Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03/11/2024, 10:35
Static task
static1
Behavioral task
behavioral1
Sample
8b083337a75701127213980bf073af98_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8b083337a75701127213980bf073af98_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
8b083337a75701127213980bf073af98_JaffaCakes118.exe
-
Size
167KB
-
MD5
8b083337a75701127213980bf073af98
-
SHA1
b1f4cddbafb925fda1810753b84d09ad5a2594bf
-
SHA256
f43bcaf48a88d89de359ecaffcef8fd9f9f66ea196e9f3713de2a24f9cea291b
-
SHA512
a8c14aabf1f560cb26c5647b31f7160ac610c152ab75e620274592347fd931566afdcfd6cc5f1826d48250a3cc845d6bf0c7163194775c8581ecd9733176202f
-
SSDEEP
3072:mGEEhQ0P3GiKaSsi9jpTXHjed+XPDKKxM4qcWyBVbZ7nTWuZvF0JcCuZ:mGaiWiKaSL9jVTy+XPDZM4qGz9TWITCm
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 11 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmptf1.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmptf1.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmptf1.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmptf1.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmptf1.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmptf1.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 8b083337a75701127213980bf073af98_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmptf1.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmptf1.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmptf1.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmptf1.exe -
Deletes itself 1 IoCs
pid Process 2564 wmptf1.exe -
Executes dropped EXE 21 IoCs
pid Process 2856 wmptf1.exe 2564 wmptf1.exe 3864 wmptf1.exe 4972 wmptf1.exe 1744 wmptf1.exe 3988 wmptf1.exe 2848 wmptf1.exe 4780 wmptf1.exe 2764 wmptf1.exe 3512 wmptf1.exe 2860 wmptf1.exe 2288 wmptf1.exe 3392 wmptf1.exe 1580 wmptf1.exe 2828 wmptf1.exe 692 wmptf1.exe 3380 wmptf1.exe 3780 wmptf1.exe 2056 wmptf1.exe 680 wmptf1.exe 3004 wmptf1.exe -
Maps connected drives based on registry 3 TTPs 22 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmptf1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptf1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptf1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 8b083337a75701127213980bf073af98_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptf1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmptf1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmptf1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptf1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmptf1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptf1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptf1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 8b083337a75701127213980bf073af98_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmptf1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptf1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmptf1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmptf1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmptf1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptf1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmptf1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptf1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmptf1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptf1.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\wmptf1.exe wmptf1.exe File opened for modification C:\Windows\SysWOW64\wmptf1.exe wmptf1.exe File opened for modification C:\Windows\SysWOW64\wmptf1.exe wmptf1.exe File created C:\Windows\SysWOW64\wmptf1.exe wmptf1.exe File opened for modification C:\Windows\SysWOW64\wmptf1.exe wmptf1.exe File created C:\Windows\SysWOW64\wmptf1.exe wmptf1.exe File created C:\Windows\SysWOW64\wmptf1.exe wmptf1.exe File opened for modification C:\Windows\SysWOW64\wmptf1.exe wmptf1.exe File created C:\Windows\SysWOW64\wmptf1.exe wmptf1.exe File opened for modification C:\Windows\SysWOW64\wmptf1.exe wmptf1.exe File created C:\Windows\SysWOW64\wmptf1.exe wmptf1.exe File opened for modification C:\Windows\SysWOW64\wmptf1.exe wmptf1.exe File opened for modification C:\Windows\SysWOW64\wmptf1.exe wmptf1.exe File created C:\Windows\SysWOW64\wmptf1.exe wmptf1.exe File opened for modification C:\Windows\SysWOW64\wmptf1.exe 8b083337a75701127213980bf073af98_JaffaCakes118.exe File created C:\Windows\SysWOW64\wmptf1.exe 8b083337a75701127213980bf073af98_JaffaCakes118.exe File created C:\Windows\SysWOW64\wmptf1.exe wmptf1.exe File created C:\Windows\SysWOW64\wmptf1.exe wmptf1.exe File opened for modification C:\Windows\SysWOW64\wmptf1.exe wmptf1.exe File created C:\Windows\SysWOW64\wmptf1.exe wmptf1.exe File opened for modification C:\Windows\SysWOW64\wmptf1.exe wmptf1.exe File opened for modification C:\Windows\SysWOW64\wmptf1.exe wmptf1.exe -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 4368 set thread context of 3132 4368 8b083337a75701127213980bf073af98_JaffaCakes118.exe 94 PID 2856 set thread context of 2564 2856 wmptf1.exe 101 PID 3864 set thread context of 4972 3864 wmptf1.exe 106 PID 1744 set thread context of 3988 1744 wmptf1.exe 109 PID 2848 set thread context of 4780 2848 wmptf1.exe 111 PID 2764 set thread context of 3512 2764 wmptf1.exe 114 PID 2860 set thread context of 2288 2860 wmptf1.exe 116 PID 3392 set thread context of 1580 3392 wmptf1.exe 118 PID 2828 set thread context of 692 2828 wmptf1.exe 129 PID 3380 set thread context of 3780 3380 wmptf1.exe 131 PID 2056 set thread context of 680 2056 wmptf1.exe 133 -
resource yara_rule behavioral2/memory/3132-2-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/3132-0-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/3132-1-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/3132-5-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/3132-8-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/3132-7-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/3132-6-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/3132-45-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/2564-52-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/2564-54-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/2564-55-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/2564-53-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/2564-58-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4972-65-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4972-67-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4972-66-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4972-72-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/3988-84-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4780-95-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/3512-107-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/2288-122-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/1580-135-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/692-148-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/3780-162-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/680-175-0x0000000000400000-0x000000000046C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b083337a75701127213980bf073af98_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptf1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptf1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptf1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptf1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptf1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptf1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptf1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptf1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptf1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptf1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptf1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptf1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptf1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptf1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptf1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptf1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptf1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b083337a75701127213980bf073af98_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptf1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptf1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptf1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptf1.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptf1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptf1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptf1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptf1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptf1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 8b083337a75701127213980bf073af98_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptf1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptf1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptf1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptf1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptf1.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 3132 8b083337a75701127213980bf073af98_JaffaCakes118.exe 3132 8b083337a75701127213980bf073af98_JaffaCakes118.exe 2564 wmptf1.exe 2564 wmptf1.exe 4972 wmptf1.exe 4972 wmptf1.exe 3988 wmptf1.exe 3988 wmptf1.exe 4780 wmptf1.exe 4780 wmptf1.exe 3512 wmptf1.exe 3512 wmptf1.exe 2288 wmptf1.exe 2288 wmptf1.exe 1580 wmptf1.exe 1580 wmptf1.exe 692 wmptf1.exe 692 wmptf1.exe 3780 wmptf1.exe 3780 wmptf1.exe 680 wmptf1.exe 680 wmptf1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4368 wrote to memory of 3132 4368 8b083337a75701127213980bf073af98_JaffaCakes118.exe 94 PID 4368 wrote to memory of 3132 4368 8b083337a75701127213980bf073af98_JaffaCakes118.exe 94 PID 4368 wrote to memory of 3132 4368 8b083337a75701127213980bf073af98_JaffaCakes118.exe 94 PID 4368 wrote to memory of 3132 4368 8b083337a75701127213980bf073af98_JaffaCakes118.exe 94 PID 4368 wrote to memory of 3132 4368 8b083337a75701127213980bf073af98_JaffaCakes118.exe 94 PID 4368 wrote to memory of 3132 4368 8b083337a75701127213980bf073af98_JaffaCakes118.exe 94 PID 4368 wrote to memory of 3132 4368 8b083337a75701127213980bf073af98_JaffaCakes118.exe 94 PID 4368 wrote to memory of 3132 4368 8b083337a75701127213980bf073af98_JaffaCakes118.exe 94 PID 3132 wrote to memory of 2856 3132 8b083337a75701127213980bf073af98_JaffaCakes118.exe 100 PID 3132 wrote to memory of 2856 3132 8b083337a75701127213980bf073af98_JaffaCakes118.exe 100 PID 3132 wrote to memory of 2856 3132 8b083337a75701127213980bf073af98_JaffaCakes118.exe 100 PID 2856 wrote to memory of 2564 2856 wmptf1.exe 101 PID 2856 wrote to memory of 2564 2856 wmptf1.exe 101 PID 2856 wrote to memory of 2564 2856 wmptf1.exe 101 PID 2856 wrote to memory of 2564 2856 wmptf1.exe 101 PID 2856 wrote to memory of 2564 2856 wmptf1.exe 101 PID 2856 wrote to memory of 2564 2856 wmptf1.exe 101 PID 2856 wrote to memory of 2564 2856 wmptf1.exe 101 PID 2856 wrote to memory of 2564 2856 wmptf1.exe 101 PID 2564 wrote to memory of 3864 2564 wmptf1.exe 102 PID 2564 wrote to memory of 3864 2564 wmptf1.exe 102 PID 2564 wrote to memory of 3864 2564 wmptf1.exe 102 PID 3864 wrote to memory of 4972 3864 wmptf1.exe 106 PID 3864 wrote to memory of 4972 3864 wmptf1.exe 106 PID 3864 wrote to memory of 4972 3864 wmptf1.exe 106 PID 3864 wrote to memory of 4972 3864 wmptf1.exe 106 PID 3864 wrote to memory of 4972 3864 wmptf1.exe 106 PID 3864 wrote to memory of 4972 3864 wmptf1.exe 106 PID 3864 wrote to memory of 4972 3864 wmptf1.exe 106 PID 3864 wrote to memory of 4972 3864 wmptf1.exe 106 PID 4972 wrote to memory of 1744 4972 wmptf1.exe 108 PID 4972 wrote to memory of 1744 4972 wmptf1.exe 108 PID 4972 wrote to memory of 1744 4972 wmptf1.exe 108 PID 1744 wrote to memory of 3988 1744 wmptf1.exe 109 PID 1744 wrote to memory of 3988 1744 wmptf1.exe 109 PID 1744 wrote to memory of 3988 1744 wmptf1.exe 109 PID 1744 wrote to memory of 3988 1744 wmptf1.exe 109 PID 1744 wrote to memory of 3988 1744 wmptf1.exe 109 PID 1744 wrote to memory of 3988 1744 wmptf1.exe 109 PID 1744 wrote to memory of 3988 1744 wmptf1.exe 109 PID 1744 wrote to memory of 3988 1744 wmptf1.exe 109 PID 3988 wrote to memory of 2848 3988 wmptf1.exe 110 PID 3988 wrote to memory of 2848 3988 wmptf1.exe 110 PID 3988 wrote to memory of 2848 3988 wmptf1.exe 110 PID 2848 wrote to memory of 4780 2848 wmptf1.exe 111 PID 2848 wrote to memory of 4780 2848 wmptf1.exe 111 PID 2848 wrote to memory of 4780 2848 wmptf1.exe 111 PID 2848 wrote to memory of 4780 2848 wmptf1.exe 111 PID 2848 wrote to memory of 4780 2848 wmptf1.exe 111 PID 2848 wrote to memory of 4780 2848 wmptf1.exe 111 PID 2848 wrote to memory of 4780 2848 wmptf1.exe 111 PID 2848 wrote to memory of 4780 2848 wmptf1.exe 111 PID 4780 wrote to memory of 2764 4780 wmptf1.exe 112 PID 4780 wrote to memory of 2764 4780 wmptf1.exe 112 PID 4780 wrote to memory of 2764 4780 wmptf1.exe 112 PID 2764 wrote to memory of 3512 2764 wmptf1.exe 114 PID 2764 wrote to memory of 3512 2764 wmptf1.exe 114 PID 2764 wrote to memory of 3512 2764 wmptf1.exe 114 PID 2764 wrote to memory of 3512 2764 wmptf1.exe 114 PID 2764 wrote to memory of 3512 2764 wmptf1.exe 114 PID 2764 wrote to memory of 3512 2764 wmptf1.exe 114 PID 2764 wrote to memory of 3512 2764 wmptf1.exe 114 PID 2764 wrote to memory of 3512 2764 wmptf1.exe 114 PID 3512 wrote to memory of 2860 3512 wmptf1.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b083337a75701127213980bf073af98_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8b083337a75701127213980bf073af98_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\8b083337a75701127213980bf073af98_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8b083337a75701127213980bf073af98_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\SysWOW64\wmptf1.exe"C:\Windows\system32\wmptf1.exe" C:\Users\Admin\AppData\Local\Temp\8B0833~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\wmptf1.exe"C:\Windows\system32\wmptf1.exe" C:\Users\Admin\AppData\Local\Temp\8B0833~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\wmptf1.exe"C:\Windows\system32\wmptf1.exe" C:\Windows\SysWOW64\wmptf1.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Windows\SysWOW64\wmptf1.exe"C:\Windows\system32\wmptf1.exe" C:\Windows\SysWOW64\wmptf1.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\wmptf1.exe"C:\Windows\system32\wmptf1.exe" C:\Windows\SysWOW64\wmptf1.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\wmptf1.exe"C:\Windows\system32\wmptf1.exe" C:\Windows\SysWOW64\wmptf1.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\SysWOW64\wmptf1.exe"C:\Windows\system32\wmptf1.exe" C:\Windows\SysWOW64\wmptf1.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\wmptf1.exe"C:\Windows\system32\wmptf1.exe" C:\Windows\SysWOW64\wmptf1.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\SysWOW64\wmptf1.exe"C:\Windows\system32\wmptf1.exe" C:\Windows\SysWOW64\wmptf1.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\wmptf1.exe"C:\Windows\system32\wmptf1.exe" C:\Windows\SysWOW64\wmptf1.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\SysWOW64\wmptf1.exe"C:\Windows\system32\wmptf1.exe" C:\Windows\SysWOW64\wmptf1.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2860 -
C:\Windows\SysWOW64\wmptf1.exe"C:\Windows\system32\wmptf1.exe" C:\Windows\SysWOW64\wmptf1.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2288 -
C:\Windows\SysWOW64\wmptf1.exe"C:\Windows\system32\wmptf1.exe" C:\Windows\SysWOW64\wmptf1.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3392 -
C:\Windows\SysWOW64\wmptf1.exe"C:\Windows\system32\wmptf1.exe" C:\Windows\SysWOW64\wmptf1.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1580 -
C:\Windows\SysWOW64\wmptf1.exe"C:\Windows\system32\wmptf1.exe" C:\Windows\SysWOW64\wmptf1.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2828 -
C:\Windows\SysWOW64\wmptf1.exe"C:\Windows\system32\wmptf1.exe" C:\Windows\SysWOW64\wmptf1.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:692 -
C:\Windows\SysWOW64\wmptf1.exe"C:\Windows\system32\wmptf1.exe" C:\Windows\SysWOW64\wmptf1.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3380 -
C:\Windows\SysWOW64\wmptf1.exe"C:\Windows\system32\wmptf1.exe" C:\Windows\SysWOW64\wmptf1.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3780 -
C:\Windows\SysWOW64\wmptf1.exe"C:\Windows\system32\wmptf1.exe" C:\Windows\SysWOW64\wmptf1.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2056 -
C:\Windows\SysWOW64\wmptf1.exe"C:\Windows\system32\wmptf1.exe" C:\Windows\SysWOW64\wmptf1.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:680 -
C:\Windows\SysWOW64\wmptf1.exe"C:\Windows\system32\wmptf1.exe" C:\Windows\SysWOW64\wmptf1.exe23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3004
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
167KB
MD58b083337a75701127213980bf073af98
SHA1b1f4cddbafb925fda1810753b84d09ad5a2594bf
SHA256f43bcaf48a88d89de359ecaffcef8fd9f9f66ea196e9f3713de2a24f9cea291b
SHA512a8c14aabf1f560cb26c5647b31f7160ac610c152ab75e620274592347fd931566afdcfd6cc5f1826d48250a3cc845d6bf0c7163194775c8581ecd9733176202f