Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 06:25
Static task
static1
Behavioral task
behavioral1
Sample
8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe
-
Size
227KB
-
MD5
8f9ef0f010a95e55bd3b05937cc82a0f
-
SHA1
9fb4d985eefbcb5d53f010e24aee392f5073e590
-
SHA256
1559d716850009fc107e3c3df913b205f94083c8e2401f7741c4b880af9ed019
-
SHA512
98e6186b87f945cf96ec8e0c1d88bb481bd9f79bd418e8474afd699a4bccf088577e76e04291a278a672b03c2f36a946269431615de7e10cc1644c2ad1e5ba7d
-
SSDEEP
3072:V2LhpTH2bSRLhtw7f46C7SAkqPx4XoHuxHcacMYMjCFvGnuq0:8VpTWb6LCfDhXoHux80CFT
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 54 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
wmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exe8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exewmiptsb.exewmiptsb.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation wmiptsb.exe -
Deletes itself 1 IoCs
Processes:
wmiptsb.exepid Process 1620 wmiptsb.exe -
Executes dropped EXE 64 IoCs
Processes:
wmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exepid Process 1604 wmiptsb.exe 1620 wmiptsb.exe 3996 wmiptsb.exe 888 wmiptsb.exe 1576 wmiptsb.exe 3624 wmiptsb.exe 4708 wmiptsb.exe 5076 wmiptsb.exe 2736 wmiptsb.exe 2608 wmiptsb.exe 4176 wmiptsb.exe 3748 wmiptsb.exe 2280 wmiptsb.exe 4036 wmiptsb.exe 2940 wmiptsb.exe 4572 wmiptsb.exe 4080 wmiptsb.exe 2604 wmiptsb.exe 4904 wmiptsb.exe 1132 wmiptsb.exe 1252 wmiptsb.exe 1708 wmiptsb.exe 4448 wmiptsb.exe 1360 wmiptsb.exe 2028 wmiptsb.exe 668 wmiptsb.exe 2904 wmiptsb.exe 1664 wmiptsb.exe 4704 wmiptsb.exe 4592 wmiptsb.exe 4440 wmiptsb.exe 4424 wmiptsb.exe 3964 wmiptsb.exe 3728 wmiptsb.exe 4952 wmiptsb.exe 1704 wmiptsb.exe 2808 wmiptsb.exe 2928 wmiptsb.exe 924 wmiptsb.exe 3156 wmiptsb.exe 392 wmiptsb.exe 2140 wmiptsb.exe 1652 wmiptsb.exe 1708 wmiptsb.exe 5056 wmiptsb.exe 760 wmiptsb.exe 2268 wmiptsb.exe 1656 wmiptsb.exe 960 wmiptsb.exe 2896 wmiptsb.exe 4468 wmiptsb.exe 3900 wmiptsb.exe 2332 wmiptsb.exe 2844 wmiptsb.exe 1936 wmiptsb.exe 2360 wmiptsb.exe 4884 wmiptsb.exe 4684 wmiptsb.exe 3540 wmiptsb.exe 3700 wmiptsb.exe 2236 wmiptsb.exe 1380 wmiptsb.exe 4808 wmiptsb.exe 1916 wmiptsb.exe -
Drops file in System32 directory 64 IoCs
Processes:
wmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exe8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe 8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File created C:\Windows\SysWOW64\wmiptsb.exe wmiptsb.exe File opened for modification C:\Windows\SysWOW64\wmiptsb.exe 8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe -
Suspicious use of SetThreadContext 54 IoCs
Processes:
8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exedescription pid Process procid_target PID 2892 set thread context of 1472 2892 8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe 86 PID 1604 set thread context of 1620 1604 wmiptsb.exe 92 PID 3996 set thread context of 888 3996 wmiptsb.exe 96 PID 1576 set thread context of 3624 1576 wmiptsb.exe 99 PID 4708 set thread context of 5076 4708 wmiptsb.exe 105 PID 2736 set thread context of 2608 2736 wmiptsb.exe 107 PID 4176 set thread context of 3748 4176 wmiptsb.exe 109 PID 2280 set thread context of 4036 2280 wmiptsb.exe 111 PID 2940 set thread context of 4572 2940 wmiptsb.exe 113 PID 4080 set thread context of 2604 4080 wmiptsb.exe 115 PID 4904 set thread context of 1132 4904 wmiptsb.exe 117 PID 1252 set thread context of 1708 1252 wmiptsb.exe 121 PID 4448 set thread context of 1360 4448 wmiptsb.exe 124 PID 2028 set thread context of 668 2028 wmiptsb.exe 126 PID 2904 set thread context of 1664 2904 wmiptsb.exe 129 PID 4704 set thread context of 4592 4704 wmiptsb.exe 131 PID 4440 set thread context of 4424 4440 wmiptsb.exe 133 PID 3964 set thread context of 3728 3964 wmiptsb.exe 135 PID 4952 set thread context of 1704 4952 wmiptsb.exe 137 PID 2808 set thread context of 2928 2808 wmiptsb.exe 139 PID 924 set thread context of 3156 924 wmiptsb.exe 141 PID 392 set thread context of 2140 392 wmiptsb.exe 143 PID 1652 set thread context of 1708 1652 wmiptsb.exe 145 PID 5056 set thread context of 760 5056 wmiptsb.exe 147 PID 2268 set thread context of 1656 2268 wmiptsb.exe 149 PID 960 set thread context of 2896 960 wmiptsb.exe 152 PID 4468 set thread context of 3900 4468 wmiptsb.exe 154 PID 2332 set thread context of 2844 2332 wmiptsb.exe 156 PID 1936 set thread context of 2360 1936 wmiptsb.exe 158 PID 4884 set thread context of 4684 4884 wmiptsb.exe 160 PID 3540 set thread context of 3700 3540 wmiptsb.exe 162 PID 2236 set thread context of 1380 2236 wmiptsb.exe 164 PID 4808 set thread context of 1916 4808 wmiptsb.exe 166 PID 1252 set thread context of 1484 1252 wmiptsb.exe 168 PID 3064 set thread context of 4180 3064 wmiptsb.exe 170 PID 2740 set thread context of 1552 2740 wmiptsb.exe 172 PID 2912 set thread context of 4416 2912 wmiptsb.exe 174 PID 2320 set thread context of 2792 2320 wmiptsb.exe 178 PID 3476 set thread context of 2428 3476 wmiptsb.exe 183 PID 2840 set thread context of 1212 2840 wmiptsb.exe 188 PID 2660 set thread context of 4324 2660 wmiptsb.exe 190 PID 2628 set thread context of 1252 2628 wmiptsb.exe 192 PID 2264 set thread context of 112 2264 wmiptsb.exe 194 PID 1096 set thread context of 4360 1096 wmiptsb.exe 196 PID 1908 set thread context of 2912 1908 wmiptsb.exe 198 PID 1616 set thread context of 4732 1616 wmiptsb.exe 200 PID 4992 set thread context of 2656 4992 wmiptsb.exe 202 PID 536 set thread context of 3472 536 wmiptsb.exe 204 PID 4092 set thread context of 1656 4092 wmiptsb.exe 206 PID 1556 set thread context of 4704 1556 wmiptsb.exe 208 PID 2116 set thread context of 3856 2116 wmiptsb.exe 210 PID 1604 set thread context of 3232 1604 wmiptsb.exe 215 PID 100 set thread context of 1204 100 wmiptsb.exe 217 PID 1412 set thread context of 552 1412 wmiptsb.exe 219 -
Processes:
resource yara_rule behavioral2/memory/1472-0-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/1472-2-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/1472-3-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/1472-4-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/1472-38-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/1620-45-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/1620-47-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/888-53-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/3624-61-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/5076-68-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/2608-75-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/3748-82-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4036-89-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4572-96-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/2604-103-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/1132-109-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/1708-117-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/1360-126-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/668-134-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/1664-142-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4592-150-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4424-158-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/3728-166-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/1704-174-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/2928-182-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/3156-190-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/2140-198-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/1708-205-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/760-211-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/1656-217-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/2896-223-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/3900-229-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/2844-235-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/2360-241-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4684-247-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/3700-253-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/1380-259-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/1916-265-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/1484-271-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4180-277-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/1552-283-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4416-289-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/2792-295-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/2428-301-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/1212-307-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4324-313-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/1252-319-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/112-325-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4360-331-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/2912-337-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4732-343-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/2656-349-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/3472-355-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/1656-361-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4704-367-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/3856-373-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/3232-379-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/1204-385-0x0000000000400000-0x0000000000464000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
wmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exe8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exewmiptsb.exewmiptsb.exewmiptsb.exe8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiptsb.exe -
Modifies registry class 54 IoCs
Processes:
wmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exe8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmiptsb.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exepid Process 1472 8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe 1472 8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe 1620 wmiptsb.exe 1620 wmiptsb.exe 888 wmiptsb.exe 888 wmiptsb.exe 3624 wmiptsb.exe 3624 wmiptsb.exe 5076 wmiptsb.exe 5076 wmiptsb.exe 2608 wmiptsb.exe 2608 wmiptsb.exe 3748 wmiptsb.exe 3748 wmiptsb.exe 4036 wmiptsb.exe 4036 wmiptsb.exe 4572 wmiptsb.exe 4572 wmiptsb.exe 2604 wmiptsb.exe 2604 wmiptsb.exe 1132 wmiptsb.exe 1132 wmiptsb.exe 1708 wmiptsb.exe 1708 wmiptsb.exe 1360 wmiptsb.exe 1360 wmiptsb.exe 668 wmiptsb.exe 668 wmiptsb.exe 1664 wmiptsb.exe 1664 wmiptsb.exe 4592 wmiptsb.exe 4592 wmiptsb.exe 4424 wmiptsb.exe 4424 wmiptsb.exe 3728 wmiptsb.exe 3728 wmiptsb.exe 1704 wmiptsb.exe 1704 wmiptsb.exe 2928 wmiptsb.exe 2928 wmiptsb.exe 3156 wmiptsb.exe 3156 wmiptsb.exe 2140 wmiptsb.exe 2140 wmiptsb.exe 1708 wmiptsb.exe 1708 wmiptsb.exe 760 wmiptsb.exe 760 wmiptsb.exe 1656 wmiptsb.exe 1656 wmiptsb.exe 2896 wmiptsb.exe 2896 wmiptsb.exe 3900 wmiptsb.exe 3900 wmiptsb.exe 2844 wmiptsb.exe 2844 wmiptsb.exe 2360 wmiptsb.exe 2360 wmiptsb.exe 4684 wmiptsb.exe 4684 wmiptsb.exe 3700 wmiptsb.exe 3700 wmiptsb.exe 1380 wmiptsb.exe 1380 wmiptsb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exewmiptsb.exedescription pid Process procid_target PID 2892 wrote to memory of 1472 2892 8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe 86 PID 2892 wrote to memory of 1472 2892 8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe 86 PID 2892 wrote to memory of 1472 2892 8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe 86 PID 2892 wrote to memory of 1472 2892 8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe 86 PID 2892 wrote to memory of 1472 2892 8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe 86 PID 2892 wrote to memory of 1472 2892 8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe 86 PID 2892 wrote to memory of 1472 2892 8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe 86 PID 1472 wrote to memory of 1604 1472 8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe 90 PID 1472 wrote to memory of 1604 1472 8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe 90 PID 1472 wrote to memory of 1604 1472 8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe 90 PID 1604 wrote to memory of 1620 1604 wmiptsb.exe 92 PID 1604 wrote to memory of 1620 1604 wmiptsb.exe 92 PID 1604 wrote to memory of 1620 1604 wmiptsb.exe 92 PID 1604 wrote to memory of 1620 1604 wmiptsb.exe 92 PID 1604 wrote to memory of 1620 1604 wmiptsb.exe 92 PID 1604 wrote to memory of 1620 1604 wmiptsb.exe 92 PID 1604 wrote to memory of 1620 1604 wmiptsb.exe 92 PID 1620 wrote to memory of 3996 1620 wmiptsb.exe 95 PID 1620 wrote to memory of 3996 1620 wmiptsb.exe 95 PID 1620 wrote to memory of 3996 1620 wmiptsb.exe 95 PID 3996 wrote to memory of 888 3996 wmiptsb.exe 96 PID 3996 wrote to memory of 888 3996 wmiptsb.exe 96 PID 3996 wrote to memory of 888 3996 wmiptsb.exe 96 PID 3996 wrote to memory of 888 3996 wmiptsb.exe 96 PID 3996 wrote to memory of 888 3996 wmiptsb.exe 96 PID 3996 wrote to memory of 888 3996 wmiptsb.exe 96 PID 3996 wrote to memory of 888 3996 wmiptsb.exe 96 PID 888 wrote to memory of 1576 888 wmiptsb.exe 98 PID 888 wrote to memory of 1576 888 wmiptsb.exe 98 PID 888 wrote to memory of 1576 888 wmiptsb.exe 98 PID 1576 wrote to memory of 3624 1576 wmiptsb.exe 99 PID 1576 wrote to memory of 3624 1576 wmiptsb.exe 99 PID 1576 wrote to memory of 3624 1576 wmiptsb.exe 99 PID 1576 wrote to memory of 3624 1576 wmiptsb.exe 99 PID 1576 wrote to memory of 3624 1576 wmiptsb.exe 99 PID 1576 wrote to memory of 3624 1576 wmiptsb.exe 99 PID 1576 wrote to memory of 3624 1576 wmiptsb.exe 99 PID 3624 wrote to memory of 4708 3624 wmiptsb.exe 104 PID 3624 wrote to memory of 4708 3624 wmiptsb.exe 104 PID 3624 wrote to memory of 4708 3624 wmiptsb.exe 104 PID 4708 wrote to memory of 5076 4708 wmiptsb.exe 105 PID 4708 wrote to memory of 5076 4708 wmiptsb.exe 105 PID 4708 wrote to memory of 5076 4708 wmiptsb.exe 105 PID 4708 wrote to memory of 5076 4708 wmiptsb.exe 105 PID 4708 wrote to memory of 5076 4708 wmiptsb.exe 105 PID 4708 wrote to memory of 5076 4708 wmiptsb.exe 105 PID 4708 wrote to memory of 5076 4708 wmiptsb.exe 105 PID 5076 wrote to memory of 2736 5076 wmiptsb.exe 106 PID 5076 wrote to memory of 2736 5076 wmiptsb.exe 106 PID 5076 wrote to memory of 2736 5076 wmiptsb.exe 106 PID 2736 wrote to memory of 2608 2736 wmiptsb.exe 107 PID 2736 wrote to memory of 2608 2736 wmiptsb.exe 107 PID 2736 wrote to memory of 2608 2736 wmiptsb.exe 107 PID 2736 wrote to memory of 2608 2736 wmiptsb.exe 107 PID 2736 wrote to memory of 2608 2736 wmiptsb.exe 107 PID 2736 wrote to memory of 2608 2736 wmiptsb.exe 107 PID 2736 wrote to memory of 2608 2736 wmiptsb.exe 107 PID 2608 wrote to memory of 4176 2608 wmiptsb.exe 108 PID 2608 wrote to memory of 4176 2608 wmiptsb.exe 108 PID 2608 wrote to memory of 4176 2608 wmiptsb.exe 108 PID 4176 wrote to memory of 3748 4176 wmiptsb.exe 109 PID 4176 wrote to memory of 3748 4176 wmiptsb.exe 109 PID 4176 wrote to memory of 3748 4176 wmiptsb.exe 109 PID 4176 wrote to memory of 3748 4176 wmiptsb.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8f9ef0f010a95e55bd3b05937cc82a0f_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Users\Admin\AppData\Local\Temp\8F9EF0~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Users\Admin\AppData\Local\Temp\8F9EF0~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3748 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2280 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4036 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2940 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4572 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4080 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2604 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4904 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1132 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1252 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1708 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4448 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1360 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2028 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:668 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2904 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1664 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4704 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe32⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4592 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4440 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe34⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4424 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3964 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe36⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3728 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4952 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe38⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1704 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2808 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe40⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2928 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:924 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe42⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3156 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:392 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe44⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2140 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1652 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe46⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1708 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5056 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe48⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:760 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2268 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe50⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1656 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:960 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe52⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2896 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4468 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe54⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3900 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2332 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe56⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2844 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1936 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe58⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2360 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4884 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe60⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4684 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3540 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe62⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3700 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2236 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe64⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1380 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4808 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe66⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1916 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe67⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1252 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe68⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1484 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe69⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3064 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe70⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4180 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe71⤵
- Suspicious use of SetThreadContext
PID:2740 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe72⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1552 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe73⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2912 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe74⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4416 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe75⤵
- Suspicious use of SetThreadContext
PID:2320 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe76⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2792 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe77⤵
- Suspicious use of SetThreadContext
PID:3476 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe78⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2428 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe79⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2840 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe80⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1212 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe81⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2660 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe82⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4324 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe83⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2628 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe84⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1252 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe85⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2264 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe86⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:112 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe87⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1096 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe88⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4360 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe89⤵
- Suspicious use of SetThreadContext
PID:1908 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe90⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2912 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe91⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1616 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe92⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4732 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe93⤵
- Suspicious use of SetThreadContext
PID:4992 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe94⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2656 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe95⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:536 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe96⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3472 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe97⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4092 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe98⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1656 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe99⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1556 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe100⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4704 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe101⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2116 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe102⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3856 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe103⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1604 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe104⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3232 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe105⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:100 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe106⤵
- Checks computer location settings
- Modifies registry class
PID:1204 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe107⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1412 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\SysWOW64\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe108⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:552 -
C:\Windows\SysWOW64\wmiptsb.exe"C:\Windows\system32\wmiptsb.exe" C:\Windows\SysWOW64\wmiptsb.exe109⤵PID:2140
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
227KB
MD58f9ef0f010a95e55bd3b05937cc82a0f
SHA19fb4d985eefbcb5d53f010e24aee392f5073e590
SHA2561559d716850009fc107e3c3df913b205f94083c8e2401f7741c4b880af9ed019
SHA51298e6186b87f945cf96ec8e0c1d88bb481bd9f79bd418e8474afd699a4bccf088577e76e04291a278a672b03c2f36a946269431615de7e10cc1644c2ad1e5ba7d