thread context of 2332 3744 wmpdlp32.exe 109 PID 4432 set thread context of 2536 4432 wmpdlp32.exe 111 PID 2632 set thread context of 4796 2632 wmpdlp32.exe 113 PID 4008 set thread context of 3936 4008 wmpdlp32.exe 115 PID 4396 set thread context of 2372 4396 wmpdlp32.exe 117 PID 4660 set thread context of 2472 4660 wmpdlp32.exe 119 PID 1512 set thread context of 4584 1512 wmpdlp32.exe 121 PID 4960 set thread context of 2156 4960 wmpdlp32.exe 123 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 33 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Photo19.JPG_www.tinypic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Photo19.JPG_www.tinypic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe -
Modifies registry class 16 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdlp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdlp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdlp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdlp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdlp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdlp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdlp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdlp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdlp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdlp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdlp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdlp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdlp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdlp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Photo19.JPG_www.tinypic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdlp32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1732 Photo19.JPG_www.tinypic.exe 1732 Photo19.JPG_www.tinypic.exe 1732 Photo19.JPG_www.tinypic.exe 1732 Photo19.JPG_www.tinypic.exe 2300 wmpdlp32.exe 2300 wmpdlp32.exe 2300 wmpdlp32.exe 2300 wmpdlp32.exe 948 wmpdlp32.exe 948 wmpdlp32.exe 948 wmpdlp32.exe 948 wmpdlp32.exe 4492 wmpdlp32.exe 4492 wmpdlp32.exe 4492 wmpdlp32.exe 4492 wmpdlp32.exe 2936 wmpdlp32.exe 2936 wmpdlp32.exe 2936 wmpdlp32.exe 2936 wmpdlp32.exe 1196 wmpdlp32.exe 1196 wmpdlp32.exe 1196 wmpdlp32.exe 1196 wmpdlp32.exe 4724 wmpdlp32.exe 4724 wmpdlp32.exe 4724 wmpdlp32.exe 4724 wmpdlp32.exe 4348 wmpdlp32.exe 4348 wmpdlp32.exe 4348 wmpdlp32.exe 4348 wmpdlp32.exe 820 wmpdlp32.exe 820 wmpdlp32.exe 820 wmpdlp32.exe 820 wmpdlp32.exe 2332 wmpdlp32.exe 2332 wmpdlp32.exe 2332 wmpdlp32.exe 2332 wmpdlp32.exe 2536 wmpdlp32.exe 2536 wmpdlp32.exe 2536 wmpdlp32.exe 2536 wmpdlp32.exe 4796 wmpdlp32.exe 4796 wmpdlp32.exe 4796 wmpdlp32.exe 4796 wmpdlp32.exe 3936 wmpdlp32.exe 3936 wmpdlp32.exe 3936 wmpdlp32.exe 3936 wmpdlp32.exe 2372 wmpdlp32.exe 2372 wmpdlp32.exe 2372 wmpdlp32.exe 2372 wmpdlp32.exe 2472 wmpdlp32.exe 2472 wmpdlp32.exe 2472 wmpdlp32.exe 2472 wmpdlp32.exe 4584 wmpdlp32.exe 4584 wmpdlp32.exe 4584 wmpdlp32.exe 4584 wmpdlp32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1144 wrote to memory of 1732 1144 Photo19.JPG_www.tinypic.exe 82 PID 1144 wrote to memory of 1732 1144 Photo19.JPG_www.tinypic.exe 82 PID 1144 wrote to memory of 1732 1144 Photo19.JPG_www.tinypic.exe 82 PID 1144 wrote to memory of 1732 1144 Photo19.JPG_www.tinypic.exe 82 PID 1144 wrote to memory of 1732 1144 Photo19.JPG_www.tinypic.exe 82 PID 1144 wrote to memory of 1732 1144 Photo19.JPG_www.tinypic.exe 82 PID 1144 wrote to memory of 1732 1144 Photo19.JPG_www.tinypic.exe 82 PID 1732 wrote to memory of 2168 1732 Photo19.JPG_www.tinypic.exe 88 PID 1732 wrote to memory of 2168 1732 Photo19.JPG_www.tinypic.exe 88 PID 1732 wrote to memory of 2168 1732 Photo19.JPG_www.tinypic.exe 88 PID 2168 wrote to memory of 2300 2168 wmpdlp32.exe 89 PID 2168 wrote to memory of 2300 2168 wmpdlp32.exe 89 PID 2168 wrote to memory of 2300 2168 wmpdlp32.exe 89 PID 2168 wrote to memory of 2300 2168 wmpdlp32.exe 89 PID 2168 wrote to memory of 2300 2168 wmpdlp32.exe 89 PID 2168 wrote to memory of 2300 2168 wmpdlp32.exe 89 PID 2168 wrote to memory of 2300 2168 wmpdlp32.exe 89 PID 2300 wrote to memory of 4520 2300 wmpdlp32.exe 92 PID 2300 wrote to memory of 4520 2300 wmpdlp32.exe 92 PID 2300 wrote to memory of 4520 2300 wmpdlp32.exe 92 PID 4520 wrote to memory of 948 4520 wmpdlp32.exe 93 PID 4520 wrote to memory of 948 4520 wmpdlp32.exe 93 PID 4520 wrote to memory of 948 4520 wmpdlp32.exe 93 PID 4520 wrote to memory of 948 4520 wmpdlp32.exe 93 PID 4520 wrote to memory of 948 4520 wmpdlp32.exe 93 PID 4520 wrote to memory of 948 4520 wmpdlp32.exe 93 PID 4520 wrote to memory of 948 4520 wmpdlp32.exe 93 PID 948 wrote to memory of 3984 948 wmpdlp32.exe 94 PID 948 wrote to memory of 3984 948 wmpdlp32.exe 94 PID 948 wrote to memory of 3984 948 wmpdlp32.exe 94 PID 3984 wrote to memory of 4492 3984 wmpdlp32.exe 95 PID 3984 wrote to memory of 4492 3984 wmpdlp32.exe 95 PID 3984 wrote to memory of 4492 3984 wmpdlp32.exe 95 PID 3984 wrote to memory of 4492 3984 wmpdlp32.exe 95 PID 3984 wrote to memory of 4492 3984 wmpdlp32.exe 95 PID 3984 wrote to memory of 4492 3984 wmpdlp32.exe 95 PID 3984 wrote to memory of 4492 3984 wmpdlp32.exe 95 PID 4492 wrote to memory of 2380 4492 wmpdlp32.exe 98 PID 4492 wrote to memory of 2380 4492 wmpdlp32.exe 98 PID 4492 wrote to memory of 2380 4492 wmpdlp32.exe 98 PID 2380 wrote to memory of 2936 2380 wmpdlp32.exe 99 PID 2380 wrote to memory of 2936 2380 wmpdlp32.exe 99 PID 2380 wrote to memory of 2936 2380 wmpdlp32.exe 99 PID 2380 wrote to memory of 2936 2380 wmpdlp32.exe 99 PID 2380 wrote to memory of 2936 2380 wmpdlp32.exe 99 PID 2380 wrote to memory of 2936 2380 wmpdlp32.exe 99 PID 2380 wrote to memory of 2936 2380 wmpdlp32.exe 99 PID 2936 wrote to memory of 4708 2936 wmpdlp32.exe 100 PID 2936 wrote to memory of 4708 2936 wmpdlp32.exe 100 PID 2936 wrote to memory of 4708 2936 wmpdlp32.exe 100 PID 4708 wrote to memory of 1196 4708 wmpdlp32.exe 101 PID 4708 wrote to memory of 1196 4708 wmpdlp32.exe 101 PID 4708 wrote to memory of 1196 4708 wmpdlp32.exe 101 PID 4708 wrote to memory of 1196 4708 wmpdlp32.exe 101 PID 4708 wrote to memory of 1196 4708 wmpdlp32.exe 101 PID 4708 wrote to memory of 1196 4708 wmpdlp32.exe 101 PID 4708 wrote to memory of 1196 4708 wmpdlp32.exe 101 PID 1196 wrote to memory of 2820 1196 wmpdlp32.exe 102 PID 1196 wrote to memory of 2820 1196 wmpdlp32.exe 102 PID 1196 wrote to memory of 2820 1196 wmpdlp32.exe 102 PID 2820 wrote to memory of 4724 2820 wmpdlp32.exe 103 PID 2820 wrote to memory of 4724 2820 wmpdlp32.exe 103 PID 2820 wrote to memory of 4724 2820 wmpdlp32.exe 103 PID 2820 wrote to memory of 4724 2820 wmpdlp32.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\Photo19.JPG_www.tinypic.exe"C:\Users\Admin\AppData\Local\Temp\Photo19.JPG_www.tinypic.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\Photo19.JPG_www.tinypic.exe"C:\Users\Admin\AppData\Local\Temp\Photo19.JPG_www.tinypic.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Users\Admin\AppData\Local\Temp\PHOTO1~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Users\Admin\AppData\Local\Temp\PHOTO1~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4724 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5056 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4348 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2676 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:820 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3744 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2332 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4432 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2536 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2632 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4796 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4008 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3936 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4396 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2372 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4660 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2472 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1512 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe32⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4584 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4960 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe34⤵
- Executes dropped EXE
- Maps connected drives based on registry
PID:2156
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151KB
MD5f9661b5a1d1f85b637f19c988c49d657
SHA11e2e92ea95b4a62134ab60c9752615427da454e6
SHA256f5b1c8cb0afde9644af26732e236ceab656b16ea5ae358f43d5fa81d83b0e4f7
SHA5123ae0a09d06c90a225aa051dc90237df5ddd3872ef26e6a8ddbef52b5e99a844e13ec3ecf684bdabe869818555ea0febf9c30ac72ac2fd94eaa97e93e05bf885a