Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23-09-2024 17:09
Static task
static1
Behavioral task
behavioral1
Sample
f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe
-
Size
141KB
-
MD5
f2bd14f1d5fbdab0fe21832ba8aec524
-
SHA1
7290ed270c3db66c72cf23bffba7955183a7272c
-
SHA256
e2051785e5c2f3ba3bc05aec0442af3b899246ecc3dc836b8a187f91d986c33e
-
SHA512
c8f761359be804b4a76df9a07e4ec90bb9188d881fabacd90fce91bf18dc9812d8799bfb4e519fcb31ee53f768373a2dc5b99ab779a9634507ce1b473a67852d
-
SSDEEP
3072:BxmEvcelB7KX/t/6bOe1075aNFIULlAxCyWmzvStMEGt3NxhBenjYDr:e27e1c0daNFIa26mzvSq3NsYv
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2264 wmpdtk32.exe -
Executes dropped EXE 32 IoCs
pid Process 1508 wmpdtk32.exe 2264 wmpdtk32.exe 2760 wmpdtk32.exe 2784 wmpdtk32.exe 768 wmpdtk32.exe 2796 wmpdtk32.exe 2656 wmpdtk32.exe 1252 wmpdtk32.exe 2888 wmpdtk32.exe 2476 wmpdtk32.exe 760 wmpdtk32.exe 1552 wmpdtk32.exe 1016 wmpdtk32.exe 1668 wmpdtk32.exe 2208 wmpdtk32.exe 2160 wmpdtk32.exe 2288 wmpdtk32.exe 2176 wmpdtk32.exe 1712 wmpdtk32.exe 2560 wmpdtk32.exe 2852 wmpdtk32.exe 1912 wmpdtk32.exe 2892 wmpdtk32.exe 1892 wmpdtk32.exe 2876 wmpdtk32.exe 372 wmpdtk32.exe 860 wmpdtk32.exe 2804 wmpdtk32.exe 2936 wmpdtk32.exe 2788 wmpdtk32.exe 2232 wmpdtk32.exe 2072 wmpdtk32.exe -
Loads dropped DLL 64 IoCs
pid Process 2512 f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe 2512 f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe 1508 wmpdtk32.exe 1508 wmpdtk32.exe 2264 wmpdtk32.exe 2264 wmpdtk32.exe 2760 wmpdtk32.exe 2760 wmpdtk32.exe 2784 wmpdtk32.exe 2784 wmpdtk32.exe 768 wmpdtk32.exe 768 wmpdtk32.exe 2796 wmpdtk32.exe 2796 wmpdtk32.exe 2656 wmpdtk32.exe 2656 wmpdtk32.exe 1252 wmpdtk32.exe 1252 wmpdtk32.exe 2888 wmpdtk32.exe 2888 wmpdtk32.exe 2476 wmpdtk32.exe 2476 wmpdtk32.exe 760 wmpdtk32.exe 760 wmpdtk32.exe 1552 wmpdtk32.exe 1552 wmpdtk32.exe 1016 wmpdtk32.exe 1016 wmpdtk32.exe 1668 wmpdtk32.exe 1668 wmpdtk32.exe 2208 wmpdtk32.exe 2208 wmpdtk32.exe 2160 wmpdtk32.exe 2160 wmpdtk32.exe 2288 wmpdtk32.exe 2288 wmpdtk32.exe 2176 wmpdtk32.exe 2176 wmpdtk32.exe 1712 wmpdtk32.exe 1712 wmpdtk32.exe 2560 wmpdtk32.exe 2560 wmpdtk32.exe 2852 wmpdtk32.exe 2852 wmpdtk32.exe 1912 wmpdtk32.exe 1912 wmpdtk32.exe 2892 wmpdtk32.exe 2892 wmpdtk32.exe 1892 wmpdtk32.exe 1892 wmpdtk32.exe 2876 wmpdtk32.exe 2876 wmpdtk32.exe 372 wmpdtk32.exe 372 wmpdtk32.exe 860 wmpdtk32.exe 860 wmpdtk32.exe 2804 wmpdtk32.exe 2804 wmpdtk32.exe 2936 wmpdtk32.exe 2936 wmpdtk32.exe 2788 wmpdtk32.exe 2788 wmpdtk32.exe 2232 wmpdtk32.exe 2232 wmpdtk32.exe -
Maps connected drives based on registry 3 TTPs 34 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe -
Drops file in System32 directory 50 IoCs
description ioc Process File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe -
Suspicious use of SetThreadContext 17 IoCs
description pid Process procid_target PID 3012 set thread context of 2512 3012 f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe 30 PID 1508 set thread context of 2264 1508 wmpdtk32.exe 32 PID 2760 set thread context of 2784 2760 wmpdtk32.exe 35 PID 768 set thread context of 2796 768 wmpdtk32.exe 37 PID 2656 set thread context of 1252 2656 wmpdtk32.exe 39 PID 2888 set thread context of 2476 2888 wmpdtk32.exe 41 PID 760 set thread context of 1552 760 wmpdtk32.exe 43 PID 1016 set thread context of 1668 1016 wmpdtk32.exe 45 PID 2208 set thread context of 2160 2208 wmpdtk32.exe 47 PID 2288 set thread context of 2176 2288 wmpdtk32.exe 49 PID 1712 set thread context of 2560 1712 wmpdtk32.exe 51 PID 2852 set thread context of 1912 2852 wmpdtk32.exe 53 PID 2892 set thread context of 1892 2892 wmpdtk32.exe 55 PID 2876 set thread context of 372 2876 wmpdtk32.exe 57 PID 860 set thread context of 2804 860 wmpdtk32.exe 59 PID 2936 set thread context of 2788 2936 wmpdtk32.exe 61 PID 2232 set thread context of 2072 2232 wmpdtk32.exe 63 -
resource yara_rule behavioral1/memory/2512-4-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2512-6-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2512-3-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2512-2-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2512-7-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2512-8-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2512-9-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2512-33-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2264-36-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2784-51-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2264-54-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2796-71-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2784-74-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2796-92-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/1252-111-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2476-107-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2476-130-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/1552-125-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/1668-145-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/1552-149-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2160-165-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/1668-168-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2160-186-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2560-197-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2176-200-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2560-212-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/1892-221-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/1912-225-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/1892-228-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/372-237-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/372-250-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2804-262-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2072-272-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2788-275-0x0000000000400000-0x000000000045A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 33 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 2512 f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe 2512 f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe 2264 wmpdtk32.exe 2264 wmpdtk32.exe 2784 wmpdtk32.exe 2784 wmpdtk32.exe 2796 wmpdtk32.exe 2796 wmpdtk32.exe 1252 wmpdtk32.exe 1252 wmpdtk32.exe 2476 wmpdtk32.exe 2476 wmpdtk32.exe 1552 wmpdtk32.exe 1552 wmpdtk32.exe 1668 wmpdtk32.exe 1668 wmpdtk32.exe 2160 wmpdtk32.exe 2160 wmpdtk32.exe 2176 wmpdtk32.exe 2176 wmpdtk32.exe 2560 wmpdtk32.exe 2560 wmpdtk32.exe 1912 wmpdtk32.exe 1912 wmpdtk32.exe 1892 wmpdtk32.exe 1892 wmpdtk32.exe 372 wmpdtk32.exe 372 wmpdtk32.exe 2804 wmpdtk32.exe 2804 wmpdtk32.exe 2788 wmpdtk32.exe 2788 wmpdtk32.exe 2072 wmpdtk32.exe 2072 wmpdtk32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2512 3012 f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe 30 PID 3012 wrote to memory of 2512 3012 f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe 30 PID 3012 wrote to memory of 2512 3012 f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe 30 PID 3012 wrote to memory of 2512 3012 f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe 30 PID 3012 wrote to memory of 2512 3012 f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe 30 PID 3012 wrote to memory of 2512 3012 f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe 30 PID 3012 wrote to memory of 2512 3012 f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe 30 PID 2512 wrote to memory of 1508 2512 f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe 31 PID 2512 wrote to memory of 1508 2512 f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe 31 PID 2512 wrote to memory of 1508 2512 f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe 31 PID 2512 wrote to memory of 1508 2512 f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe 31 PID 1508 wrote to memory of 2264 1508 wmpdtk32.exe 32 PID 1508 wrote to memory of 2264 1508 wmpdtk32.exe 32 PID 1508 wrote to memory of 2264 1508 wmpdtk32.exe 32 PID 1508 wrote to memory of 2264 1508 wmpdtk32.exe 32 PID 1508 wrote to memory of 2264 1508 wmpdtk32.exe 32 PID 1508 wrote to memory of 2264 1508 wmpdtk32.exe 32 PID 1508 wrote to memory of 2264 1508 wmpdtk32.exe 32 PID 2264 wrote to memory of 2760 2264 wmpdtk32.exe 34 PID 2264 wrote to memory of 2760 2264 wmpdtk32.exe 34 PID 2264 wrote to memory of 2760 2264 wmpdtk32.exe 34 PID 2264 wrote to memory of 2760 2264 wmpdtk32.exe 34 PID 2760 wrote to memory of 2784 2760 wmpdtk32.exe 35 PID 2760 wrote to memory of 2784 2760 wmpdtk32.exe 35 PID 2760 wrote to memory of 2784 2760 wmpdtk32.exe 35 PID 2760 wrote to memory of 2784 2760 wmpdtk32.exe 35 PID 2760 wrote to memory of 2784 2760 wmpdtk32.exe 35 PID 2760 wrote to memory of 2784 2760 wmpdtk32.exe 35 PID 2760 wrote to memory of 2784 2760 wmpdtk32.exe 35 PID 2784 wrote to memory of 768 2784 wmpdtk32.exe 36 PID 2784 wrote to memory of 768 2784 wmpdtk32.exe 36 PID 2784 wrote to memory of 768 2784 wmpdtk32.exe 36 PID 2784 wrote to memory of 768 2784 wmpdtk32.exe 36 PID 768 wrote to memory of 2796 768 wmpdtk32.exe 37 PID 768 wrote to memory of 2796 768 wmpdtk32.exe 37 PID 768 wrote to memory of 2796 768 wmpdtk32.exe 37 PID 768 wrote to memory of 2796 768 wmpdtk32.exe 37 PID 768 wrote to memory of 2796 768 wmpdtk32.exe 37 PID 768 wrote to memory of 2796 768 wmpdtk32.exe 37 PID 768 wrote to memory of 2796 768 wmpdtk32.exe 37 PID 2796 wrote to memory of 2656 2796 wmpdtk32.exe 38 PID 2796 wrote to memory of 2656 2796 wmpdtk32.exe 38 PID 2796 wrote to memory of 2656 2796 wmpdtk32.exe 38 PID 2796 wrote to memory of 2656 2796 wmpdtk32.exe 38 PID 2656 wrote to memory of 1252 2656 wmpdtk32.exe 39 PID 2656 wrote to memory of 1252 2656 wmpdtk32.exe 39 PID 2656 wrote to memory of 1252 2656 wmpdtk32.exe 39 PID 2656 wrote to memory of 1252 2656 wmpdtk32.exe 39 PID 2656 wrote to memory of 1252 2656 wmpdtk32.exe 39 PID 2656 wrote to memory of 1252 2656 wmpdtk32.exe 39 PID 2656 wrote to memory of 1252 2656 wmpdtk32.exe 39 PID 1252 wrote to memory of 2888 1252 wmpdtk32.exe 40 PID 1252 wrote to memory of 2888 1252 wmpdtk32.exe 40 PID 1252 wrote to memory of 2888 1252 wmpdtk32.exe 40 PID 1252 wrote to memory of 2888 1252 wmpdtk32.exe 40 PID 2888 wrote to memory of 2476 2888 wmpdtk32.exe 41 PID 2888 wrote to memory of 2476 2888 wmpdtk32.exe 41 PID 2888 wrote to memory of 2476 2888 wmpdtk32.exe 41 PID 2888 wrote to memory of 2476 2888 wmpdtk32.exe 41 PID 2888 wrote to memory of 2476 2888 wmpdtk32.exe 41 PID 2888 wrote to memory of 2476 2888 wmpdtk32.exe 41 PID 2888 wrote to memory of 2476 2888 wmpdtk32.exe 41 PID 2476 wrote to memory of 760 2476 wmpdtk32.exe 42 PID 2476 wrote to memory of 760 2476 wmpdtk32.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Users\Admin\AppData\Local\Temp\F2BD14~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Users\Admin\AppData\Local\Temp\F2BD14~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:760 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1552 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1016 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1668 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2208 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2160 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2288 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2176 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1712 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2560 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2852 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1912 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2892 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1892 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2876 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:372 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:860 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2804 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2936 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2788 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe33⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2232 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2072
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
141KB
MD5f2bd14f1d5fbdab0fe21832ba8aec524
SHA17290ed270c3db66c72cf23bffba7955183a7272c
SHA256e2051785e5c2f3ba3bc05aec0442af3b899246ecc3dc836b8a187f91d986c33e
SHA512c8f761359be804b4a76df9a07e4ec90bb9188d881fabacd90fce91bf18dc9812d8799bfb4e519fcb31ee53f768373a2dc5b99ab779a9634507ce1b473a67852d