Analysis
-
max time kernel
150s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-09-2024 17:09
Static task
static1
Behavioral task
behavioral1
Sample
f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe
-
Size
141KB
-
MD5
f2bd14f1d5fbdab0fe21832ba8aec524
-
SHA1
7290ed270c3db66c72cf23bffba7955183a7272c
-
SHA256
e2051785e5c2f3ba3bc05aec0442af3b899246ecc3dc836b8a187f91d986c33e
-
SHA512
c8f761359be804b4a76df9a07e4ec90bb9188d881fabacd90fce91bf18dc9812d8799bfb4e519fcb31ee53f768373a2dc5b99ab779a9634507ce1b473a67852d
-
SSDEEP
3072:BxmEvcelB7KX/t/6bOe1075aNFIULlAxCyWmzvStMEGt3NxhBenjYDr:e27e1c0daNFIa26mzvSq3NsYv
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings 2 TTPs 16 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wmpdtk32.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wmpdtk32.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wmpdtk32.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wmpdtk32.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wmpdtk32.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wmpdtk32.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wmpdtk32.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wmpdtk32.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wmpdtk32.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wmpdtk32.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wmpdtk32.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wmpdtk32.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wmpdtk32.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wmpdtk32.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wmpdtk32.exe -
Deletes itself 1 IoCs
pid Process 1324 wmpdtk32.exe -
Executes dropped EXE 32 IoCs
pid Process 2824 wmpdtk32.exe 1324 wmpdtk32.exe 4076 wmpdtk32.exe 4584 wmpdtk32.exe 1180 wmpdtk32.exe 4872 wmpdtk32.exe 3292 wmpdtk32.exe 3784 wmpdtk32.exe 4448 wmpdtk32.exe 4616 wmpdtk32.exe 2104 wmpdtk32.exe 552 wmpdtk32.exe 1068 wmpdtk32.exe 1588 wmpdtk32.exe 728 wmpdtk32.exe 5016 wmpdtk32.exe 3704 wmpdtk32.exe 388 wmpdtk32.exe 4000 wmpdtk32.exe 4876 wmpdtk32.exe 4836 wmpdtk32.exe 468 wmpdtk32.exe 376 wmpdtk32.exe 3600 wmpdtk32.exe 3984 wmpdtk32.exe 1716 wmpdtk32.exe 2820 wmpdtk32.exe 4408 wmpdtk32.exe 2300 wmpdtk32.exe 3824 wmpdtk32.exe 960 wmpdtk32.exe 2136 wmpdtk32.exe -
Maps connected drives based on registry 3 TTPs 32 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtk32.exe -
Drops file in System32 directory 48 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe File created C:\Windows\SysWOW64\wmpdtk32.exe wmpdtk32.exe -
Suspicious use of SetThreadContext 17 IoCs
description pid Process procid_target PID 3368 set thread context of 4516 3368 f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe 82 PID 2824 set thread context of 1324 2824 wmpdtk32.exe 91 PID 4076 set thread context of 4584 4076 wmpdtk32.exe 93 PID 1180 set thread context of 4872 1180 wmpdtk32.exe 95 PID 3292 set thread context of 3784 3292 wmpdtk32.exe 99 PID 4448 set thread context of 4616 4448 wmpdtk32.exe 101 PID 2104 set thread context of 552 2104 wmpdtk32.exe 103 PID 1068 set thread context of 1588 1068 wmpdtk32.exe 105 PID 728 set thread context of 5016 728 wmpdtk32.exe 107 PID 3704 set thread context of 388 3704 wmpdtk32.exe 109 PID 4000 set thread context of 4876 4000 wmpdtk32.exe 111 PID 4836 set thread context of 468 4836 wmpdtk32.exe 113 PID 376 set thread context of 3600 376 wmpdtk32.exe 115 PID 3984 set thread context of 1716 3984 wmpdtk32.exe 117 PID 2820 set thread context of 4408 2820 wmpdtk32.exe 119 PID 2300 set thread context of 3824 2300 wmpdtk32.exe 121 PID 960 set thread context of 2136 960 wmpdtk32.exe 123 -
resource yara_rule behavioral2/memory/4516-0-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4516-2-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4516-3-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4516-4-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4516-31-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1324-44-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4516-45-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1324-47-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1324-54-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4584-59-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4584-62-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4872-67-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4872-68-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/3784-75-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/3784-78-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4616-83-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4616-87-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/552-93-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/552-96-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1588-101-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1588-104-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/388-114-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/5016-108-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/388-118-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/388-121-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4876-124-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/468-129-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/468-128-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/468-134-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/468-139-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/3600-143-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/3600-148-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1716-152-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1716-157-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4408-161-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4408-166-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/3824-170-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/3824-175-0x0000000000400000-0x000000000045A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 33 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtk32.exe -
Modifies registry class 16 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtk32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4516 f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe 4516 f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe 4516 f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe 4516 f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe 1324 wmpdtk32.exe 1324 wmpdtk32.exe 1324 wmpdtk32.exe 1324 wmpdtk32.exe 4584 wmpdtk32.exe 4584 wmpdtk32.exe 4584 wmpdtk32.exe 4584 wmpdtk32.exe 4872 wmpdtk32.exe 4872 wmpdtk32.exe 4872 wmpdtk32.exe 4872 wmpdtk32.exe 3784 wmpdtk32.exe 3784 wmpdtk32.exe 3784 wmpdtk32.exe 3784 wmpdtk32.exe 4616 wmpdtk32.exe 4616 wmpdtk32.exe 4616 wmpdtk32.exe 4616 wmpdtk32.exe 552 wmpdtk32.exe 552 wmpdtk32.exe 552 wmpdtk32.exe 552 wmpdtk32.exe 1588 wmpdtk32.exe 1588 wmpdtk32.exe 1588 wmpdtk32.exe 1588 wmpdtk32.exe 5016 wmpdtk32.exe 5016 wmpdtk32.exe 5016 wmpdtk32.exe 5016 wmpdtk32.exe 388 wmpdtk32.exe 388 wmpdtk32.exe 388 wmpdtk32.exe 388 wmpdtk32.exe 4876 wmpdtk32.exe 4876 wmpdtk32.exe 4876 wmpdtk32.exe 4876 wmpdtk32.exe 468 wmpdtk32.exe 468 wmpdtk32.exe 468 wmpdtk32.exe 468 wmpdtk32.exe 3600 wmpdtk32.exe 3600 wmpdtk32.exe 3600 wmpdtk32.exe 3600 wmpdtk32.exe 1716 wmpdtk32.exe 1716 wmpdtk32.exe 1716 wmpdtk32.exe 1716 wmpdtk32.exe 4408 wmpdtk32.exe 4408 wmpdtk32.exe 4408 wmpdtk32.exe 4408 wmpdtk32.exe 3824 wmpdtk32.exe 3824 wmpdtk32.exe 3824 wmpdtk32.exe 3824 wmpdtk32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3368 wrote to memory of 4516 3368 f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe 82 PID 3368 wrote to memory of 4516 3368 f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe 82 PID 3368 wrote to memory of 4516 3368 f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe 82 PID 3368 wrote to memory of 4516 3368 f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe 82 PID 3368 wrote to memory of 4516 3368 f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe 82 PID 3368 wrote to memory of 4516 3368 f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe 82 PID 3368 wrote to memory of 4516 3368 f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe 82 PID 4516 wrote to memory of 2824 4516 f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe 90 PID 4516 wrote to memory of 2824 4516 f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe 90 PID 4516 wrote to memory of 2824 4516 f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe 90 PID 2824 wrote to memory of 1324 2824 wmpdtk32.exe 91 PID 2824 wrote to memory of 1324 2824 wmpdtk32.exe 91 PID 2824 wrote to memory of 1324 2824 wmpdtk32.exe 91 PID 2824 wrote to memory of 1324 2824 wmpdtk32.exe 91 PID 2824 wrote to memory of 1324 2824 wmpdtk32.exe 91 PID 2824 wrote to memory of 1324 2824 wmpdtk32.exe 91 PID 2824 wrote to memory of 1324 2824 wmpdtk32.exe 91 PID 1324 wrote to memory of 4076 1324 wmpdtk32.exe 92 PID 1324 wrote to memory of 4076 1324 wmpdtk32.exe 92 PID 1324 wrote to memory of 4076 1324 wmpdtk32.exe 92 PID 4076 wrote to memory of 4584 4076 wmpdtk32.exe 93 PID 4076 wrote to memory of 4584 4076 wmpdtk32.exe 93 PID 4076 wrote to memory of 4584 4076 wmpdtk32.exe 93 PID 4076 wrote to memory of 4584 4076 wmpdtk32.exe 93 PID 4076 wrote to memory of 4584 4076 wmpdtk32.exe 93 PID 4076 wrote to memory of 4584 4076 wmpdtk32.exe 93 PID 4076 wrote to memory of 4584 4076 wmpdtk32.exe 93 PID 4584 wrote to memory of 1180 4584 wmpdtk32.exe 94 PID 4584 wrote to memory of 1180 4584 wmpdtk32.exe 94 PID 4584 wrote to memory of 1180 4584 wmpdtk32.exe 94 PID 1180 wrote to memory of 4872 1180 wmpdtk32.exe 95 PID 1180 wrote to memory of 4872 1180 wmpdtk32.exe 95 PID 1180 wrote to memory of 4872 1180 wmpdtk32.exe 95 PID 1180 wrote to memory of 4872 1180 wmpdtk32.exe 95 PID 1180 wrote to memory of 4872 1180 wmpdtk32.exe 95 PID 1180 wrote to memory of 4872 1180 wmpdtk32.exe 95 PID 1180 wrote to memory of 4872 1180 wmpdtk32.exe 95 PID 4872 wrote to memory of 3292 4872 wmpdtk32.exe 98 PID 4872 wrote to memory of 3292 4872 wmpdtk32.exe 98 PID 4872 wrote to memory of 3292 4872 wmpdtk32.exe 98 PID 3292 wrote to memory of 3784 3292 wmpdtk32.exe 99 PID 3292 wrote to memory of 3784 3292 wmpdtk32.exe 99 PID 3292 wrote to memory of 3784 3292 wmpdtk32.exe 99 PID 3292 wrote to memory of 3784 3292 wmpdtk32.exe 99 PID 3292 wrote to memory of 3784 3292 wmpdtk32.exe 99 PID 3292 wrote to memory of 3784 3292 wmpdtk32.exe 99 PID 3292 wrote to memory of 3784 3292 wmpdtk32.exe 99 PID 3784 wrote to memory of 4448 3784 wmpdtk32.exe 100 PID 3784 wrote to memory of 4448 3784 wmpdtk32.exe 100 PID 3784 wrote to memory of 4448 3784 wmpdtk32.exe 100 PID 4448 wrote to memory of 4616 4448 wmpdtk32.exe 101 PID 4448 wrote to memory of 4616 4448 wmpdtk32.exe 101 PID 4448 wrote to memory of 4616 4448 wmpdtk32.exe 101 PID 4448 wrote to memory of 4616 4448 wmpdtk32.exe 101 PID 4448 wrote to memory of 4616 4448 wmpdtk32.exe 101 PID 4448 wrote to memory of 4616 4448 wmpdtk32.exe 101 PID 4448 wrote to memory of 4616 4448 wmpdtk32.exe 101 PID 4616 wrote to memory of 2104 4616 wmpdtk32.exe 102 PID 4616 wrote to memory of 2104 4616 wmpdtk32.exe 102 PID 4616 wrote to memory of 2104 4616 wmpdtk32.exe 102 PID 2104 wrote to memory of 552 2104 wmpdtk32.exe 103 PID 2104 wrote to memory of 552 2104 wmpdtk32.exe 103 PID 2104 wrote to memory of 552 2104 wmpdtk32.exe 103 PID 2104 wrote to memory of 552 2104 wmpdtk32.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Users\Admin\AppData\Local\Temp\F2BD14~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Users\Admin\AppData\Local\Temp\F2BD14~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:552 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1068 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1588 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:728 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5016 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3704 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:388 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4000 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4876 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4836 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:468 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:376 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3600 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3984 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1716 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2820 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4408 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2300 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe32⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3824 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:960 -
C:\Windows\SysWOW64\wmpdtk32.exe"C:\Windows\system32\wmpdtk32.exe" C:\Windows\SysWOW64\wmpdtk32.exe34⤵
- Executes dropped EXE
PID:2136
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
141KB
MD5f2bd14f1d5fbdab0fe21832ba8aec524
SHA17290ed270c3db66c72cf23bffba7955183a7272c
SHA256e2051785e5c2f3ba3bc05aec0442af3b899246ecc3dc836b8a187f91d986c33e
SHA512c8f761359be804b4a76df9a07e4ec90bb9188d881fabacd90fce91bf18dc9812d8799bfb4e519fcb31ee53f768373a2dc5b99ab779a9634507ce1b473a67852d