Analysis
-
max time kernel
148s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 21:55
Static task
static1
Behavioral task
behavioral1
Sample
90df2ee61b9f57b1f9a84fbfe7229956_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
90df2ee61b9f57b1f9a84fbfe7229956_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
90df2ee61b9f57b1f9a84fbfe7229956_JaffaCakes118.exe
-
Size
160KB
-
MD5
90df2ee61b9f57b1f9a84fbfe7229956
-
SHA1
2a7661c18a53a803e70f4b240d6cbf65f5da877e
-
SHA256
e16633a047908f513cbdcb2fb3a11768c0477bd71a47f59ad4fb745b6718016c
-
SHA512
43c6acefc7fab1fbfc0f28e858b223e6635b13dcf12416893f1f432d51f0da84866d8bb22dea9d9d441258a50f90e66efdff068e5f615622c9c6be6cbe719249
-
SSDEEP
3072:EwFzDhkZHdMGKhkXaW+/8z4SmwIGkr/VP4qFksnliFvt8AC+c:1FJeSSxtKwxkr/p4qiIi8
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 24 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation wnpkm2.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation wnpkm2.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation wnpkm2.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation wnpkm2.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation wnpkm2.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation wnpkm2.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation wnpkm2.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 90df2ee61b9f57b1f9a84fbfe7229956_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation wnpkm2.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation wnpkm2.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation wnpkm2.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation wnpkm2.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation wnpkm2.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation wnpkm2.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation wnpkm2.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation wnpkm2.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation wnpkm2.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation wnpkm2.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation wnpkm2.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation wnpkm2.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation wnpkm2.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation wnpkm2.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation wnpkm2.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation wnpkm2.exe -
Deletes itself 1 IoCs
pid Process 4044 wnpkm2.exe -
Executes dropped EXE 48 IoCs
pid Process 3300 wnpkm2.exe 4044 wnpkm2.exe 3536 wnpkm2.exe 3524 wnpkm2.exe 2128 wnpkm2.exe 3576 wnpkm2.exe 4112 wnpkm2.exe 4528 wnpkm2.exe 4744 wnpkm2.exe 1676 wnpkm2.exe 4904 wnpkm2.exe 3760 wnpkm2.exe 228 wnpkm2.exe 868 wnpkm2.exe 2492 wnpkm2.exe 4508 wnpkm2.exe 4148 wnpkm2.exe 656 wnpkm2.exe 760 wnpkm2.exe 1848 wnpkm2.exe 2860 wnpkm2.exe 1204 wnpkm2.exe 2168 wnpkm2.exe 3132 wnpkm2.exe 4936 wnpkm2.exe 1820 wnpkm2.exe 4352 wnpkm2.exe 2316 wnpkm2.exe 4128 wnpkm2.exe 4132 wnpkm2.exe 1528 wnpkm2.exe 1096 wnpkm2.exe 2356 wnpkm2.exe 2888 wnpkm2.exe 4472 wnpkm2.exe 2504 wnpkm2.exe 3536 wnpkm2.exe 4640 wnpkm2.exe 540 wnpkm2.exe 5096 wnpkm2.exe 2948 wnpkm2.exe 4820 wnpkm2.exe 2408 wnpkm2.exe 4608 wnpkm2.exe 972 wnpkm2.exe 3764 wnpkm2.exe 3248 wnpkm2.exe 4248 wnpkm2.exe -
Maps connected drives based on registry 3 TTPs 50 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 90df2ee61b9f57b1f9a84fbfe7229956_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 90df2ee61b9f57b1f9a84fbfe7229956_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpkm2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpkm2.exe -
Drops file in System32 directory 48 IoCs
description ioc Process File created C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File opened for modification C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File created C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File opened for modification C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File opened for modification C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File created C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File opened for modification C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File created C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File created C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File created C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File created C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File opened for modification C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File opened for modification C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File created C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File created C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File opened for modification C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File created C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File opened for modification C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File opened for modification C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File opened for modification C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File opened for modification C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File opened for modification C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File opened for modification C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File created C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File opened for modification C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File created C:\Windows\SysWOW64\wnpkm2.exe 90df2ee61b9f57b1f9a84fbfe7229956_JaffaCakes118.exe File created C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File opened for modification C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File created C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File created C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File created C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File opened for modification C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File opened for modification C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File created C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File created C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File opened for modification C:\Windows\SysWOW64\wnpkm2.exe 90df2ee61b9f57b1f9a84fbfe7229956_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File opened for modification C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File created C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File created C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File created C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File created C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File opened for modification C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File opened for modification C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File created C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File opened for modification C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File created C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe File opened for modification C:\Windows\SysWOW64\wnpkm2.exe wnpkm2.exe -
Suspicious use of SetThreadContext 25 IoCs
description pid Process procid_target PID 1820 set thread context of 4564 1820 90df2ee61b9f57b1f9a84fbfe7229956_JaffaCakes118.exe 83 PID 3300 set thread context of 4044 3300 wnpkm2.exe 93 PID 3536 set thread context of 3524 3536 wnpkm2.exe 102 PID 2128 set thread context of 3576 2128 wnpkm2.exe 104 PID 4112 set thread context of 4528 4112 wnpkm2.exe 106 PID 4744 set thread context of 1676 4744 wnpkm2.exe 110 PID 4904 set thread context of 3760 4904 wnpkm2.exe 113 PID 228 set thread context of 868 228 wnpkm2.exe 115 PID 2492 set thread context of 4508 2492 wnpkm2.exe 117 PID 4148 set thread context of 656 4148 wnpkm2.exe 119 PID 760 set thread context of 1848 760 wnpkm2.exe 121 PID 2860 set thread context of 1204 2860 wnpkm2.exe 124 PID 2168 set thread context of 3132 2168 wnpkm2.exe 126 PID 4936 set thread context of 1820 4936 wnpkm2.exe 128 PID 4352 set thread context of 2316 4352 wnpkm2.exe 130 PID 4128 set thread context of 4132 4128 wnpkm2.exe 132 PID 1528 set thread context of 1096 1528 wnpkm2.exe 134 PID 2356 set thread context of 2888 2356 wnpkm2.exe 136 PID 4472 set thread context of 2504 4472 wnpkm2.exe 138 PID 3536 set thread context of 4640 3536 wnpkm2.exe 140 PID 540 set thread context of 5096 540 wnpkm2.exe 142 PID 2948 set thread context of 4820 2948 wnpkm2.exe 144 PID 2408 set thread context of 4608 2408 wnpkm2.exe 146 PID 972 set thread context of 3764 972 wnpkm2.exe 148 PID 3248 set thread context of 4248 3248 wnpkm2.exe 150 -
resource yara_rule behavioral2/memory/4564-3-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4564-2-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4564-5-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4564-4-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4564-41-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4044-48-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4044-47-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4044-46-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4044-50-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/3524-56-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/3524-54-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/3524-55-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/3524-58-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/3576-62-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/3576-63-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/3576-65-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4528-72-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/1676-79-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/3760-86-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/868-92-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/868-97-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4508-101-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4508-104-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/656-113-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/1848-119-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/1204-126-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/3132-135-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/1820-140-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/1820-144-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/2316-152-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4132-156-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4132-161-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/1096-166-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/1096-170-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/2888-175-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/2888-179-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/2504-183-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/2504-188-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4640-196-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/5096-201-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/5096-206-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4820-214-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4608-219-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4608-222-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/3764-226-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/3764-229-0x0000000000400000-0x000000000046C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 49 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 90df2ee61b9f57b1f9a84fbfe7229956_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 90df2ee61b9f57b1f9a84fbfe7229956_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpkm2.exe -
Modifies registry class 49 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm2.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings wnpkm2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm2.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings wnpkm2.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings wnpkm2.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings wnpkm2.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings wnpkm2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm2.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings wnpkm2.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings wnpkm2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm2.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings wnpkm2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm2.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings wnpkm2.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings wnpkm2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm2.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings wnpkm2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm2.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings wnpkm2.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings wnpkm2.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 90df2ee61b9f57b1f9a84fbfe7229956_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings wnpkm2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm2.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings wnpkm2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm2.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings wnpkm2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm2.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings wnpkm2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm2.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings wnpkm2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm2.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings wnpkm2.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings wnpkm2.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings wnpkm2.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings wnpkm2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm2.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings wnpkm2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 90df2ee61b9f57b1f9a84fbfe7229956_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings wnpkm2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpkm2.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 4564 90df2ee61b9f57b1f9a84fbfe7229956_JaffaCakes118.exe 4564 90df2ee61b9f57b1f9a84fbfe7229956_JaffaCakes118.exe 4044 wnpkm2.exe 4044 wnpkm2.exe 3524 wnpkm2.exe 3524 wnpkm2.exe 3576 wnpkm2.exe 3576 wnpkm2.exe 4528 wnpkm2.exe 4528 wnpkm2.exe 1676 wnpkm2.exe 1676 wnpkm2.exe 3760 wnpkm2.exe 3760 wnpkm2.exe 868 wnpkm2.exe 868 wnpkm2.exe 4508 wnpkm2.exe 4508 wnpkm2.exe 656 wnpkm2.exe 656 wnpkm2.exe 1848 wnpkm2.exe 1848 wnpkm2.exe 1204 wnpkm2.exe 1204 wnpkm2.exe 3132 wnpkm2.exe 3132 wnpkm2.exe 1820 wnpkm2.exe 1820 wnpkm2.exe 2316 wnpkm2.exe 2316 wnpkm2.exe 4132 wnpkm2.exe 4132 wnpkm2.exe 1096 wnpkm2.exe 1096 wnpkm2.exe 2888 wnpkm2.exe 2888 wnpkm2.exe 2504 wnpkm2.exe 2504 wnpkm2.exe 4640 wnpkm2.exe 4640 wnpkm2.exe 5096 wnpkm2.exe 5096 wnpkm2.exe 4820 wnpkm2.exe 4820 wnpkm2.exe 4608 wnpkm2.exe 4608 wnpkm2.exe 3764 wnpkm2.exe 3764 wnpkm2.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1820 wrote to memory of 4564 1820 90df2ee61b9f57b1f9a84fbfe7229956_JaffaCakes118.exe 83 PID 1820 wrote to memory of 4564 1820 90df2ee61b9f57b1f9a84fbfe7229956_JaffaCakes118.exe 83 PID 1820 wrote to memory of 4564 1820 90df2ee61b9f57b1f9a84fbfe7229956_JaffaCakes118.exe 83 PID 1820 wrote to memory of 4564 1820 90df2ee61b9f57b1f9a84fbfe7229956_JaffaCakes118.exe 83 PID 1820 wrote to memory of 4564 1820 90df2ee61b9f57b1f9a84fbfe7229956_JaffaCakes118.exe 83 PID 1820 wrote to memory of 4564 1820 90df2ee61b9f57b1f9a84fbfe7229956_JaffaCakes118.exe 83 PID 1820 wrote to memory of 4564 1820 90df2ee61b9f57b1f9a84fbfe7229956_JaffaCakes118.exe 83 PID 4564 wrote to memory of 3300 4564 90df2ee61b9f57b1f9a84fbfe7229956_JaffaCakes118.exe 92 PID 4564 wrote to memory of 3300 4564 90df2ee61b9f57b1f9a84fbfe7229956_JaffaCakes118.exe 92 PID 4564 wrote to memory of 3300 4564 90df2ee61b9f57b1f9a84fbfe7229956_JaffaCakes118.exe 92 PID 3300 wrote to memory of 4044 3300 wnpkm2.exe 93 PID 3300 wrote to memory of 4044 3300 wnpkm2.exe 93 PID 3300 wrote to memory of 4044 3300 wnpkm2.exe 93 PID 3300 wrote to memory of 4044 3300 wnpkm2.exe 93 PID 3300 wrote to memory of 4044 3300 wnpkm2.exe 93 PID 3300 wrote to memory of 4044 3300 wnpkm2.exe 93 PID 3300 wrote to memory of 4044 3300 wnpkm2.exe 93 PID 4044 wrote to memory of 3536 4044 wnpkm2.exe 101 PID 4044 wrote to memory of 3536 4044 wnpkm2.exe 101 PID 4044 wrote to memory of 3536 4044 wnpkm2.exe 101 PID 3536 wrote to memory of 3524 3536 wnpkm2.exe 102 PID 3536 wrote to memory of 3524 3536 wnpkm2.exe 102 PID 3536 wrote to memory of 3524 3536 wnpkm2.exe 102 PID 3536 wrote to memory of 3524 3536 wnpkm2.exe 102 PID 3536 wrote to memory of 3524 3536 wnpkm2.exe 102 PID 3536 wrote to memory of 3524 3536 wnpkm2.exe 102 PID 3536 wrote to memory of 3524 3536 wnpkm2.exe 102 PID 3524 wrote to memory of 2128 3524 wnpkm2.exe 103 PID 3524 wrote to memory of 2128 3524 wnpkm2.exe 103 PID 3524 wrote to memory of 2128 3524 wnpkm2.exe 103 PID 2128 wrote to memory of 3576 2128 wnpkm2.exe 104 PID 2128 wrote to memory of 3576 2128 wnpkm2.exe 104 PID 2128 wrote to memory of 3576 2128 wnpkm2.exe 104 PID 2128 wrote to memory of 3576 2128 wnpkm2.exe 104 PID 2128 wrote to memory of 3576 2128 wnpkm2.exe 104 PID 2128 wrote to memory of 3576 2128 wnpkm2.exe 104 PID 2128 wrote to memory of 3576 2128 wnpkm2.exe 104 PID 3576 wrote to memory of 4112 3576 wnpkm2.exe 105 PID 3576 wrote to memory of 4112 3576 wnpkm2.exe 105 PID 3576 wrote to memory of 4112 3576 wnpkm2.exe 105 PID 4112 wrote to memory of 4528 4112 wnpkm2.exe 106 PID 4112 wrote to memory of 4528 4112 wnpkm2.exe 106 PID 4112 wrote to memory of 4528 4112 wnpkm2.exe 106 PID 4112 wrote to memory of 4528 4112 wnpkm2.exe 106 PID 4112 wrote to memory of 4528 4112 wnpkm2.exe 106 PID 4112 wrote to memory of 4528 4112 wnpkm2.exe 106 PID 4112 wrote to memory of 4528 4112 wnpkm2.exe 106 PID 4528 wrote to memory of 4744 4528 wnpkm2.exe 109 PID 4528 wrote to memory of 4744 4528 wnpkm2.exe 109 PID 4528 wrote to memory of 4744 4528 wnpkm2.exe 109 PID 4744 wrote to memory of 1676 4744 wnpkm2.exe 110 PID 4744 wrote to memory of 1676 4744 wnpkm2.exe 110 PID 4744 wrote to memory of 1676 4744 wnpkm2.exe 110 PID 4744 wrote to memory of 1676 4744 wnpkm2.exe 110 PID 4744 wrote to memory of 1676 4744 wnpkm2.exe 110 PID 4744 wrote to memory of 1676 4744 wnpkm2.exe 110 PID 4744 wrote to memory of 1676 4744 wnpkm2.exe 110 PID 1676 wrote to memory of 4904 1676 wnpkm2.exe 112 PID 1676 wrote to memory of 4904 1676 wnpkm2.exe 112 PID 1676 wrote to memory of 4904 1676 wnpkm2.exe 112 PID 4904 wrote to memory of 3760 4904 wnpkm2.exe 113 PID 4904 wrote to memory of 3760 4904 wnpkm2.exe 113 PID 4904 wrote to memory of 3760 4904 wnpkm2.exe 113 PID 4904 wrote to memory of 3760 4904 wnpkm2.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\90df2ee61b9f57b1f9a84fbfe7229956_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\90df2ee61b9f57b1f9a84fbfe7229956_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\90df2ee61b9f57b1f9a84fbfe7229956_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\90df2ee61b9f57b1f9a84fbfe7229956_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Users\Admin\AppData\Local\Temp\90DF2E~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Users\Admin\AppData\Local\Temp\90DF2E~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3760 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:228 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:868 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2492 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4508 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4148 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:656 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:760 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1848 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2860 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1204 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2168 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3132 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4936 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1820 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4352 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2316 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4128 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe32⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4132 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1528 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe34⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1096 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2356 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe36⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2888 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4472 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe38⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2504 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3536 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe40⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4640 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:540 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe42⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5096 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2948 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe44⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4820 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2408 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe46⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4608 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:972 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe48⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3764 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3248 -
C:\Windows\SysWOW64\wnpkm2.exe"C:\Windows\system32\wnpkm2.exe" C:\Windows\SysWOW64\wnpkm2.exe50⤵
- Executes dropped EXE
- Maps connected drives based on registry
PID:4248
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160KB
MD590df2ee61b9f57b1f9a84fbfe7229956
SHA12a7661c18a53a803e70f4b240d6cbf65f5da877e
SHA256e16633a047908f513cbdcb2fb3a11768c0477bd71a47f59ad4fb745b6718016c
SHA51243c6acefc7fab1fbfc0f28e858b223e6635b13dcf12416893f1f432d51f0da84866d8bb22dea9d9d441258a50f90e66efdff068e5f615622c9c6be6cbe719249