Analysis
-
max time kernel
150s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
04-11-2024 06:25
Static task
static1
Behavioral task
behavioral1
Sample
8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe
-
Size
227KB
-
MD5
8f9ef0f010a95e55bd3b05937cc82a0f
-
SHA1
9fb4d985eefbcb5d53f010e24aee392f5073e590
-
SHA256
1559d716850009fc107e3c3df913b205f94083c8e2401f7741c4b880af9ed019
-
SHA512
98e6186b87f945cf96ec8e0c1d88bb481bd9f79bd418e8474afd699a4bccf088577e76e04291a278a672b03c2f36a946269431615de7e10cc1644c2ad1e5ba7d
-
SSDEEP
3072:V2LhpTH2bSRLhtw7f46C7SAkqPx4XoHuxHcacMYMjCFvGnuq0:8VpTWb6LCfDhXoHux80CFT
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
Processes:
wmiptsb.exepid Process 2828 wmiptsb.exe -
Executes dropped EXE 64 IoCs
Processes:
wmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exepid Process 2984 wmiptsb.exe 2828 wmiptsb.exe 2776 wmiptsb.exe 2732 wmiptsb.exe 2780 wmiptsb.exe 2472 wmiptsb.exe 1688 wmiptsb.exe 2800 wmiptsb.exe 1532 wmiptsb.exe 2004 wmiptsb.exe 1840 wmiptsb.exe 2228 wmiptsb.exe 1652 wmiptsb.exe 2140 wmiptsb.exe 2012 wmiptsb.exe 2584 wmiptsb.exe 1816 wmiptsb.exe 1396 wmiptsb.exe 920 wmiptsb.exe 2656 wmiptsb.exe 876 wmiptsb.exe 1752 wmiptsb.exe 2144 wmiptsb.exe 2852 wmiptsb.exe 2572 wmiptsb.exe 2880 wmiptsb.exe 2532 wmiptsb.exe 2356 wmiptsb.exe 2116 wmiptsb.exe 2416 wmiptsb.exe 3020 wmiptsb.exe 3036 wmiptsb.exe 2176 wmiptsb.exe 2568 wmiptsb.exe 1108 wmiptsb.exe 1728 wmiptsb.exe 2504 wmiptsb.exe 976 wmiptsb.exe 2652 wmiptsb.exe 1644 wmiptsb.exe 2564 wmiptsb.exe 2524 wmiptsb.exe 2204 wmiptsb.exe 568 wmiptsb.exe 2680 wmiptsb.exe 2392 wmiptsb.exe 1708 wmiptsb.exe 2804 wmiptsb.exe 2552 wmiptsb.exe 2864 wmiptsb.exe 3024 wmiptsb.exe 2708 wmiptsb.exe 2772 wmiptsb.exe 2196 wmiptsb.exe 2696 wmiptsb.exe 1916 wmiptsb.exe 2888 wmiptsb.exe 2300 wmiptsb.exe 2036 wmiptsb.exe 436 wmiptsb.exe 1548 wmiptsb.exe 1616 wmiptsb.exe 2672 wmiptsb.exe 2428 wmiptsb.exe -
Loads dropped DLL 64 IoCs
Processes:
8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exepid Process 2124 8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe 2124 8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe 2828 wmiptsb.exe 2828 wmiptsb.exe 2732 wmiptsb.exe 2732 wmiptsb.exe 2472 wmiptsb.exe 2472 wmiptsb.exe 2800 wmiptsb.exe 2800 wmiptsb.exe 2004 wmiptsb.exe 2004 wmiptsb.exe 2228 wmiptsb.exe 2228 wmiptsb.exe 2140 wmiptsb.exe 2140 wmiptsb.exe 2584 wmiptsb.exe 2584 wmiptsb.exe 1396 wmiptsb.exe 1396 wmiptsb.exe 2656 wmiptsb.exe 2656 wmiptsb.exe 1752 wmiptsb.exe 1752 wmiptsb.exe 2852 wmiptsb.exe 2852 wmiptsb.exe 2880 wmiptsb.exe 2880 wmiptsb.exe 2356 wmiptsb.exe 2356 wmiptsb.exe 2416 wmiptsb.exe 2416 wmiptsb.exe 3036 wmiptsb.exe 3036 wmiptsb.exe 2568 wmiptsb.exe 2568 wmiptsb.exe 1728 wmiptsb.exe 1728 wmiptsb.exe 976 wmiptsb.exe 976 wmiptsb.exe 1644 wmiptsb.exe 1644 wmiptsb.exe 2524 wmiptsb.exe 2524 wmiptsb.exe 568 wmiptsb.exe 568 wmiptsb.exe 2392 wmiptsb.exe 2392 wmiptsb.exe 2804 wmiptsb.exe 2804 wmiptsb.exe 2864 wmiptsb.exe 2864 wmiptsb.exe 2708 wmiptsb.exe 2708 wmiptsb.exe 2196 wmiptsb.exe 2196 wmiptsb.exe 1916 wmiptsb.exe 1916 wmiptsb.exe 2300 wmiptsb.exe 2300 wmiptsb.exe 436 wmiptsb.exe 436 wmiptsb.exe 1616 wmiptsb.exe 1616 wmiptsb.exe -
Drops file in System32 directory 64 IoCs
Processes:
wmiptsb.exe8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe 8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe 8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe -
Suspicious use of SetThreadContext 41 IoCs
Processes:
8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exedescription pid Process procid_target PID 2792 set thread context of 2124 2792 8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe 29 PID 2984 set thread context of 2828 2984 wmiptsb.exe 31 PID 2776 set thread context of 2732 2776 wmiptsb.exe 33 PID 2780 set thread context of 2472 2780 wmiptsb.exe 35 PID 1688 set thread context of 2800 1688 wmiptsb.exe 37 PID 1532 set thread context of 2004 1532 wmiptsb.exe 39 PID 1840 set thread context of 2228 1840 wmiptsb.exe 41 PID 1652 set thread context of 2140 1652 wmiptsb.exe 43 PID 2012 set thread context of 2584 2012 wmiptsb.exe 45 PID 1816 set thread context of 1396 1816 wmiptsb.exe 47 PID 920 set thread context of 2656 920 wmiptsb.exe 49 PID 876 set thread context of 1752 876 wmiptsb.exe 51 PID 2144 set thread context of 2852 2144 wmiptsb.exe 53 PID 2572 set thread context of 2880 2572 wmiptsb.exe 55 PID 2532 set thread context of 2356 2532 wmiptsb.exe 57 PID 2116 set thread context of 2416 2116 wmiptsb.exe 59 PID 3020 set thread context of 3036 3020 wmiptsb.exe 61 PID 2176 set thread context of 2568 2176 wmiptsb.exe 63 PID 1108 set thread context of 1728 1108 wmiptsb.exe 65 PID 2504 set thread context of 976 2504 wmiptsb.exe 67 PID 2652 set thread context of 1644 2652 wmiptsb.exe 69 PID 2564 set thread context of 2524 2564 wmiptsb.exe 71 PID 2204 set thread context of 568 2204 wmiptsb.exe 73 PID 2680 set thread context of 2392 2680 wmiptsb.exe 75 PID 1708 set thread context of 2804 1708 wmiptsb.exe 77 PID 2552 set thread context of 2864 2552 wmiptsb.exe 79 PID 3024 set thread context of 2708 3024 wmiptsb.exe 81 PID 2772 set thread context of 2196 2772 wmiptsb.exe 83 PID 2696 set thread context of 1916 2696 wmiptsb.exe 85 PID 2888 set thread context of 2300 2888 wmiptsb.exe 87 PID 2036 set thread context of 436 2036 wmiptsb.exe 89 PID 1548 set thread context of 1616 1548 wmiptsb.exe 91 PID 2672 set thread context of 2428 2672 wmiptsb.exe 93 PID 2484 set thread context of 1512 2484 wmiptsb.exe 95 PID 1944 set thread context of 844 1944 wmiptsb.exe 97 PID 2424 set thread context of 2008 2424 wmiptsb.exe 99 PID 1988 set thread context of 1072 1988 wmiptsb.exe 101 PID 2292 set thread context of 1708 2292 wmiptsb.exe 103 PID 2316 set thread context of 2552 2316 wmiptsb.exe 105 PID 3032 set thread context of 3024 3032 wmiptsb.exe 107 PID 2608 set thread context of 2304 2608 wmiptsb.exe 109 -
Processes:
resource yara_rule behavioral1/memory/2124-6-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2124-10-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2124-9-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2124-8-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2124-4-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2124-2-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2124-11-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2124-12-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2124-25-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2828-34-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2828-35-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2828-36-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2828-37-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2828-43-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2732-52-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2732-53-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2732-54-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2732-61-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2472-71-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2472-77-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2800-88-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2800-87-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2800-89-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2800-95-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2004-106-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2004-113-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2228-129-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2140-139-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2140-146-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2584-156-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2584-163-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1396-173-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1396-180-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2656-197-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1752-206-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1752-218-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2852-228-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2852-235-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2880-251-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2356-260-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2356-264-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2416-274-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2416-277-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/3036-286-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/3036-290-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2568-299-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2568-303-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1728-315-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/976-324-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/976-328-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1644-337-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1644-341-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2524-351-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2524-354-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/568-363-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/568-367-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2392-376-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2392-380-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2804-389-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2804-393-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2864-402-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2864-406-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2708-418-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2196-430-0x0000000000400000-0x0000000000464000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
wmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exe8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exe8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
Processes:
8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exepid Process 2124 8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe 2828 wmiptsb.exe 2732 wmiptsb.exe 2472 wmiptsb.exe 2800 wmiptsb.exe 2004 wmiptsb.exe 2228 wmiptsb.exe 2140 wmiptsb.exe 2584 wmiptsb.exe 1396 wmiptsb.exe 2656 wmiptsb.exe 2852 wmiptsb.exe 2880 wmiptsb.exe 2356 wmiptsb.exe 2416 wmiptsb.exe 3036 wmiptsb.exe 2568 wmiptsb.exe 1728 wmiptsb.exe 976 wmiptsb.exe 1644 wmiptsb.exe 2524 wmiptsb.exe 568 wmiptsb.exe 2392 wmiptsb.exe 2804 wmiptsb.exe 2864 wmiptsb.exe 2708 wmiptsb.exe 2196 wmiptsb.exe 1916 wmiptsb.exe 2300 wmiptsb.exe 436 wmiptsb.exe 1616 wmiptsb.exe 2428 wmiptsb.exe 1512 wmiptsb.exe 844 wmiptsb.exe 2008 wmiptsb.exe 1072 wmiptsb.exe 1708 wmiptsb.exe 2552 wmiptsb.exe 3024 wmiptsb.exe 2304 wmiptsb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exedescription pid Process procid_target PID 2792 wrote to memory of 2124 2792 8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe 29 PID 2792 wrote to memory of 2124 2792 8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe 29 PID 2792 wrote to memory of 2124 2792 8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe 29 PID 2792 wrote to memory of 2124 2792 8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe 29 PID 2792 wrote to memory of 2124 2792 8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe 29 PID 2792 wrote to memory of 2124 2792 8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe 29 PID 2792 wrote to memory of 2124 2792 8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe 29 PID 2124 wrote to memory of 2984 2124 8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe 30 PID 2124 wrote to memory of 2984 2124 8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe 30 PID 2124 wrote to memory of 2984 2124 8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe 30 PID 2124 wrote to memory of 2984 2124 8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe 30 PID 2984 wrote to memory of 2828 2984 wmiptsb.exe 31 PID 2984 wrote to memory of 2828 2984 wmiptsb.exe 31 PID 2984 wrote to memory of 2828 2984 wmiptsb.exe 31 PID 2984 wrote to memory of 2828 2984 wmiptsb.exe 31 PID 2984 wrote to memory of 2828 2984 wmiptsb.exe 31 PID 2984 wrote to memory of 2828 2984 wmiptsb.exe 31 PID 2984 wrote to memory of 2828 2984 wmiptsb.exe 31 PID 2828 wrote to memory of 2776 2828 wmiptsb.exe 32 PID 2828 wrote to memory of 2776 2828 wmiptsb.exe 32 PID 2828 wrote to memory of 2776 2828 wmiptsb.exe 32 PID 2828 wrote to memory of 2776 2828 wmiptsb.exe 32 PID 2776 wrote to memory of 2732 2776 wmiptsb.exe 33 PID 2776 wrote to memory of 2732 2776 wmiptsb.exe 33 PID 2776 wrote to memory of 2732 2776 wmiptsb.exe 33 PID 2776 wrote to memory of 2732 2776 wmiptsb.exe 33 PID 2776 wrote to memory of 2732 2776 wmiptsb.exe 33 PID 2776 wrote to memory of 2732 2776 wmiptsb.exe 33 PID 2776 wrote to memory of 2732 2776 wmiptsb.exe 33 PID 2732 wrote to memory of 2780 2732 wmiptsb.exe 34 PID 2732 wrote to memory of 2780 2732 wmiptsb.exe 34 PID 2732 wrote to memory of 2780 2732 wmiptsb.exe 34 PID 2732 wrote to memory of 2780 2732 wmiptsb.exe 34 PID 2780 wrote to memory of 2472 2780 wmiptsb.exe 35 PID 2780 wrote to memory of 2472 2780 wmiptsb.exe 35 PID 2780 wrote to memory of 2472 2780 wmiptsb.exe 35 PID 2780 wrote to memory of 2472 2780 wmiptsb.exe 35 PID 2780 wrote to memory of 2472 2780 wmiptsb.exe 35 PID 2780 wrote to memory of 2472 2780 wmiptsb.exe 35 PID 2780 wrote to memory of 2472 2780 wmiptsb.exe 35 PID 2472 wrote to memory of 1688 2472 wmiptsb.exe 36 PID 2472 wrote to memory of 1688 2472 wmiptsb.exe 36 PID 2472 wrote to memory of 1688 2472 wmiptsb.exe 36 PID 2472 wrote to memory of 1688 2472 wmiptsb.exe 36 PID 1688 wrote to memory of 2800 1688 wmiptsb.exe 37 PID 1688 wrote to memory of 2800 1688 wmiptsb.exe 37 PID 1688 wrote to memory of 2800 1688 wmiptsb.exe 37 PID 1688 wrote to memory of 2800 1688 wmiptsb.exe 37 PID 1688 wrote to memory of 2800 1688 wmiptsb.exe 37 PID 1688 wrote to memory of 2800 1688 wmiptsb.exe 37 PID 1688 wrote to memory of 2800 1688 wmiptsb.exe 37 PID 2800 wrote to memory of 1532 2800 wmiptsb.exe 38 PID 2800 wrote to memory of 1532 2800 wmiptsb.exe 38 PID 2800 wrote to memory of 1532 2800 wmiptsb.exe 38 PID 2800 wrote to memory of 1532 2800 wmiptsb.exe 38 PID 1532 wrote to memory of 2004 1532 wmiptsb.exe 39 PID 1532 wrote to memory of 2004 1532 wmiptsb.exe 39 PID 1532 wrote to memory of 2004 1532 wmiptsb.exe 39 PID 1532 wrote to memory of 2004 1532 wmiptsb.exe 39 PID 1532 wrote to memory of 2004 1532 wmiptsb.exe 39 PID 1532 wrote to memory of 2004 1532 wmiptsb.exe 39 PID 1532 wrote to memory of 2004 1532 wmiptsb.exe 39 PID 2004 wrote to memory of 1840 2004 wmiptsb.exe 40 PID 2004 wrote to memory of 1840 2004 wmiptsb.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Users\Admin\AppData\Local\Temp\8F9EF0~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Users\Admin\AppData\Local\Temp\8F9EF0~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1840 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2228 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1652 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2140 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2012 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2584 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1816 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1396 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:920 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2656 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:876 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1752 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2144 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2852 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2572 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2880 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2532 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2356 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2116 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2416 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3020 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe34⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3036 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2176 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe36⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2568 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1108 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe38⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1728 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2504 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe40⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:976 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2652 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe42⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1644 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2564 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe44⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2524 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2204 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe46⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:568 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2680 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe48⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2392 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1708 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe50⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2804 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2552 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe52⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2864 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3024 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe54⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2708 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2772 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe56⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2196 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2696 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe58⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1916 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2888 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe60⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2300 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2036 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe62⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:436 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1548 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe64⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1616 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2672 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe66⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2428 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe67⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2484 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe68⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1512 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe69⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1944 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe70⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:844 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe71⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2424 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe72⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2008 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe73⤵
- Suspicious use of SetThreadContext
PID:1988 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe74⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1072 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe75⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2292 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe76⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1708 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe77⤵
- Suspicious use of SetThreadContext
PID:2316 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe78⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2552 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe79⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3032 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe80⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3024 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe81⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2608 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe82⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2304
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
227KB
MD58f9ef0f010a95e55bd3b05937cc82a0f
SHA19fb4d985eefbcb5d53f010e24aee392f5073e590
SHA2561559d716850009fc107e3c3df913b205f94083c8e2401f7741c4b880af9ed019
SHA51298e6186b87f945cf96ec8e0c1d88bb481bd9f79bd418e8474afd699a4bccf088577e76e04291a278a672b03c2f36a946269431615de7e10cc1644c2ad1e5ba7d