Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-09-2024 18:44
Static task
static1
Behavioral task
behavioral1
Sample
f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe
-
Size
210KB
-
MD5
f2e55884d3685ae6063a315098f65982
-
SHA1
5c02411e8f14992498b47989161180d2b4b3f32d
-
SHA256
f4ddad104cab738312f1f43d4e75cdf92d4519e6425d88f34bd807df4e947f1b
-
SHA512
5c6ab5ca5ab1dc3dcf10e48fdcbf35e4fab444b3d9b8663939edfd4f5a2236ff2aaf56ed435a7d6841f0431e5d47b4a16ba6f805ed59493d5129457a2072f748
-
SSDEEP
3072:4s+zP+9GvNntCSJZ0xWizuQKw54qP1xdA1dJUJTPaiFyP7/owg4:4sMmGltCSJcVK64+3dpPEvg4
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2636 wmpsd4.exe -
Executes dropped EXE 22 IoCs
pid Process 2748 wmpsd4.exe 2636 wmpsd4.exe 2976 wmpsd4.exe 1092 wmpsd4.exe 2824 wmpsd4.exe 1816 wmpsd4.exe 640 wmpsd4.exe 1192 wmpsd4.exe 1776 wmpsd4.exe 3052 wmpsd4.exe 600 wmpsd4.exe 2140 wmpsd4.exe 2268 wmpsd4.exe 944 wmpsd4.exe 3032 wmpsd4.exe 892 wmpsd4.exe 2592 wmpsd4.exe 992 wmpsd4.exe 2960 wmpsd4.exe 2516 wmpsd4.exe 3004 wmpsd4.exe 2768 wmpsd4.exe -
Loads dropped DLL 22 IoCs
pid Process 2292 f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe 2292 f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe 2636 wmpsd4.exe 2636 wmpsd4.exe 1092 wmpsd4.exe 1092 wmpsd4.exe 1816 wmpsd4.exe 1816 wmpsd4.exe 1192 wmpsd4.exe 1192 wmpsd4.exe 3052 wmpsd4.exe 3052 wmpsd4.exe 2140 wmpsd4.exe 2140 wmpsd4.exe 944 wmpsd4.exe 944 wmpsd4.exe 892 wmpsd4.exe 892 wmpsd4.exe 992 wmpsd4.exe 992 wmpsd4.exe 2516 wmpsd4.exe 2516 wmpsd4.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wmpsd4.exe wmpsd4.exe File created C:\Windows\SysWOW64\wmpsd4.exe wmpsd4.exe File created C:\Windows\SysWOW64\wmpsd4.exe wmpsd4.exe File opened for modification C:\Windows\SysWOW64\wmpsd4.exe wmpsd4.exe File created C:\Windows\SysWOW64\wmpsd4.exe wmpsd4.exe File created C:\Windows\SysWOW64\wmpsd4.exe wmpsd4.exe File opened for modification C:\Windows\SysWOW64\wmpsd4.exe wmpsd4.exe File opened for modification C:\Windows\SysWOW64\wmpsd4.exe wmpsd4.exe File created C:\Windows\SysWOW64\wmpsd4.exe wmpsd4.exe File created C:\Windows\SysWOW64\wmpsd4.exe wmpsd4.exe File opened for modification C:\Windows\SysWOW64\wmpsd4.exe wmpsd4.exe File opened for modification C:\Windows\SysWOW64\wmpsd4.exe wmpsd4.exe File opened for modification C:\Windows\SysWOW64\wmpsd4.exe wmpsd4.exe File opened for modification C:\Windows\SysWOW64\wmpsd4.exe wmpsd4.exe File created C:\Windows\SysWOW64\wmpsd4.exe wmpsd4.exe File created C:\Windows\SysWOW64\wmpsd4.exe f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe File created C:\Windows\SysWOW64\wmpsd4.exe wmpsd4.exe File created C:\Windows\SysWOW64\wmpsd4.exe wmpsd4.exe File opened for modification C:\Windows\SysWOW64\wmpsd4.exe wmpsd4.exe File created C:\Windows\SysWOW64\wmpsd4.exe wmpsd4.exe File opened for modification C:\Windows\SysWOW64\wmpsd4.exe wmpsd4.exe File opened for modification C:\Windows\SysWOW64\wmpsd4.exe f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe -
Suspicious use of SetThreadContext 12 IoCs
description pid Process procid_target PID 1860 set thread context of 2292 1860 f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe 28 PID 2748 set thread context of 2636 2748 wmpsd4.exe 30 PID 2976 set thread context of 1092 2976 wmpsd4.exe 34 PID 2824 set thread context of 1816 2824 wmpsd4.exe 36 PID 640 set thread context of 1192 640 wmpsd4.exe 38 PID 1776 set thread context of 3052 1776 wmpsd4.exe 40 PID 600 set thread context of 2140 600 wmpsd4.exe 42 PID 2268 set thread context of 944 2268 wmpsd4.exe 44 PID 3032 set thread context of 892 3032 wmpsd4.exe 46 PID 2592 set thread context of 992 2592 wmpsd4.exe 48 PID 2960 set thread context of 2516 2960 wmpsd4.exe 50 PID 3004 set thread context of 2768 3004 wmpsd4.exe 52 -
resource yara_rule behavioral1/memory/2292-4-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2292-15-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2292-13-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2292-12-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2292-2-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2292-7-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2292-14-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2292-29-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2636-39-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2636-41-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2636-42-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2636-40-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2636-48-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1092-61-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1092-68-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1816-78-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1816-88-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1192-100-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1192-107-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/3052-119-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/3052-127-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2140-139-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2140-146-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/944-158-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/944-165-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/892-175-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/892-185-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/992-197-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/992-204-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2516-216-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2516-223-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2768-233-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd4.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2292 f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe 2636 wmpsd4.exe 1092 wmpsd4.exe 1816 wmpsd4.exe 1192 wmpsd4.exe 3052 wmpsd4.exe 2140 wmpsd4.exe 944 wmpsd4.exe 892 wmpsd4.exe 992 wmpsd4.exe 2516 wmpsd4.exe 2768 wmpsd4.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1860 wrote to memory of 2292 1860 f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe 28 PID 1860 wrote to memory of 2292 1860 f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe 28 PID 1860 wrote to memory of 2292 1860 f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe 28 PID 1860 wrote to memory of 2292 1860 f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe 28 PID 1860 wrote to memory of 2292 1860 f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe 28 PID 1860 wrote to memory of 2292 1860 f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe 28 PID 1860 wrote to memory of 2292 1860 f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe 28 PID 1860 wrote to memory of 2292 1860 f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe 28 PID 2292 wrote to memory of 2748 2292 f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe 29 PID 2292 wrote to memory of 2748 2292 f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe 29 PID 2292 wrote to memory of 2748 2292 f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe 29 PID 2292 wrote to memory of 2748 2292 f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe 29 PID 2748 wrote to memory of 2636 2748 wmpsd4.exe 30 PID 2748 wrote to memory of 2636 2748 wmpsd4.exe 30 PID 2748 wrote to memory of 2636 2748 wmpsd4.exe 30 PID 2748 wrote to memory of 2636 2748 wmpsd4.exe 30 PID 2748 wrote to memory of 2636 2748 wmpsd4.exe 30 PID 2748 wrote to memory of 2636 2748 wmpsd4.exe 30 PID 2748 wrote to memory of 2636 2748 wmpsd4.exe 30 PID 2748 wrote to memory of 2636 2748 wmpsd4.exe 30 PID 2636 wrote to memory of 2976 2636 wmpsd4.exe 31 PID 2636 wrote to memory of 2976 2636 wmpsd4.exe 31 PID 2636 wrote to memory of 2976 2636 wmpsd4.exe 31 PID 2636 wrote to memory of 2976 2636 wmpsd4.exe 31 PID 2976 wrote to memory of 1092 2976 wmpsd4.exe 34 PID 2976 wrote to memory of 1092 2976 wmpsd4.exe 34 PID 2976 wrote to memory of 1092 2976 wmpsd4.exe 34 PID 2976 wrote to memory of 1092 2976 wmpsd4.exe 34 PID 2976 wrote to memory of 1092 2976 wmpsd4.exe 34 PID 2976 wrote to memory of 1092 2976 wmpsd4.exe 34 PID 2976 wrote to memory of 1092 2976 wmpsd4.exe 34 PID 2976 wrote to memory of 1092 2976 wmpsd4.exe 34 PID 1092 wrote to memory of 2824 1092 wmpsd4.exe 35 PID 1092 wrote to memory of 2824 1092 wmpsd4.exe 35 PID 1092 wrote to memory of 2824 1092 wmpsd4.exe 35 PID 1092 wrote to memory of 2824 1092 wmpsd4.exe 35 PID 2824 wrote to memory of 1816 2824 wmpsd4.exe 36 PID 2824 wrote to memory of 1816 2824 wmpsd4.exe 36 PID 2824 wrote to memory of 1816 2824 wmpsd4.exe 36 PID 2824 wrote to memory of 1816 2824 wmpsd4.exe 36 PID 2824 wrote to memory of 1816 2824 wmpsd4.exe 36 PID 2824 wrote to memory of 1816 2824 wmpsd4.exe 36 PID 2824 wrote to memory of 1816 2824 wmpsd4.exe 36 PID 2824 wrote to memory of 1816 2824 wmpsd4.exe 36 PID 1816 wrote to memory of 640 1816 wmpsd4.exe 37 PID 1816 wrote to memory of 640 1816 wmpsd4.exe 37 PID 1816 wrote to memory of 640 1816 wmpsd4.exe 37 PID 1816 wrote to memory of 640 1816 wmpsd4.exe 37 PID 640 wrote to memory of 1192 640 wmpsd4.exe 38 PID 640 wrote to memory of 1192 640 wmpsd4.exe 38 PID 640 wrote to memory of 1192 640 wmpsd4.exe 38 PID 640 wrote to memory of 1192 640 wmpsd4.exe 38 PID 640 wrote to memory of 1192 640 wmpsd4.exe 38 PID 640 wrote to memory of 1192 640 wmpsd4.exe 38 PID 640 wrote to memory of 1192 640 wmpsd4.exe 38 PID 640 wrote to memory of 1192 640 wmpsd4.exe 38 PID 1192 wrote to memory of 1776 1192 wmpsd4.exe 39 PID 1192 wrote to memory of 1776 1192 wmpsd4.exe 39 PID 1192 wrote to memory of 1776 1192 wmpsd4.exe 39 PID 1192 wrote to memory of 1776 1192 wmpsd4.exe 39 PID 1776 wrote to memory of 3052 1776 wmpsd4.exe 40 PID 1776 wrote to memory of 3052 1776 wmpsd4.exe 40 PID 1776 wrote to memory of 3052 1776 wmpsd4.exe 40 PID 1776 wrote to memory of 3052 1776 wmpsd4.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\wmpsd4.exe"C:\Windows\system32\wmpsd4.exe" C:\Users\Admin\AppData\Local\Temp\F2E558~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\wmpsd4.exe"C:\Windows\system32\wmpsd4.exe" C:\Users\Admin\AppData\Local\Temp\F2E558~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\wmpsd4.exe"C:\Windows\system32\wmpsd4.exe" C:\Windows\SysWOW64\wmpsd4.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\wmpsd4.exe"C:\Windows\system32\wmpsd4.exe" C:\Windows\SysWOW64\wmpsd4.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\wmpsd4.exe"C:\Windows\system32\wmpsd4.exe" C:\Windows\SysWOW64\wmpsd4.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\wmpsd4.exe"C:\Windows\system32\wmpsd4.exe" C:\Windows\SysWOW64\wmpsd4.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\wmpsd4.exe"C:\Windows\system32\wmpsd4.exe" C:\Windows\SysWOW64\wmpsd4.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\wmpsd4.exe"C:\Windows\system32\wmpsd4.exe" C:\Windows\SysWOW64\wmpsd4.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\wmpsd4.exe"C:\Windows\system32\wmpsd4.exe" C:\Windows\SysWOW64\wmpsd4.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\wmpsd4.exe"C:\Windows\system32\wmpsd4.exe" C:\Windows\SysWOW64\wmpsd4.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3052 -
C:\Windows\SysWOW64\wmpsd4.exe"C:\Windows\system32\wmpsd4.exe" C:\Windows\SysWOW64\wmpsd4.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:600 -
C:\Windows\SysWOW64\wmpsd4.exe"C:\Windows\system32\wmpsd4.exe" C:\Windows\SysWOW64\wmpsd4.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2140 -
C:\Windows\SysWOW64\wmpsd4.exe"C:\Windows\system32\wmpsd4.exe" C:\Windows\SysWOW64\wmpsd4.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2268 -
C:\Windows\SysWOW64\wmpsd4.exe"C:\Windows\system32\wmpsd4.exe" C:\Windows\SysWOW64\wmpsd4.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:944 -
C:\Windows\SysWOW64\wmpsd4.exe"C:\Windows\system32\wmpsd4.exe" C:\Windows\SysWOW64\wmpsd4.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3032 -
C:\Windows\SysWOW64\wmpsd4.exe"C:\Windows\system32\wmpsd4.exe" C:\Windows\SysWOW64\wmpsd4.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:892 -
C:\Windows\SysWOW64\wmpsd4.exe"C:\Windows\system32\wmpsd4.exe" C:\Windows\SysWOW64\wmpsd4.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2592 -
C:\Windows\SysWOW64\wmpsd4.exe"C:\Windows\system32\wmpsd4.exe" C:\Windows\SysWOW64\wmpsd4.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:992 -
C:\Windows\SysWOW64\wmpsd4.exe"C:\Windows\system32\wmpsd4.exe" C:\Windows\SysWOW64\wmpsd4.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2960 -
C:\Windows\SysWOW64\wmpsd4.exe"C:\Windows\system32\wmpsd4.exe" C:\Windows\SysWOW64\wmpsd4.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2516 -
C:\Windows\SysWOW64\wmpsd4.exe"C:\Windows\system32\wmpsd4.exe" C:\Windows\SysWOW64\wmpsd4.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3004 -
C:\Windows\SysWOW64\wmpsd4.exe"C:\Windows\system32\wmpsd4.exe" C:\Windows\SysWOW64\wmpsd4.exe24⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2768
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD5f2e55884d3685ae6063a315098f65982
SHA15c02411e8f14992498b47989161180d2b4b3f32d
SHA256f4ddad104cab738312f1f43d4e75cdf92d4519e6425d88f34bd807df4e947f1b
SHA5125c6ab5ca5ab1dc3dcf10e48fdcbf35e4fab444b3d9b8663939edfd4f5a2236ff2aaf56ed435a7d6841f0431e5d47b4a16ba6f805ed59493d5129457a2072f748