Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 07:23
Static task
static1
Behavioral task
behavioral1
Sample
f57d3edfcc34d8895742392a9b8df06a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f57d3edfcc34d8895742392a9b8df06a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f57d3edfcc34d8895742392a9b8df06a_JaffaCakes118.exe
-
Size
164KB
-
MD5
f57d3edfcc34d8895742392a9b8df06a
-
SHA1
31c0a51ed6d78911ddd57c0bc8791f4302e3de1b
-
SHA256
18a771610c958812f7acc0a23fb55beeea655ea2d25f9acc372eba80b8118460
-
SHA512
68404a15b2a187a54ed439c96f4741739c9220af4aa099120a7d693a0d9e6858a5d8be68a1512d9c4f414d61dff928e56ff75ab4849dec5f2678e3a4595472c3
-
SSDEEP
3072:MfQXL7o7lb9SAaLYMefkQoq9IR4cq9+6MGiWpt70:wQXL8EL8NoOwRqY69iEtQ
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings 2 TTPs 15 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation wmpdk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation wmpdk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation wmpdk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation f57d3edfcc34d8895742392a9b8df06a_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation wmpdk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation wmpdk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation wmpdk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation wmpdk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation wmpdk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation wmpdk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation wmpdk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation wmpdk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation wmpdk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation wmpdk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation wmpdk32.exe -
Deletes itself 1 IoCs
pid Process 3984 wmpdk32.exe -
Executes dropped EXE 30 IoCs
pid Process 4256 wmpdk32.exe 3984 wmpdk32.exe 1396 wmpdk32.exe 3704 wmpdk32.exe 3976 wmpdk32.exe 2132 wmpdk32.exe 2236 wmpdk32.exe 416 wmpdk32.exe 3900 wmpdk32.exe 4100 wmpdk32.exe 696 wmpdk32.exe 3432 wmpdk32.exe 3628 wmpdk32.exe 1476 wmpdk32.exe 1536 wmpdk32.exe 2992 wmpdk32.exe 400 wmpdk32.exe 1648 wmpdk32.exe 2376 wmpdk32.exe 4452 wmpdk32.exe 4536 wmpdk32.exe 2668 wmpdk32.exe 3004 wmpdk32.exe 1912 wmpdk32.exe 4072 wmpdk32.exe 2868 wmpdk32.exe 1096 wmpdk32.exe 3964 wmpdk32.exe 2020 wmpdk32.exe 2564 wmpdk32.exe -
Maps connected drives based on registry 3 TTPs 32 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum f57d3edfcc34d8895742392a9b8df06a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 f57d3edfcc34d8895742392a9b8df06a_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdk32.exe -
Drops file in System32 directory 46 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ f57d3edfcc34d8895742392a9b8df06a_JaffaCakes118.exe File created C:\Windows\SysWOW64\wmpdk32.exe wmpdk32.exe File opened for modification C:\Windows\SysWOW64\wmpdk32.exe wmpdk32.exe File created C:\Windows\SysWOW64\wmpdk32.exe wmpdk32.exe File created C:\Windows\SysWOW64\wmpdk32.exe wmpdk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdk32.exe File opened for modification C:\Windows\SysWOW64\wmpdk32.exe f57d3edfcc34d8895742392a9b8df06a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wmpdk32.exe wmpdk32.exe File created C:\Windows\SysWOW64\wmpdk32.exe wmpdk32.exe File opened for modification C:\Windows\SysWOW64\wmpdk32.exe wmpdk32.exe File created C:\Windows\SysWOW64\wmpdk32.exe wmpdk32.exe File created C:\Windows\SysWOW64\wmpdk32.exe wmpdk32.exe File created C:\Windows\SysWOW64\wmpdk32.exe wmpdk32.exe File opened for modification C:\Windows\SysWOW64\wmpdk32.exe wmpdk32.exe File created C:\Windows\SysWOW64\wmpdk32.exe wmpdk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdk32.exe File opened for modification C:\Windows\SysWOW64\wmpdk32.exe wmpdk32.exe File opened for modification C:\Windows\SysWOW64\wmpdk32.exe wmpdk32.exe File opened for modification C:\Windows\SysWOW64\wmpdk32.exe wmpdk32.exe File opened for modification C:\Windows\SysWOW64\wmpdk32.exe wmpdk32.exe File opened for modification C:\Windows\SysWOW64\wmpdk32.exe wmpdk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdk32.exe File created C:\Windows\SysWOW64\wmpdk32.exe wmpdk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdk32.exe File opened for modification C:\Windows\SysWOW64\wmpdk32.exe wmpdk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdk32.exe File created C:\Windows\SysWOW64\wmpdk32.exe wmpdk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdk32.exe File opened for modification C:\Windows\SysWOW64\wmpdk32.exe wmpdk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdk32.exe File created C:\Windows\SysWOW64\wmpdk32.exe wmpdk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdk32.exe File opened for modification C:\Windows\SysWOW64\wmpdk32.exe wmpdk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdk32.exe File opened for modification C:\Windows\SysWOW64\wmpdk32.exe wmpdk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdk32.exe File created C:\Windows\SysWOW64\wmpdk32.exe wmpdk32.exe File opened for modification C:\Windows\SysWOW64\ wmpdk32.exe File created C:\Windows\SysWOW64\wmpdk32.exe f57d3edfcc34d8895742392a9b8df06a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wmpdk32.exe wmpdk32.exe File created C:\Windows\SysWOW64\wmpdk32.exe wmpdk32.exe File created C:\Windows\SysWOW64\wmpdk32.exe wmpdk32.exe -
Suspicious use of SetThreadContext 16 IoCs
description pid Process procid_target PID 3660 set thread context of 2320 3660 f57d3edfcc34d8895742392a9b8df06a_JaffaCakes118.exe 82 PID 4256 set thread context of 3984 4256 wmpdk32.exe 86 PID 1396 set thread context of 3704 1396 wmpdk32.exe 93 PID 3976 set thread context of 2132 3976 wmpdk32.exe 96 PID 2236 set thread context of 416 2236 wmpdk32.exe 99 PID 3900 set thread context of 4100 3900 wmpdk32.exe 101 PID 696 set thread context of 3432 696 wmpdk32.exe 103 PID 3628 set thread context of 1476 3628 wmpdk32.exe 105 PID 1536 set thread context of 2992 1536 wmpdk32.exe 107 PID 400 set thread context of 1648 400 wmpdk32.exe 109 PID 2376 set thread context of 4452 2376 wmpdk32.exe 111 PID 4536 set thread context of 2668 4536 wmpdk32.exe 113 PID 3004 set thread context of 1912 3004 wmpdk32.exe 115 PID 4072 set thread context of 2868 4072 wmpdk32.exe 117 PID 1096 set thread context of 3964 1096 wmpdk32.exe 119 PID 2020 set thread context of 2564 2020 wmpdk32.exe 121 -
resource yara_rule behavioral2/memory/2320-0-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/2320-2-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/2320-3-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/2320-4-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/2320-31-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/2320-41-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/3984-45-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/3984-47-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/3984-46-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/3984-48-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/3984-53-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/3704-58-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/3704-60-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/3704-64-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/2132-72-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/2132-76-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/416-82-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/4100-90-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/3432-98-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/1476-106-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/2992-114-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/1648-121-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/4452-130-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/4452-133-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/2668-138-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/1912-146-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/2868-154-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/3964-162-0x0000000000400000-0x0000000000451000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 31 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f57d3edfcc34d8895742392a9b8df06a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f57d3edfcc34d8895742392a9b8df06a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdk32.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ f57d3edfcc34d8895742392a9b8df06a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdk32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2320 f57d3edfcc34d8895742392a9b8df06a_JaffaCakes118.exe 2320 f57d3edfcc34d8895742392a9b8df06a_JaffaCakes118.exe 2320 f57d3edfcc34d8895742392a9b8df06a_JaffaCakes118.exe 2320 f57d3edfcc34d8895742392a9b8df06a_JaffaCakes118.exe 3984 wmpdk32.exe 3984 wmpdk32.exe 3984 wmpdk32.exe 3984 wmpdk32.exe 3704 wmpdk32.exe 3704 wmpdk32.exe 3704 wmpdk32.exe 3704 wmpdk32.exe 2132 wmpdk32.exe 2132 wmpdk32.exe 2132 wmpdk32.exe 2132 wmpdk32.exe 416 wmpdk32.exe 416 wmpdk32.exe 416 wmpdk32.exe 416 wmpdk32.exe 4100 wmpdk32.exe 4100 wmpdk32.exe 4100 wmpdk32.exe 4100 wmpdk32.exe 3432 wmpdk32.exe 3432 wmpdk32.exe 3432 wmpdk32.exe 3432 wmpdk32.exe 1476 wmpdk32.exe 1476 wmpdk32.exe 1476 wmpdk32.exe 1476 wmpdk32.exe 2992 wmpdk32.exe 2992 wmpdk32.exe 2992 wmpdk32.exe 2992 wmpdk32.exe 1648 wmpdk32.exe 1648 wmpdk32.exe 1648 wmpdk32.exe 1648 wmpdk32.exe 4452 wmpdk32.exe 4452 wmpdk32.exe 4452 wmpdk32.exe 4452 wmpdk32.exe 2668 wmpdk32.exe 2668 wmpdk32.exe 2668 wmpdk32.exe 2668 wmpdk32.exe 1912 wmpdk32.exe 1912 wmpdk32.exe 1912 wmpdk32.exe 1912 wmpdk32.exe 2868 wmpdk32.exe 2868 wmpdk32.exe 2868 wmpdk32.exe 2868 wmpdk32.exe 3964 wmpdk32.exe 3964 wmpdk32.exe 3964 wmpdk32.exe 3964 wmpdk32.exe 2564 wmpdk32.exe 2564 wmpdk32.exe 2564 wmpdk32.exe 2564 wmpdk32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3660 wrote to memory of 2320 3660 f57d3edfcc34d8895742392a9b8df06a_JaffaCakes118.exe 82 PID 3660 wrote to memory of 2320 3660 f57d3edfcc34d8895742392a9b8df06a_JaffaCakes118.exe 82 PID 3660 wrote to memory of 2320 3660 f57d3edfcc34d8895742392a9b8df06a_JaffaCakes118.exe 82 PID 3660 wrote to memory of 2320 3660 f57d3edfcc34d8895742392a9b8df06a_JaffaCakes118.exe 82 PID 3660 wrote to memory of 2320 3660 f57d3edfcc34d8895742392a9b8df06a_JaffaCakes118.exe 82 PID 3660 wrote to memory of 2320 3660 f57d3edfcc34d8895742392a9b8df06a_JaffaCakes118.exe 82 PID 3660 wrote to memory of 2320 3660 f57d3edfcc34d8895742392a9b8df06a_JaffaCakes118.exe 82 PID 2320 wrote to memory of 4256 2320 f57d3edfcc34d8895742392a9b8df06a_JaffaCakes118.exe 85 PID 2320 wrote to memory of 4256 2320 f57d3edfcc34d8895742392a9b8df06a_JaffaCakes118.exe 85 PID 2320 wrote to memory of 4256 2320 f57d3edfcc34d8895742392a9b8df06a_JaffaCakes118.exe 85 PID 4256 wrote to memory of 3984 4256 wmpdk32.exe 86 PID 4256 wrote to memory of 3984 4256 wmpdk32.exe 86 PID 4256 wrote to memory of 3984 4256 wmpdk32.exe 86 PID 4256 wrote to memory of 3984 4256 wmpdk32.exe 86 PID 4256 wrote to memory of 3984 4256 wmpdk32.exe 86 PID 4256 wrote to memory of 3984 4256 wmpdk32.exe 86 PID 4256 wrote to memory of 3984 4256 wmpdk32.exe 86 PID 3984 wrote to memory of 1396 3984 wmpdk32.exe 92 PID 3984 wrote to memory of 1396 3984 wmpdk32.exe 92 PID 3984 wrote to memory of 1396 3984 wmpdk32.exe 92 PID 1396 wrote to memory of 3704 1396 wmpdk32.exe 93 PID 1396 wrote to memory of 3704 1396 wmpdk32.exe 93 PID 1396 wrote to memory of 3704 1396 wmpdk32.exe 93 PID 1396 wrote to memory of 3704 1396 wmpdk32.exe 93 PID 1396 wrote to memory of 3704 1396 wmpdk32.exe 93 PID 1396 wrote to memory of 3704 1396 wmpdk32.exe 93 PID 1396 wrote to memory of 3704 1396 wmpdk32.exe 93 PID 3704 wrote to memory of 3976 3704 wmpdk32.exe 95 PID 3704 wrote to memory of 3976 3704 wmpdk32.exe 95 PID 3704 wrote to memory of 3976 3704 wmpdk32.exe 95 PID 3976 wrote to memory of 2132 3976 wmpdk32.exe 96 PID 3976 wrote to memory of 2132 3976 wmpdk32.exe 96 PID 3976 wrote to memory of 2132 3976 wmpdk32.exe 96 PID 3976 wrote to memory of 2132 3976 wmpdk32.exe 96 PID 3976 wrote to memory of 2132 3976 wmpdk32.exe 96 PID 3976 wrote to memory of 2132 3976 wmpdk32.exe 96 PID 3976 wrote to memory of 2132 3976 wmpdk32.exe 96 PID 2132 wrote to memory of 2236 2132 wmpdk32.exe 98 PID 2132 wrote to memory of 2236 2132 wmpdk32.exe 98 PID 2132 wrote to memory of 2236 2132 wmpdk32.exe 98 PID 2236 wrote to memory of 416 2236 wmpdk32.exe 99 PID 2236 wrote to memory of 416 2236 wmpdk32.exe 99 PID 2236 wrote to memory of 416 2236 wmpdk32.exe 99 PID 2236 wrote to memory of 416 2236 wmpdk32.exe 99 PID 2236 wrote to memory of 416 2236 wmpdk32.exe 99 PID 2236 wrote to memory of 416 2236 wmpdk32.exe 99 PID 2236 wrote to memory of 416 2236 wmpdk32.exe 99 PID 416 wrote to memory of 3900 416 wmpdk32.exe 100 PID 416 wrote to memory of 3900 416 wmpdk32.exe 100 PID 416 wrote to memory of 3900 416 wmpdk32.exe 100 PID 3900 wrote to memory of 4100 3900 wmpdk32.exe 101 PID 3900 wrote to memory of 4100 3900 wmpdk32.exe 101 PID 3900 wrote to memory of 4100 3900 wmpdk32.exe 101 PID 3900 wrote to memory of 4100 3900 wmpdk32.exe 101 PID 3900 wrote to memory of 4100 3900 wmpdk32.exe 101 PID 3900 wrote to memory of 4100 3900 wmpdk32.exe 101 PID 3900 wrote to memory of 4100 3900 wmpdk32.exe 101 PID 4100 wrote to memory of 696 4100 wmpdk32.exe 102 PID 4100 wrote to memory of 696 4100 wmpdk32.exe 102 PID 4100 wrote to memory of 696 4100 wmpdk32.exe 102 PID 696 wrote to memory of 3432 696 wmpdk32.exe 103 PID 696 wrote to memory of 3432 696 wmpdk32.exe 103 PID 696 wrote to memory of 3432 696 wmpdk32.exe 103 PID 696 wrote to memory of 3432 696 wmpdk32.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\f57d3edfcc34d8895742392a9b8df06a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f57d3edfcc34d8895742392a9b8df06a_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\f57d3edfcc34d8895742392a9b8df06a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f57d3edfcc34d8895742392a9b8df06a_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\wmpdk32.exe"C:\Windows\system32\wmpdk32.exe" C:\Users\Admin\AppData\Local\Temp\F57D3E~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Windows\SysWOW64\wmpdk32.exe"C:\Windows\system32\wmpdk32.exe" C:\Users\Admin\AppData\Local\Temp\F57D3E~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\SysWOW64\wmpdk32.exe"C:\Windows\system32\wmpdk32.exe" C:\Windows\SysWOW64\wmpdk32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\wmpdk32.exe"C:\Windows\system32\wmpdk32.exe" C:\Windows\SysWOW64\wmpdk32.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\SysWOW64\wmpdk32.exe"C:\Windows\system32\wmpdk32.exe" C:\Windows\SysWOW64\wmpdk32.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Windows\SysWOW64\wmpdk32.exe"C:\Windows\system32\wmpdk32.exe" C:\Windows\SysWOW64\wmpdk32.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\wmpdk32.exe"C:\Windows\system32\wmpdk32.exe" C:\Windows\SysWOW64\wmpdk32.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\wmpdk32.exe"C:\Windows\system32\wmpdk32.exe" C:\Windows\SysWOW64\wmpdk32.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:416 -
C:\Windows\SysWOW64\wmpdk32.exe"C:\Windows\system32\wmpdk32.exe" C:\Windows\SysWOW64\wmpdk32.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Windows\SysWOW64\wmpdk32.exe"C:\Windows\system32\wmpdk32.exe" C:\Windows\SysWOW64\wmpdk32.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\wmpdk32.exe"C:\Windows\system32\wmpdk32.exe" C:\Windows\SysWOW64\wmpdk32.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Windows\SysWOW64\wmpdk32.exe"C:\Windows\system32\wmpdk32.exe" C:\Windows\SysWOW64\wmpdk32.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3432 -
C:\Windows\SysWOW64\wmpdk32.exe"C:\Windows\system32\wmpdk32.exe" C:\Windows\SysWOW64\wmpdk32.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3628 -
C:\Windows\SysWOW64\wmpdk32.exe"C:\Windows\system32\wmpdk32.exe" C:\Windows\SysWOW64\wmpdk32.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1476 -
C:\Windows\SysWOW64\wmpdk32.exe"C:\Windows\system32\wmpdk32.exe" C:\Windows\SysWOW64\wmpdk32.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1536 -
C:\Windows\SysWOW64\wmpdk32.exe"C:\Windows\system32\wmpdk32.exe" C:\Windows\SysWOW64\wmpdk32.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2992 -
C:\Windows\SysWOW64\wmpdk32.exe"C:\Windows\system32\wmpdk32.exe" C:\Windows\SysWOW64\wmpdk32.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:400 -
C:\Windows\SysWOW64\wmpdk32.exe"C:\Windows\system32\wmpdk32.exe" C:\Windows\SysWOW64\wmpdk32.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1648 -
C:\Windows\SysWOW64\wmpdk32.exe"C:\Windows\system32\wmpdk32.exe" C:\Windows\SysWOW64\wmpdk32.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2376 -
C:\Windows\SysWOW64\wmpdk32.exe"C:\Windows\system32\wmpdk32.exe" C:\Windows\SysWOW64\wmpdk32.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4452 -
C:\Windows\SysWOW64\wmpdk32.exe"C:\Windows\system32\wmpdk32.exe" C:\Windows\SysWOW64\wmpdk32.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4536 -
C:\Windows\SysWOW64\wmpdk32.exe"C:\Windows\system32\wmpdk32.exe" C:\Windows\SysWOW64\wmpdk32.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2668 -
C:\Windows\SysWOW64\wmpdk32.exe"C:\Windows\system32\wmpdk32.exe" C:\Windows\SysWOW64\wmpdk32.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3004 -
C:\Windows\SysWOW64\wmpdk32.exe"C:\Windows\system32\wmpdk32.exe" C:\Windows\SysWOW64\wmpdk32.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1912 -
C:\Windows\SysWOW64\wmpdk32.exe"C:\Windows\system32\wmpdk32.exe" C:\Windows\SysWOW64\wmpdk32.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4072 -
C:\Windows\SysWOW64\wmpdk32.exe"C:\Windows\system32\wmpdk32.exe" C:\Windows\SysWOW64\wmpdk32.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2868 -
C:\Windows\SysWOW64\wmpdk32.exe"C:\Windows\system32\wmpdk32.exe" C:\Windows\SysWOW64\wmpdk32.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1096 -
C:\Windows\SysWOW64\wmpdk32.exe"C:\Windows\system32\wmpdk32.exe" C:\Windows\SysWOW64\wmpdk32.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3964 -
C:\Windows\SysWOW64\wmpdk32.exe"C:\Windows\system32\wmpdk32.exe" C:\Windows\SysWOW64\wmpdk32.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2020 -
C:\Windows\SysWOW64\wmpdk32.exe"C:\Windows\system32\wmpdk32.exe" C:\Windows\SysWOW64\wmpdk32.exe32⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2564
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164KB
MD5f57d3edfcc34d8895742392a9b8df06a
SHA131c0a51ed6d78911ddd57c0bc8791f4302e3de1b
SHA25618a771610c958812f7acc0a23fb55beeea655ea2d25f9acc372eba80b8118460
SHA51268404a15b2a187a54ed439c96f4741739c9220af4aa099120a7d693a0d9e6858a5d8be68a1512d9c4f414d61dff928e56ff75ab4849dec5f2678e3a4595472c3