Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-09-2024 18:44
Static task
static1
Behavioral task
behavioral1
Sample
f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe
-
Size
210KB
-
MD5
f2e55884d3685ae6063a315098f65982
-
SHA1
5c02411e8f14992498b47989161180d2b4b3f32d
-
SHA256
f4ddad104cab738312f1f43d4e75cdf92d4519e6425d88f34bd807df4e947f1b
-
SHA512
5c6ab5ca5ab1dc3dcf10e48fdcbf35e4fab444b3d9b8663939edfd4f5a2236ff2aaf56ed435a7d6841f0431e5d47b4a16ba6f805ed59493d5129457a2072f748
-
SSDEEP
3072:4s+zP+9GvNntCSJZ0xWizuQKw54qP1xdA1dJUJTPaiFyP7/owg4:4sMmGltCSJcVK64+3dpPEvg4
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings 2 TTPs 9 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation wmpsd4.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation wmpsd4.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation wmpsd4.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation wmpsd4.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation wmpsd4.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation wmpsd4.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation wmpsd4.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation wmpsd4.exe -
Deletes itself 1 IoCs
pid Process 3692 wmpsd4.exe -
Executes dropped EXE 17 IoCs
pid Process 5104 wmpsd4.exe 3692 wmpsd4.exe 3816 wmpsd4.exe 3936 wmpsd4.exe 4808 wmpsd4.exe 768 wmpsd4.exe 1456 wmpsd4.exe 2336 wmpsd4.exe 216 wmpsd4.exe 696 wmpsd4.exe 3688 wmpsd4.exe 4520 wmpsd4.exe 4436 wmpsd4.exe 2892 wmpsd4.exe 3720 wmpsd4.exe 1852 wmpsd4.exe 3208 wmpsd4.exe -
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wmpsd4.exe wmpsd4.exe File created C:\Windows\SysWOW64\wmpsd4.exe wmpsd4.exe File opened for modification C:\Windows\SysWOW64\wmpsd4.exe wmpsd4.exe File created C:\Windows\SysWOW64\wmpsd4.exe wmpsd4.exe File created C:\Windows\SysWOW64\wmpsd4.exe f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe File created C:\Windows\SysWOW64\wmpsd4.exe wmpsd4.exe File created C:\Windows\SysWOW64\wmpsd4.exe wmpsd4.exe File opened for modification C:\Windows\SysWOW64\wmpsd4.exe wmpsd4.exe File opened for modification C:\Windows\SysWOW64\wmpsd4.exe wmpsd4.exe File opened for modification C:\Windows\SysWOW64\wmpsd4.exe wmpsd4.exe File created C:\Windows\SysWOW64\wmpsd4.exe wmpsd4.exe File opened for modification C:\Windows\SysWOW64\wmpsd4.exe wmpsd4.exe File opened for modification C:\Windows\SysWOW64\wmpsd4.exe wmpsd4.exe File created C:\Windows\SysWOW64\wmpsd4.exe wmpsd4.exe File created C:\Windows\SysWOW64\wmpsd4.exe wmpsd4.exe File opened for modification C:\Windows\SysWOW64\wmpsd4.exe f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wmpsd4.exe wmpsd4.exe File created C:\Windows\SysWOW64\wmpsd4.exe wmpsd4.exe -
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 2036 set thread context of 644 2036 f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe 98 PID 5104 set thread context of 3692 5104 wmpsd4.exe 101 PID 3816 set thread context of 3936 3816 wmpsd4.exe 104 PID 4808 set thread context of 768 4808 wmpsd4.exe 107 PID 1456 set thread context of 2336 1456 wmpsd4.exe 109 PID 216 set thread context of 696 216 wmpsd4.exe 111 PID 3688 set thread context of 4520 3688 wmpsd4.exe 113 PID 4436 set thread context of 2892 4436 wmpsd4.exe 115 PID 3720 set thread context of 1852 3720 wmpsd4.exe 117 -
resource yara_rule behavioral2/memory/644-2-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/644-1-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/644-0-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/644-4-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/644-7-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/644-6-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/644-5-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/644-42-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/3692-53-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/3692-55-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/3692-54-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/3692-51-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/3692-50-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/3692-52-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/3692-58-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/3692-60-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/3936-67-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/3936-68-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/3936-69-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/3936-72-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/768-84-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/2336-94-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/2336-97-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/696-108-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/4520-117-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/4520-125-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/2892-138-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/1852-152-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpsd4.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpsd4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpsd4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpsd4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpsd4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpsd4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpsd4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpsd4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpsd4.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 644 f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe 644 f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe 3692 wmpsd4.exe 3692 wmpsd4.exe 3936 wmpsd4.exe 3936 wmpsd4.exe 768 wmpsd4.exe 768 wmpsd4.exe 2336 wmpsd4.exe 2336 wmpsd4.exe 696 wmpsd4.exe 696 wmpsd4.exe 4520 wmpsd4.exe 4520 wmpsd4.exe 2892 wmpsd4.exe 2892 wmpsd4.exe 1852 wmpsd4.exe 1852 wmpsd4.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2036 wrote to memory of 644 2036 f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe 98 PID 2036 wrote to memory of 644 2036 f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe 98 PID 2036 wrote to memory of 644 2036 f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe 98 PID 2036 wrote to memory of 644 2036 f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe 98 PID 2036 wrote to memory of 644 2036 f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe 98 PID 2036 wrote to memory of 644 2036 f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe 98 PID 2036 wrote to memory of 644 2036 f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe 98 PID 2036 wrote to memory of 644 2036 f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe 98 PID 644 wrote to memory of 5104 644 f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe 100 PID 644 wrote to memory of 5104 644 f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe 100 PID 644 wrote to memory of 5104 644 f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe 100 PID 5104 wrote to memory of 3692 5104 wmpsd4.exe 101 PID 5104 wrote to memory of 3692 5104 wmpsd4.exe 101 PID 5104 wrote to memory of 3692 5104 wmpsd4.exe 101 PID 5104 wrote to memory of 3692 5104 wmpsd4.exe 101 PID 5104 wrote to memory of 3692 5104 wmpsd4.exe 101 PID 5104 wrote to memory of 3692 5104 wmpsd4.exe 101 PID 5104 wrote to memory of 3692 5104 wmpsd4.exe 101 PID 5104 wrote to memory of 3692 5104 wmpsd4.exe 101 PID 3692 wrote to memory of 3816 3692 wmpsd4.exe 103 PID 3692 wrote to memory of 3816 3692 wmpsd4.exe 103 PID 3692 wrote to memory of 3816 3692 wmpsd4.exe 103 PID 3816 wrote to memory of 3936 3816 wmpsd4.exe 104 PID 3816 wrote to memory of 3936 3816 wmpsd4.exe 104 PID 3816 wrote to memory of 3936 3816 wmpsd4.exe 104 PID 3816 wrote to memory of 3936 3816 wmpsd4.exe 104 PID 3816 wrote to memory of 3936 3816 wmpsd4.exe 104 PID 3816 wrote to memory of 3936 3816 wmpsd4.exe 104 PID 3816 wrote to memory of 3936 3816 wmpsd4.exe 104 PID 3816 wrote to memory of 3936 3816 wmpsd4.exe 104 PID 3936 wrote to memory of 4808 3936 wmpsd4.exe 106 PID 3936 wrote to memory of 4808 3936 wmpsd4.exe 106 PID 3936 wrote to memory of 4808 3936 wmpsd4.exe 106 PID 4808 wrote to memory of 768 4808 wmpsd4.exe 107 PID 4808 wrote to memory of 768 4808 wmpsd4.exe 107 PID 4808 wrote to memory of 768 4808 wmpsd4.exe 107 PID 4808 wrote to memory of 768 4808 wmpsd4.exe 107 PID 4808 wrote to memory of 768 4808 wmpsd4.exe 107 PID 4808 wrote to memory of 768 4808 wmpsd4.exe 107 PID 4808 wrote to memory of 768 4808 wmpsd4.exe 107 PID 4808 wrote to memory of 768 4808 wmpsd4.exe 107 PID 768 wrote to memory of 1456 768 wmpsd4.exe 108 PID 768 wrote to memory of 1456 768 wmpsd4.exe 108 PID 768 wrote to memory of 1456 768 wmpsd4.exe 108 PID 1456 wrote to memory of 2336 1456 wmpsd4.exe 109 PID 1456 wrote to memory of 2336 1456 wmpsd4.exe 109 PID 1456 wrote to memory of 2336 1456 wmpsd4.exe 109 PID 1456 wrote to memory of 2336 1456 wmpsd4.exe 109 PID 1456 wrote to memory of 2336 1456 wmpsd4.exe 109 PID 1456 wrote to memory of 2336 1456 wmpsd4.exe 109 PID 1456 wrote to memory of 2336 1456 wmpsd4.exe 109 PID 1456 wrote to memory of 2336 1456 wmpsd4.exe 109 PID 2336 wrote to memory of 216 2336 wmpsd4.exe 110 PID 2336 wrote to memory of 216 2336 wmpsd4.exe 110 PID 2336 wrote to memory of 216 2336 wmpsd4.exe 110 PID 216 wrote to memory of 696 216 wmpsd4.exe 111 PID 216 wrote to memory of 696 216 wmpsd4.exe 111 PID 216 wrote to memory of 696 216 wmpsd4.exe 111 PID 216 wrote to memory of 696 216 wmpsd4.exe 111 PID 216 wrote to memory of 696 216 wmpsd4.exe 111 PID 216 wrote to memory of 696 216 wmpsd4.exe 111 PID 216 wrote to memory of 696 216 wmpsd4.exe 111 PID 216 wrote to memory of 696 216 wmpsd4.exe 111 PID 696 wrote to memory of 3688 696 wmpsd4.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f2e55884d3685ae6063a315098f65982_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Windows\SysWOW64\wmpsd4.exe"C:\Windows\system32\wmpsd4.exe" C:\Users\Admin\AppData\Local\Temp\F2E558~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\wmpsd4.exe"C:\Windows\system32\wmpsd4.exe" C:\Users\Admin\AppData\Local\Temp\F2E558~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\SysWOW64\wmpsd4.exe"C:\Windows\system32\wmpsd4.exe" C:\Windows\SysWOW64\wmpsd4.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Windows\SysWOW64\wmpsd4.exe"C:\Windows\system32\wmpsd4.exe" C:\Windows\SysWOW64\wmpsd4.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\SysWOW64\wmpsd4.exe"C:\Windows\system32\wmpsd4.exe" C:\Windows\SysWOW64\wmpsd4.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\wmpsd4.exe"C:\Windows\system32\wmpsd4.exe" C:\Windows\SysWOW64\wmpsd4.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\wmpsd4.exe"C:\Windows\system32\wmpsd4.exe" C:\Windows\SysWOW64\wmpsd4.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\wmpsd4.exe"C:\Windows\system32\wmpsd4.exe" C:\Windows\SysWOW64\wmpsd4.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\wmpsd4.exe"C:\Windows\system32\wmpsd4.exe" C:\Windows\SysWOW64\wmpsd4.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SysWOW64\wmpsd4.exe"C:\Windows\system32\wmpsd4.exe" C:\Windows\SysWOW64\wmpsd4.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Windows\SysWOW64\wmpsd4.exe"C:\Windows\system32\wmpsd4.exe" C:\Windows\SysWOW64\wmpsd4.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3688 -
C:\Windows\SysWOW64\wmpsd4.exe"C:\Windows\system32\wmpsd4.exe" C:\Windows\SysWOW64\wmpsd4.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4520 -
C:\Windows\SysWOW64\wmpsd4.exe"C:\Windows\system32\wmpsd4.exe" C:\Windows\SysWOW64\wmpsd4.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4436 -
C:\Windows\SysWOW64\wmpsd4.exe"C:\Windows\system32\wmpsd4.exe" C:\Windows\SysWOW64\wmpsd4.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2892 -
C:\Windows\SysWOW64\wmpsd4.exe"C:\Windows\system32\wmpsd4.exe" C:\Windows\SysWOW64\wmpsd4.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3720 -
C:\Windows\SysWOW64\wmpsd4.exe"C:\Windows\system32\wmpsd4.exe" C:\Windows\SysWOW64\wmpsd4.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1852 -
C:\Windows\SysWOW64\wmpsd4.exe"C:\Windows\system32\wmpsd4.exe" C:\Windows\SysWOW64\wmpsd4.exe19⤵
- Executes dropped EXE
PID:3208
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1036,i,4356837537417149674,16553092232944545509,262144 --variations-seed-version --mojo-platform-channel-handle=3676 /prefetch:81⤵PID:3840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD5f2e55884d3685ae6063a315098f65982
SHA15c02411e8f14992498b47989161180d2b4b3f32d
SHA256f4ddad104cab738312f1f43d4e75cdf92d4519e6425d88f34bd807df4e947f1b
SHA5125c6ab5ca5ab1dc3dcf10e48fdcbf35e4fab444b3d9b8663939edfd4f5a2236ff2aaf56ed435a7d6841f0431e5d47b4a16ba6f805ed59493d5129457a2072f748