Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
24-09-2024 07:21
Static task
static1
Behavioral task
behavioral1
Sample
f31bfa9138af5f385b7056230e482478_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f31bfa9138af5f385b7056230e482478_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
f31bfa9138af5f385b7056230e482478_JaffaCakes118.exe
-
Size
202KB
-
MD5
f31bfa9138af5f385b7056230e482478
-
SHA1
10cffd0b5bc8db53881f2dc1d5980cb82914a9be
-
SHA256
dc8b0e20cf211c63830a323982bf9ec65584c875fd3817451e4f94e164e9bdd3
-
SHA512
98e7594e263231977939a99af7d72118bef5fee9f61517430835d793137fe48d6b4755a09222681fd7af5e780b82b2bd1726f6e0b4ca16162ca517e058538db4
-
SSDEEP
3072:5DnsNLa+VJiA5NNXIQRhYWl9UQ0eu4CkC0eB0Xr7Iv9woAcDFjR/D5vQO:KaO9YI9t0Ete0IVwJcDFjx
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2768 wmpdtv32.exe -
Executes dropped EXE 30 IoCs
pid Process 2744 wmpdtv32.exe 2768 wmpdtv32.exe 2672 wmpdtv32.exe 3048 wmpdtv32.exe 396 wmpdtv32.exe 2896 wmpdtv32.exe 376 wmpdtv32.exe 1136 wmpdtv32.exe 2204 wmpdtv32.exe 2436 wmpdtv32.exe 1704 wmpdtv32.exe 1160 wmpdtv32.exe 1880 wmpdtv32.exe 2960 wmpdtv32.exe 2680 wmpdtv32.exe 1256 wmpdtv32.exe 1676 wmpdtv32.exe 1968 wmpdtv32.exe 1992 wmpdtv32.exe 1644 wmpdtv32.exe 2752 wmpdtv32.exe 2652 wmpdtv32.exe 320 wmpdtv32.exe 2728 wmpdtv32.exe 1228 wmpdtv32.exe 340 wmpdtv32.exe 1244 wmpdtv32.exe 804 wmpdtv32.exe 2428 wmpdtv32.exe 2588 wmpdtv32.exe -
Loads dropped DLL 30 IoCs
pid Process 2916 f31bfa9138af5f385b7056230e482478_JaffaCakes118.exe 2744 wmpdtv32.exe 2768 wmpdtv32.exe 2672 wmpdtv32.exe 3048 wmpdtv32.exe 396 wmpdtv32.exe 2896 wmpdtv32.exe 376 wmpdtv32.exe 1136 wmpdtv32.exe 2204 wmpdtv32.exe 2436 wmpdtv32.exe 1704 wmpdtv32.exe 1160 wmpdtv32.exe 1880 wmpdtv32.exe 2960 wmpdtv32.exe 2680 wmpdtv32.exe 1256 wmpdtv32.exe 1676 wmpdtv32.exe 1968 wmpdtv32.exe 1992 wmpdtv32.exe 1644 wmpdtv32.exe 2752 wmpdtv32.exe 2652 wmpdtv32.exe 320 wmpdtv32.exe 2728 wmpdtv32.exe 1228 wmpdtv32.exe 340 wmpdtv32.exe 1244 wmpdtv32.exe 804 wmpdtv32.exe 2428 wmpdtv32.exe -
Maps connected drives based on registry 3 TTPs 32 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum f31bfa9138af5f385b7056230e482478_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 f31bfa9138af5f385b7056230e482478_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtv32.exe -
Drops file in System32 directory 47 IoCs
description ioc Process File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ f31bfa9138af5f385b7056230e482478_JaffaCakes118.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe f31bfa9138af5f385b7056230e482478_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe f31bfa9138af5f385b7056230e482478_JaffaCakes118.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe -
Suspicious use of SetThreadContext 16 IoCs
description pid Process procid_target PID 1916 set thread context of 2916 1916 f31bfa9138af5f385b7056230e482478_JaffaCakes118.exe 30 PID 2744 set thread context of 2768 2744 wmpdtv32.exe 33 PID 2672 set thread context of 3048 2672 wmpdtv32.exe 35 PID 396 set thread context of 2896 396 wmpdtv32.exe 37 PID 376 set thread context of 1136 376 wmpdtv32.exe 39 PID 2204 set thread context of 2436 2204 wmpdtv32.exe 41 PID 1704 set thread context of 1160 1704 wmpdtv32.exe 43 PID 1880 set thread context of 2960 1880 wmpdtv32.exe 45 PID 2680 set thread context of 1256 2680 wmpdtv32.exe 47 PID 1676 set thread context of 1968 1676 wmpdtv32.exe 49 PID 1992 set thread context of 1644 1992 wmpdtv32.exe 51 PID 2752 set thread context of 2652 2752 wmpdtv32.exe 53 PID 320 set thread context of 2728 320 wmpdtv32.exe 55 PID 1228 set thread context of 340 1228 wmpdtv32.exe 57 PID 1244 set thread context of 804 1244 wmpdtv32.exe 59 PID 2428 set thread context of 2588 2428 wmpdtv32.exe 61 -
resource yara_rule behavioral1/memory/2916-2-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2916-4-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2916-9-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2916-7-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2916-6-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2916-3-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2916-8-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2916-19-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2768-29-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2768-30-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2768-31-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2768-33-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2768-36-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/3048-47-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/3048-48-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/3048-53-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2896-63-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2896-64-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2896-70-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/1136-80-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/1136-87-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2436-97-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2436-103-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/1160-119-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2960-136-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/1256-152-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/1968-169-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/1644-185-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2652-202-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2728-218-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/340-234-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/804-247-0x0000000000400000-0x000000000045A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 31 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f31bfa9138af5f385b7056230e482478_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f31bfa9138af5f385b7056230e482478_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2916 f31bfa9138af5f385b7056230e482478_JaffaCakes118.exe 2916 f31bfa9138af5f385b7056230e482478_JaffaCakes118.exe 2768 wmpdtv32.exe 2768 wmpdtv32.exe 3048 wmpdtv32.exe 3048 wmpdtv32.exe 2896 wmpdtv32.exe 2896 wmpdtv32.exe 1136 wmpdtv32.exe 1136 wmpdtv32.exe 2436 wmpdtv32.exe 2436 wmpdtv32.exe 1160 wmpdtv32.exe 1160 wmpdtv32.exe 2960 wmpdtv32.exe 2960 wmpdtv32.exe 1256 wmpdtv32.exe 1256 wmpdtv32.exe 1968 wmpdtv32.exe 1968 wmpdtv32.exe 1644 wmpdtv32.exe 1644 wmpdtv32.exe 2652 wmpdtv32.exe 2652 wmpdtv32.exe 2728 wmpdtv32.exe 2728 wmpdtv32.exe 340 wmpdtv32.exe 340 wmpdtv32.exe 804 wmpdtv32.exe 804 wmpdtv32.exe 2588 wmpdtv32.exe 2588 wmpdtv32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2916 1916 f31bfa9138af5f385b7056230e482478_JaffaCakes118.exe 30 PID 1916 wrote to memory of 2916 1916 f31bfa9138af5f385b7056230e482478_JaffaCakes118.exe 30 PID 1916 wrote to memory of 2916 1916 f31bfa9138af5f385b7056230e482478_JaffaCakes118.exe 30 PID 1916 wrote to memory of 2916 1916 f31bfa9138af5f385b7056230e482478_JaffaCakes118.exe 30 PID 1916 wrote to memory of 2916 1916 f31bfa9138af5f385b7056230e482478_JaffaCakes118.exe 30 PID 1916 wrote to memory of 2916 1916 f31bfa9138af5f385b7056230e482478_JaffaCakes118.exe 30 PID 1916 wrote to memory of 2916 1916 f31bfa9138af5f385b7056230e482478_JaffaCakes118.exe 30 PID 2916 wrote to memory of 2744 2916 f31bfa9138af5f385b7056230e482478_JaffaCakes118.exe 32 PID 2916 wrote to memory of 2744 2916 f31bfa9138af5f385b7056230e482478_JaffaCakes118.exe 32 PID 2916 wrote to memory of 2744 2916 f31bfa9138af5f385b7056230e482478_JaffaCakes118.exe 32 PID 2916 wrote to memory of 2744 2916 f31bfa9138af5f385b7056230e482478_JaffaCakes118.exe 32 PID 2744 wrote to memory of 2768 2744 wmpdtv32.exe 33 PID 2744 wrote to memory of 2768 2744 wmpdtv32.exe 33 PID 2744 wrote to memory of 2768 2744 wmpdtv32.exe 33 PID 2744 wrote to memory of 2768 2744 wmpdtv32.exe 33 PID 2744 wrote to memory of 2768 2744 wmpdtv32.exe 33 PID 2744 wrote to memory of 2768 2744 wmpdtv32.exe 33 PID 2744 wrote to memory of 2768 2744 wmpdtv32.exe 33 PID 2768 wrote to memory of 2672 2768 wmpdtv32.exe 34 PID 2768 wrote to memory of 2672 2768 wmpdtv32.exe 34 PID 2768 wrote to memory of 2672 2768 wmpdtv32.exe 34 PID 2768 wrote to memory of 2672 2768 wmpdtv32.exe 34 PID 2672 wrote to memory of 3048 2672 wmpdtv32.exe 35 PID 2672 wrote to memory of 3048 2672 wmpdtv32.exe 35 PID 2672 wrote to memory of 3048 2672 wmpdtv32.exe 35 PID 2672 wrote to memory of 3048 2672 wmpdtv32.exe 35 PID 2672 wrote to memory of 3048 2672 wmpdtv32.exe 35 PID 2672 wrote to memory of 3048 2672 wmpdtv32.exe 35 PID 2672 wrote to memory of 3048 2672 wmpdtv32.exe 35 PID 3048 wrote to memory of 396 3048 wmpdtv32.exe 36 PID 3048 wrote to memory of 396 3048 wmpdtv32.exe 36 PID 3048 wrote to memory of 396 3048 wmpdtv32.exe 36 PID 3048 wrote to memory of 396 3048 wmpdtv32.exe 36 PID 396 wrote to memory of 2896 396 wmpdtv32.exe 37 PID 396 wrote to memory of 2896 396 wmpdtv32.exe 37 PID 396 wrote to memory of 2896 396 wmpdtv32.exe 37 PID 396 wrote to memory of 2896 396 wmpdtv32.exe 37 PID 396 wrote to memory of 2896 396 wmpdtv32.exe 37 PID 396 wrote to memory of 2896 396 wmpdtv32.exe 37 PID 396 wrote to memory of 2896 396 wmpdtv32.exe 37 PID 2896 wrote to memory of 376 2896 wmpdtv32.exe 38 PID 2896 wrote to memory of 376 2896 wmpdtv32.exe 38 PID 2896 wrote to memory of 376 2896 wmpdtv32.exe 38 PID 2896 wrote to memory of 376 2896 wmpdtv32.exe 38 PID 376 wrote to memory of 1136 376 wmpdtv32.exe 39 PID 376 wrote to memory of 1136 376 wmpdtv32.exe 39 PID 376 wrote to memory of 1136 376 wmpdtv32.exe 39 PID 376 wrote to memory of 1136 376 wmpdtv32.exe 39 PID 376 wrote to memory of 1136 376 wmpdtv32.exe 39 PID 376 wrote to memory of 1136 376 wmpdtv32.exe 39 PID 376 wrote to memory of 1136 376 wmpdtv32.exe 39 PID 1136 wrote to memory of 2204 1136 wmpdtv32.exe 40 PID 1136 wrote to memory of 2204 1136 wmpdtv32.exe 40 PID 1136 wrote to memory of 2204 1136 wmpdtv32.exe 40 PID 1136 wrote to memory of 2204 1136 wmpdtv32.exe 40 PID 2204 wrote to memory of 2436 2204 wmpdtv32.exe 41 PID 2204 wrote to memory of 2436 2204 wmpdtv32.exe 41 PID 2204 wrote to memory of 2436 2204 wmpdtv32.exe 41 PID 2204 wrote to memory of 2436 2204 wmpdtv32.exe 41 PID 2204 wrote to memory of 2436 2204 wmpdtv32.exe 41 PID 2204 wrote to memory of 2436 2204 wmpdtv32.exe 41 PID 2204 wrote to memory of 2436 2204 wmpdtv32.exe 41 PID 2436 wrote to memory of 1704 2436 wmpdtv32.exe 42 PID 2436 wrote to memory of 1704 2436 wmpdtv32.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\f31bfa9138af5f385b7056230e482478_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f31bfa9138af5f385b7056230e482478_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\f31bfa9138af5f385b7056230e482478_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f31bfa9138af5f385b7056230e482478_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Users\Admin\AppData\Local\Temp\F31BFA~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Users\Admin\AppData\Local\Temp\F31BFA~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1704 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1160 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1880 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2960 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2680 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1256 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1676 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1968 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1992 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1644 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2752 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2652 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:320 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2728 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1228 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:340 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1244 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:804 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2428 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe32⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2588
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202KB
MD5f31bfa9138af5f385b7056230e482478
SHA110cffd0b5bc8db53881f2dc1d5980cb82914a9be
SHA256dc8b0e20cf211c63830a323982bf9ec65584c875fd3817451e4f94e164e9bdd3
SHA51298e7594e263231977939a99af7d72118bef5fee9f61517430835d793137fe48d6b4755a09222681fd7af5e780b82b2bd1726f6e0b4ca16162ca517e058538db4