Analysis
-
max time kernel
149s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 18:55
Static task
static1
Behavioral task
behavioral1
Sample
f9038f1859b2e5d7f4a2d9a1aafb4f3e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f9038f1859b2e5d7f4a2d9a1aafb4f3e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f9038f1859b2e5d7f4a2d9a1aafb4f3e_JaffaCakes118.exe
-
Size
198KB
-
MD5
f9038f1859b2e5d7f4a2d9a1aafb4f3e
-
SHA1
52ef34a49bfb8a7a0149fe24915daacd2b229d48
-
SHA256
5302fed858a18c66252c1956377743a44b383f398c89fe71628a358bb49e9a7c
-
SHA512
f92a8ba383d552381fbb06030cd4bf671022f4c47c078ea57c63217222b9b6d497dd5e72e42614811c94b1d1c31d5af8c54b5cd6565146855d0cd5f0aa0d33af
-
SSDEEP
3072:LAavosgPrJiX94Pp5H+tnp1ezSt+CFmngL2LvnUhxdmOw4YHLQM2HysCfx:LAog2p1AS1FmvvI8xQvSXx
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 1872 wmpdtc32.exe -
Executes dropped EXE 32 IoCs
pid Process 2604 wmpdtc32.exe 1872 wmpdtc32.exe 1156 wmpdtc32.exe 2040 wmpdtc32.exe 2036 wmpdtc32.exe 2568 wmpdtc32.exe 300 wmpdtc32.exe 484 wmpdtc32.exe 3040 wmpdtc32.exe 2996 wmpdtc32.exe 236 wmpdtc32.exe 780 wmpdtc32.exe 1244 wmpdtc32.exe 676 wmpdtc32.exe 2308 wmpdtc32.exe 2404 wmpdtc32.exe 2732 wmpdtc32.exe 1992 wmpdtc32.exe 1956 wmpdtc32.exe 2700 wmpdtc32.exe 1104 wmpdtc32.exe 2564 wmpdtc32.exe 2872 wmpdtc32.exe 2156 wmpdtc32.exe 1704 wmpdtc32.exe 2312 wmpdtc32.exe 2112 wmpdtc32.exe 2984 wmpdtc32.exe 968 wmpdtc32.exe 2436 wmpdtc32.exe 1968 wmpdtc32.exe 1860 wmpdtc32.exe -
Loads dropped DLL 32 IoCs
pid Process 2728 f9038f1859b2e5d7f4a2d9a1aafb4f3e_JaffaCakes118.exe 2604 wmpdtc32.exe 1872 wmpdtc32.exe 1156 wmpdtc32.exe 2040 wmpdtc32.exe 2036 wmpdtc32.exe 2568 wmpdtc32.exe 300 wmpdtc32.exe 484 wmpdtc32.exe 3040 wmpdtc32.exe 2996 wmpdtc32.exe 236 wmpdtc32.exe 780 wmpdtc32.exe 1244 wmpdtc32.exe 676 wmpdtc32.exe 2308 wmpdtc32.exe 2404 wmpdtc32.exe 2732 wmpdtc32.exe 1992 wmpdtc32.exe 1956 wmpdtc32.exe 2700 wmpdtc32.exe 1104 wmpdtc32.exe 2564 wmpdtc32.exe 2872 wmpdtc32.exe 2156 wmpdtc32.exe 1704 wmpdtc32.exe 2312 wmpdtc32.exe 2112 wmpdtc32.exe 2984 wmpdtc32.exe 968 wmpdtc32.exe 2436 wmpdtc32.exe 1968 wmpdtc32.exe -
Maps connected drives based on registry 3 TTPs 34 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum f9038f1859b2e5d7f4a2d9a1aafb4f3e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 f9038f1859b2e5d7f4a2d9a1aafb4f3e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdtc32.exe -
Drops file in System32 directory 48 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wmpdtc32.exe f9038f1859b2e5d7f4a2d9a1aafb4f3e_JaffaCakes118.exe File created C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File created C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File created C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtc32.exe File created C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtc32.exe File created C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File created C:\Windows\SysWOW64\wmpdtc32.exe f9038f1859b2e5d7f4a2d9a1aafb4f3e_JaffaCakes118.exe File created C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File created C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtc32.exe File created C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File created C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtc32.exe File created C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtc32.exe File created C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File created C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File created C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File created C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File created C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\ f9038f1859b2e5d7f4a2d9a1aafb4f3e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe -
Suspicious use of SetThreadContext 17 IoCs
description pid Process procid_target PID 2216 set thread context of 2728 2216 f9038f1859b2e5d7f4a2d9a1aafb4f3e_JaffaCakes118.exe 30 PID 2604 set thread context of 1872 2604 wmpdtc32.exe 32 PID 1156 set thread context of 2040 1156 wmpdtc32.exe 34 PID 2036 set thread context of 2568 2036 wmpdtc32.exe 36 PID 300 set thread context of 484 300 wmpdtc32.exe 38 PID 3040 set thread context of 2996 3040 wmpdtc32.exe 40 PID 236 set thread context of 780 236 wmpdtc32.exe 42 PID 1244 set thread context of 676 1244 wmpdtc32.exe 44 PID 2308 set thread context of 2404 2308 wmpdtc32.exe 46 PID 2732 set thread context of 1992 2732 wmpdtc32.exe 49 PID 1956 set thread context of 2700 1956 wmpdtc32.exe 51 PID 1104 set thread context of 2564 1104 wmpdtc32.exe 53 PID 2872 set thread context of 2156 2872 wmpdtc32.exe 55 PID 1704 set thread context of 2312 1704 wmpdtc32.exe 57 PID 2112 set thread context of 2984 2112 wmpdtc32.exe 59 PID 968 set thread context of 2436 968 wmpdtc32.exe 61 PID 1968 set thread context of 1860 1968 wmpdtc32.exe 63 -
resource yara_rule behavioral1/memory/2728-9-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2728-10-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2728-13-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2728-12-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2728-6-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2728-11-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2728-5-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2728-3-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2728-20-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2604-25-0x0000000000280000-0x00000000002BC000-memory.dmp upx behavioral1/memory/2728-31-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1872-41-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1872-40-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1872-44-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2040-61-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1872-62-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2040-67-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2040-84-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2568-81-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2568-87-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2568-100-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/484-107-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/484-110-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2996-123-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2996-127-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2996-140-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/780-144-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/780-148-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/676-165-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/780-161-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/676-168-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2404-182-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/676-185-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2404-190-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2404-205-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1992-209-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1992-225-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2700-228-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2700-245-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2564-247-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2156-259-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2564-264-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2156-267-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2312-280-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2156-285-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2312-288-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2312-303-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2984-305-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2984-318-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2436-319-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2436-334-0x0000000000400000-0x0000000000456000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 33 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f9038f1859b2e5d7f4a2d9a1aafb4f3e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f9038f1859b2e5d7f4a2d9a1aafb4f3e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 2728 f9038f1859b2e5d7f4a2d9a1aafb4f3e_JaffaCakes118.exe 2728 f9038f1859b2e5d7f4a2d9a1aafb4f3e_JaffaCakes118.exe 1872 wmpdtc32.exe 1872 wmpdtc32.exe 2040 wmpdtc32.exe 2040 wmpdtc32.exe 2568 wmpdtc32.exe 2568 wmpdtc32.exe 484 wmpdtc32.exe 484 wmpdtc32.exe 2996 wmpdtc32.exe 2996 wmpdtc32.exe 780 wmpdtc32.exe 780 wmpdtc32.exe 676 wmpdtc32.exe 676 wmpdtc32.exe 2404 wmpdtc32.exe 2404 wmpdtc32.exe 1992 wmpdtc32.exe 1992 wmpdtc32.exe 2700 wmpdtc32.exe 2700 wmpdtc32.exe 2564 wmpdtc32.exe 2564 wmpdtc32.exe 2156 wmpdtc32.exe 2156 wmpdtc32.exe 2312 wmpdtc32.exe 2312 wmpdtc32.exe 2984 wmpdtc32.exe 2984 wmpdtc32.exe 2436 wmpdtc32.exe 2436 wmpdtc32.exe 1860 wmpdtc32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2728 2216 f9038f1859b2e5d7f4a2d9a1aafb4f3e_JaffaCakes118.exe 30 PID 2216 wrote to memory of 2728 2216 f9038f1859b2e5d7f4a2d9a1aafb4f3e_JaffaCakes118.exe 30 PID 2216 wrote to memory of 2728 2216 f9038f1859b2e5d7f4a2d9a1aafb4f3e_JaffaCakes118.exe 30 PID 2216 wrote to memory of 2728 2216 f9038f1859b2e5d7f4a2d9a1aafb4f3e_JaffaCakes118.exe 30 PID 2216 wrote to memory of 2728 2216 f9038f1859b2e5d7f4a2d9a1aafb4f3e_JaffaCakes118.exe 30 PID 2216 wrote to memory of 2728 2216 f9038f1859b2e5d7f4a2d9a1aafb4f3e_JaffaCakes118.exe 30 PID 2216 wrote to memory of 2728 2216 f9038f1859b2e5d7f4a2d9a1aafb4f3e_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2604 2728 f9038f1859b2e5d7f4a2d9a1aafb4f3e_JaffaCakes118.exe 31 PID 2728 wrote to memory of 2604 2728 f9038f1859b2e5d7f4a2d9a1aafb4f3e_JaffaCakes118.exe 31 PID 2728 wrote to memory of 2604 2728 f9038f1859b2e5d7f4a2d9a1aafb4f3e_JaffaCakes118.exe 31 PID 2728 wrote to memory of 2604 2728 f9038f1859b2e5d7f4a2d9a1aafb4f3e_JaffaCakes118.exe 31 PID 2604 wrote to memory of 1872 2604 wmpdtc32.exe 32 PID 2604 wrote to memory of 1872 2604 wmpdtc32.exe 32 PID 2604 wrote to memory of 1872 2604 wmpdtc32.exe 32 PID 2604 wrote to memory of 1872 2604 wmpdtc32.exe 32 PID 2604 wrote to memory of 1872 2604 wmpdtc32.exe 32 PID 2604 wrote to memory of 1872 2604 wmpdtc32.exe 32 PID 2604 wrote to memory of 1872 2604 wmpdtc32.exe 32 PID 1872 wrote to memory of 1156 1872 wmpdtc32.exe 33 PID 1872 wrote to memory of 1156 1872 wmpdtc32.exe 33 PID 1872 wrote to memory of 1156 1872 wmpdtc32.exe 33 PID 1872 wrote to memory of 1156 1872 wmpdtc32.exe 33 PID 1156 wrote to memory of 2040 1156 wmpdtc32.exe 34 PID 1156 wrote to memory of 2040 1156 wmpdtc32.exe 34 PID 1156 wrote to memory of 2040 1156 wmpdtc32.exe 34 PID 1156 wrote to memory of 2040 1156 wmpdtc32.exe 34 PID 1156 wrote to memory of 2040 1156 wmpdtc32.exe 34 PID 1156 wrote to memory of 2040 1156 wmpdtc32.exe 34 PID 1156 wrote to memory of 2040 1156 wmpdtc32.exe 34 PID 2040 wrote to memory of 2036 2040 wmpdtc32.exe 35 PID 2040 wrote to memory of 2036 2040 wmpdtc32.exe 35 PID 2040 wrote to memory of 2036 2040 wmpdtc32.exe 35 PID 2040 wrote to memory of 2036 2040 wmpdtc32.exe 35 PID 2036 wrote to memory of 2568 2036 wmpdtc32.exe 36 PID 2036 wrote to memory of 2568 2036 wmpdtc32.exe 36 PID 2036 wrote to memory of 2568 2036 wmpdtc32.exe 36 PID 2036 wrote to memory of 2568 2036 wmpdtc32.exe 36 PID 2036 wrote to memory of 2568 2036 wmpdtc32.exe 36 PID 2036 wrote to memory of 2568 2036 wmpdtc32.exe 36 PID 2036 wrote to memory of 2568 2036 wmpdtc32.exe 36 PID 2568 wrote to memory of 300 2568 wmpdtc32.exe 37 PID 2568 wrote to memory of 300 2568 wmpdtc32.exe 37 PID 2568 wrote to memory of 300 2568 wmpdtc32.exe 37 PID 2568 wrote to memory of 300 2568 wmpdtc32.exe 37 PID 300 wrote to memory of 484 300 wmpdtc32.exe 38 PID 300 wrote to memory of 484 300 wmpdtc32.exe 38 PID 300 wrote to memory of 484 300 wmpdtc32.exe 38 PID 300 wrote to memory of 484 300 wmpdtc32.exe 38 PID 300 wrote to memory of 484 300 wmpdtc32.exe 38 PID 300 wrote to memory of 484 300 wmpdtc32.exe 38 PID 300 wrote to memory of 484 300 wmpdtc32.exe 38 PID 484 wrote to memory of 3040 484 wmpdtc32.exe 39 PID 484 wrote to memory of 3040 484 wmpdtc32.exe 39 PID 484 wrote to memory of 3040 484 wmpdtc32.exe 39 PID 484 wrote to memory of 3040 484 wmpdtc32.exe 39 PID 3040 wrote to memory of 2996 3040 wmpdtc32.exe 40 PID 3040 wrote to memory of 2996 3040 wmpdtc32.exe 40 PID 3040 wrote to memory of 2996 3040 wmpdtc32.exe 40 PID 3040 wrote to memory of 2996 3040 wmpdtc32.exe 40 PID 3040 wrote to memory of 2996 3040 wmpdtc32.exe 40 PID 3040 wrote to memory of 2996 3040 wmpdtc32.exe 40 PID 3040 wrote to memory of 2996 3040 wmpdtc32.exe 40 PID 2996 wrote to memory of 236 2996 wmpdtc32.exe 41 PID 2996 wrote to memory of 236 2996 wmpdtc32.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9038f1859b2e5d7f4a2d9a1aafb4f3e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f9038f1859b2e5d7f4a2d9a1aafb4f3e_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\f9038f1859b2e5d7f4a2d9a1aafb4f3e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f9038f1859b2e5d7f4a2d9a1aafb4f3e_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Users\Admin\AppData\Local\Temp\F9038F~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Users\Admin\AppData\Local\Temp\F9038F~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:300 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:236 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:780 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1244 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:676 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2308 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2404 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2732 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1992 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1956 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2700 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1104 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2564 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2872 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2156 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1704 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2312 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2112 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2984 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:968 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2436 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe33⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1968 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:1860
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198KB
MD5f9038f1859b2e5d7f4a2d9a1aafb4f3e
SHA152ef34a49bfb8a7a0149fe24915daacd2b229d48
SHA2565302fed858a18c66252c1956377743a44b383f398c89fe71628a358bb49e9a7c
SHA512f92a8ba383d552381fbb06030cd4bf671022f4c47c078ea57c63217222b9b6d497dd5e72e42614811c94b1d1c31d5af8c54b5cd6565146855d0cd5f0aa0d33af