Analysis
-
max time kernel
148s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 03:42
Behavioral task
behavioral1
Sample
925bb25233da281843c47b4518d0250d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
925bb25233da281843c47b4518d0250d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
925bb25233da281843c47b4518d0250d_JaffaCakes118.exe
-
Size
119KB
-
MD5
925bb25233da281843c47b4518d0250d
-
SHA1
8b1c9a4554b15fb23bf2c1ed5db212b78507e832
-
SHA256
e19a27753b1bbb06c11ee8f10d4fa64e872ddbe687cff591b249b75de9b005d8
-
SHA512
abd509099e815b76b0ba551138b49d9be7997cbaa7d219f22ace67d4203f97e0c43b0456c8c8929aa5f0f581d219369a99e7ff9a85db00ec47bce22f2acb2b09
-
SSDEEP
3072:iFJnmsxmJFVZDZFYFCrqhkKJXHS+W8DTpvgYSfout:SJjmJHZnGCrqCKJM8x4YSfoS
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 320 wmisrvc.exe -
Executes dropped EXE 64 IoCs
pid Process 320 wmisrvc.exe 2788 wmisrvc.exe 2740 wmisrvc.exe 2716 wmisrvc.exe 2632 wmisrvc.exe 2532 wmisrvc.exe 2560 wmisrvc.exe 1268 wmisrvc.exe 1148 wmisrvc.exe 2988 wmisrvc.exe 2232 wmisrvc.exe 1096 wmisrvc.exe 1940 wmisrvc.exe 1288 wmisrvc.exe 1956 wmisrvc.exe 1532 wmisrvc.exe 1484 wmisrvc.exe 1480 wmisrvc.exe 2016 wmisrvc.exe 792 wmisrvc.exe 2104 wmisrvc.exe 2720 wmisrvc.exe 2736 wmisrvc.exe 2816 wmisrvc.exe 2796 wmisrvc.exe 2604 wmisrvc.exe 1508 wmisrvc.exe 2896 wmisrvc.exe 2940 wmisrvc.exe 2892 wmisrvc.exe 2960 wmisrvc.exe 2948 wmisrvc.exe 1984 wmisrvc.exe 1608 wmisrvc.exe 2252 wmisrvc.exe 2184 wmisrvc.exe 1244 wmisrvc.exe 1072 wmisrvc.exe 2432 wmisrvc.exe 1332 wmisrvc.exe 1760 wmisrvc.exe 712 wmisrvc.exe 1532 wmisrvc.exe 2656 wmisrvc.exe 2424 wmisrvc.exe 1712 wmisrvc.exe 2240 wmisrvc.exe 2784 wmisrvc.exe 2732 wmisrvc.exe 2852 wmisrvc.exe 2816 wmisrvc.exe 1944 wmisrvc.exe 2716 wmisrvc.exe 2632 wmisrvc.exe 1788 wmisrvc.exe 1736 wmisrvc.exe 1580 wmisrvc.exe 1224 wmisrvc.exe 2140 wmisrvc.exe 2952 wmisrvc.exe 2124 wmisrvc.exe 2252 wmisrvc.exe 1520 wmisrvc.exe 1096 wmisrvc.exe -
Loads dropped DLL 64 IoCs
pid Process 2348 925bb25233da281843c47b4518d0250d_JaffaCakes118.exe 2348 925bb25233da281843c47b4518d0250d_JaffaCakes118.exe 320 wmisrvc.exe 320 wmisrvc.exe 2788 wmisrvc.exe 2788 wmisrvc.exe 2740 wmisrvc.exe 2740 wmisrvc.exe 2716 wmisrvc.exe 2716 wmisrvc.exe 2632 wmisrvc.exe 2632 wmisrvc.exe 2532 wmisrvc.exe 2532 wmisrvc.exe 2560 wmisrvc.exe 2560 wmisrvc.exe 1268 wmisrvc.exe 1268 wmisrvc.exe 1148 wmisrvc.exe 1148 wmisrvc.exe 2988 wmisrvc.exe 2988 wmisrvc.exe 2232 wmisrvc.exe 2232 wmisrvc.exe 1096 wmisrvc.exe 1096 wmisrvc.exe 1940 wmisrvc.exe 1940 wmisrvc.exe 1288 wmisrvc.exe 1288 wmisrvc.exe 1956 wmisrvc.exe 1956 wmisrvc.exe 1532 wmisrvc.exe 1532 wmisrvc.exe 1484 wmisrvc.exe 1484 wmisrvc.exe 1480 wmisrvc.exe 1480 wmisrvc.exe 2016 wmisrvc.exe 2016 wmisrvc.exe 792 wmisrvc.exe 792 wmisrvc.exe 2104 wmisrvc.exe 2104 wmisrvc.exe 2720 wmisrvc.exe 2720 wmisrvc.exe 2736 wmisrvc.exe 2736 wmisrvc.exe 2816 wmisrvc.exe 2816 wmisrvc.exe 2796 wmisrvc.exe 2796 wmisrvc.exe 2604 wmisrvc.exe 2604 wmisrvc.exe 1508 wmisrvc.exe 1508 wmisrvc.exe 2896 wmisrvc.exe 2896 wmisrvc.exe 2940 wmisrvc.exe 2940 wmisrvc.exe 2892 wmisrvc.exe 2892 wmisrvc.exe 2960 wmisrvc.exe 2960 wmisrvc.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File opened for modification C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File created C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File created C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File created C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File opened for modification C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File opened for modification C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File created C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File created C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File created C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File created C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File created C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File opened for modification C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File opened for modification C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File opened for modification C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File created C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File opened for modification C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File created C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File opened for modification C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File created C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File created C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File created C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File opened for modification C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File opened for modification C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File opened for modification C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File created C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File created C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File opened for modification C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File opened for modification C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File created C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File opened for modification C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File opened for modification C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File created C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File opened for modification C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File created C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File created C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File opened for modification C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File created C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File opened for modification C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File opened for modification C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File created C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File opened for modification C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File opened for modification C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File created C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File created C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File created C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File created C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File opened for modification C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File opened for modification C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File created C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File created C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File opened for modification C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File opened for modification C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File opened for modification C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File opened for modification C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File created C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File opened for modification C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File created C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File created C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File created C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File opened for modification C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File opened for modification C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File opened for modification C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe File created C:\Windows\SysWOW64\wmisrvc.exe wmisrvc.exe -
resource yara_rule behavioral1/memory/2348-0-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/files/0x0009000000016311-4.dat upx behavioral1/memory/2348-13-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/320-19-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2788-26-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2716-31-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2740-33-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2716-41-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2716-37-0x0000000003170000-0x00000000031CC000-memory.dmp upx behavioral1/memory/2632-46-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2532-47-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2532-53-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2560-56-0x0000000003320000-0x000000000337C000-memory.dmp upx behavioral1/memory/2560-59-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/1268-65-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/1148-66-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/1148-72-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2232-80-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2988-79-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/1096-85-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2232-87-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/1096-94-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/1940-95-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/1940-101-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/1956-108-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/1288-107-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/1956-115-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/1532-122-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/1484-127-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/1480-130-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2016-134-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2104-137-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/792-138-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2104-141-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2720-143-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2736-146-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2816-150-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2816-148-0x0000000003320000-0x000000000337C000-memory.dmp upx behavioral1/memory/2796-154-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2604-156-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/1508-160-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2896-162-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2940-166-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2940-163-0x0000000003580000-0x00000000035DC000-memory.dmp upx behavioral1/memory/2892-169-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2948-171-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2960-170-0x0000000002F80000-0x0000000002FDC000-memory.dmp upx behavioral1/memory/2960-173-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2948-175-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/1984-177-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/1608-178-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2252-180-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2184-182-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/1072-184-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/1244-186-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/1072-188-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2432-191-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2432-189-0x00000000031C0000-0x000000000321C000-memory.dmp upx behavioral1/memory/1332-193-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/1760-194-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/1760-196-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/712-197-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/1532-198-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/1332-199-0x00000000030C0000-0x000000000311C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrvc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2348 925bb25233da281843c47b4518d0250d_JaffaCakes118.exe 320 wmisrvc.exe 2788 wmisrvc.exe 2740 wmisrvc.exe 2716 wmisrvc.exe 2632 wmisrvc.exe 2532 wmisrvc.exe 2560 wmisrvc.exe 1268 wmisrvc.exe 1148 wmisrvc.exe 2988 wmisrvc.exe 2232 wmisrvc.exe 1096 wmisrvc.exe 1940 wmisrvc.exe 1288 wmisrvc.exe 1956 wmisrvc.exe 1532 wmisrvc.exe 1484 wmisrvc.exe 1480 wmisrvc.exe 2016 wmisrvc.exe 792 wmisrvc.exe 2104 wmisrvc.exe 2720 wmisrvc.exe 2736 wmisrvc.exe 2816 wmisrvc.exe 2796 wmisrvc.exe 2604 wmisrvc.exe 1508 wmisrvc.exe 2896 wmisrvc.exe 2940 wmisrvc.exe 2892 wmisrvc.exe 2960 wmisrvc.exe 2948 wmisrvc.exe 1984 wmisrvc.exe 1608 wmisrvc.exe 2252 wmisrvc.exe 2184 wmisrvc.exe 1244 wmisrvc.exe 1072 wmisrvc.exe 2432 wmisrvc.exe 1332 wmisrvc.exe 1760 wmisrvc.exe 712 wmisrvc.exe 1532 wmisrvc.exe 2656 wmisrvc.exe 1712 wmisrvc.exe 2240 wmisrvc.exe 2784 wmisrvc.exe 2732 wmisrvc.exe 2852 wmisrvc.exe 2816 wmisrvc.exe 1944 wmisrvc.exe 2716 wmisrvc.exe 2632 wmisrvc.exe 1788 wmisrvc.exe 1736 wmisrvc.exe 1580 wmisrvc.exe 1224 wmisrvc.exe 2140 wmisrvc.exe 2952 wmisrvc.exe 2124 wmisrvc.exe 2252 wmisrvc.exe 1520 wmisrvc.exe 1096 wmisrvc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2348 wrote to memory of 320 2348 925bb25233da281843c47b4518d0250d_JaffaCakes118.exe 32 PID 2348 wrote to memory of 320 2348 925bb25233da281843c47b4518d0250d_JaffaCakes118.exe 32 PID 2348 wrote to memory of 320 2348 925bb25233da281843c47b4518d0250d_JaffaCakes118.exe 32 PID 2348 wrote to memory of 320 2348 925bb25233da281843c47b4518d0250d_JaffaCakes118.exe 32 PID 320 wrote to memory of 2788 320 wmisrvc.exe 33 PID 320 wrote to memory of 2788 320 wmisrvc.exe 33 PID 320 wrote to memory of 2788 320 wmisrvc.exe 33 PID 320 wrote to memory of 2788 320 wmisrvc.exe 33 PID 2788 wrote to memory of 2740 2788 wmisrvc.exe 34 PID 2788 wrote to memory of 2740 2788 wmisrvc.exe 34 PID 2788 wrote to memory of 2740 2788 wmisrvc.exe 34 PID 2788 wrote to memory of 2740 2788 wmisrvc.exe 34 PID 2740 wrote to memory of 2716 2740 wmisrvc.exe 35 PID 2740 wrote to memory of 2716 2740 wmisrvc.exe 35 PID 2740 wrote to memory of 2716 2740 wmisrvc.exe 35 PID 2740 wrote to memory of 2716 2740 wmisrvc.exe 35 PID 2716 wrote to memory of 2632 2716 wmisrvc.exe 36 PID 2716 wrote to memory of 2632 2716 wmisrvc.exe 36 PID 2716 wrote to memory of 2632 2716 wmisrvc.exe 36 PID 2716 wrote to memory of 2632 2716 wmisrvc.exe 36 PID 2632 wrote to memory of 2532 2632 wmisrvc.exe 37 PID 2632 wrote to memory of 2532 2632 wmisrvc.exe 37 PID 2632 wrote to memory of 2532 2632 wmisrvc.exe 37 PID 2632 wrote to memory of 2532 2632 wmisrvc.exe 37 PID 2532 wrote to memory of 2560 2532 wmisrvc.exe 38 PID 2532 wrote to memory of 2560 2532 wmisrvc.exe 38 PID 2532 wrote to memory of 2560 2532 wmisrvc.exe 38 PID 2532 wrote to memory of 2560 2532 wmisrvc.exe 38 PID 2560 wrote to memory of 1268 2560 wmisrvc.exe 39 PID 2560 wrote to memory of 1268 2560 wmisrvc.exe 39 PID 2560 wrote to memory of 1268 2560 wmisrvc.exe 39 PID 2560 wrote to memory of 1268 2560 wmisrvc.exe 39 PID 1268 wrote to memory of 1148 1268 wmisrvc.exe 40 PID 1268 wrote to memory of 1148 1268 wmisrvc.exe 40 PID 1268 wrote to memory of 1148 1268 wmisrvc.exe 40 PID 1268 wrote to memory of 1148 1268 wmisrvc.exe 40 PID 1148 wrote to memory of 2988 1148 wmisrvc.exe 41 PID 1148 wrote to memory of 2988 1148 wmisrvc.exe 41 PID 1148 wrote to memory of 2988 1148 wmisrvc.exe 41 PID 1148 wrote to memory of 2988 1148 wmisrvc.exe 41 PID 2988 wrote to memory of 2232 2988 wmisrvc.exe 42 PID 2988 wrote to memory of 2232 2988 wmisrvc.exe 42 PID 2988 wrote to memory of 2232 2988 wmisrvc.exe 42 PID 2988 wrote to memory of 2232 2988 wmisrvc.exe 42 PID 2232 wrote to memory of 1096 2232 wmisrvc.exe 43 PID 2232 wrote to memory of 1096 2232 wmisrvc.exe 43 PID 2232 wrote to memory of 1096 2232 wmisrvc.exe 43 PID 2232 wrote to memory of 1096 2232 wmisrvc.exe 43 PID 1096 wrote to memory of 1940 1096 wmisrvc.exe 44 PID 1096 wrote to memory of 1940 1096 wmisrvc.exe 44 PID 1096 wrote to memory of 1940 1096 wmisrvc.exe 44 PID 1096 wrote to memory of 1940 1096 wmisrvc.exe 44 PID 1940 wrote to memory of 1288 1940 wmisrvc.exe 45 PID 1940 wrote to memory of 1288 1940 wmisrvc.exe 45 PID 1940 wrote to memory of 1288 1940 wmisrvc.exe 45 PID 1940 wrote to memory of 1288 1940 wmisrvc.exe 45 PID 1288 wrote to memory of 1956 1288 wmisrvc.exe 46 PID 1288 wrote to memory of 1956 1288 wmisrvc.exe 46 PID 1288 wrote to memory of 1956 1288 wmisrvc.exe 46 PID 1288 wrote to memory of 1956 1288 wmisrvc.exe 46 PID 1956 wrote to memory of 1532 1956 wmisrvc.exe 47 PID 1956 wrote to memory of 1532 1956 wmisrvc.exe 47 PID 1956 wrote to memory of 1532 1956 wmisrvc.exe 47 PID 1956 wrote to memory of 1532 1956 wmisrvc.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\925bb25233da281843c47b4518d0250d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\925bb25233da281843c47b4518d0250d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Users\Admin\AppData\Local\Temp\925BB2~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1532 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1484 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1480 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2016 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:792 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2104 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2720 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2736 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2816 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2796 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2604 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1508 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2896 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2940 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2892 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2960 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2948 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1984 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe35⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1608 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe36⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2252 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2184 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1244 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1072 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2432 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe41⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1332 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe42⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1760 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:712 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe44⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1532 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2656 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2424 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1712 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe48⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2240 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2784 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2732 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2852 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2816 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1944 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2716 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe55⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2632 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe56⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1788 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe57⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1736 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe58⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1580 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1224 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe60⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2140 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2952 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe62⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2124 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe63⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2252 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1520 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1096 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe66⤵
- System Location Discovery: System Language Discovery
PID:1932 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe67⤵PID:2212
-
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe68⤵PID:1428
-
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe69⤵PID:1848
-
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe70⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1836 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe71⤵
- System Location Discovery: System Language Discovery
PID:892 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe72⤵
- Drops file in System32 directory
PID:1484 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe73⤵
- System Location Discovery: System Language Discovery
PID:536 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe74⤵
- System Location Discovery: System Language Discovery
PID:3056 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe75⤵
- System Location Discovery: System Language Discovery
PID:3068 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe76⤵
- Drops file in System32 directory
PID:2580 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe77⤵
- System Location Discovery: System Language Discovery
PID:1380 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe78⤵
- System Location Discovery: System Language Discovery
PID:2360 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe79⤵
- System Location Discovery: System Language Discovery
PID:2848 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe80⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2368 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe81⤵
- System Location Discovery: System Language Discovery
PID:2296 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe82⤵PID:2128
-
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe83⤵PID:2644
-
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe84⤵
- Drops file in System32 directory
PID:864 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe85⤵
- System Location Discovery: System Language Discovery
PID:1692 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe86⤵
- System Location Discovery: System Language Discovery
PID:1192 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe87⤵
- System Location Discovery: System Language Discovery
PID:2948 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe88⤵PID:1908
-
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe89⤵
- Drops file in System32 directory
PID:2200 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe90⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:332 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe91⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1476 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe92⤵
- Drops file in System32 directory
PID:1556 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe93⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:548 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe94⤵
- System Location Discovery: System Language Discovery
PID:1244 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe95⤵PID:1932
-
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe96⤵PID:2212
-
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe97⤵
- System Location Discovery: System Language Discovery
PID:1760 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe98⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1352 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe99⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2312 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe100⤵PID:3040
-
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe101⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:964 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe102⤵
- System Location Discovery: System Language Discovery
PID:2244 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe103⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2348 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe104⤵
- System Location Discovery: System Language Discovery
PID:2240 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe105⤵PID:796
-
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe106⤵
- Drops file in System32 directory
PID:2860 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe107⤵
- Drops file in System32 directory
PID:940 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe108⤵
- System Location Discovery: System Language Discovery
PID:876 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe109⤵
- System Location Discovery: System Language Discovery
PID:2752 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe110⤵
- System Location Discovery: System Language Discovery
PID:1904 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe111⤵
- Drops file in System32 directory
PID:2604 -
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe112⤵PID:2920
-
C:\Windows\SysWOW64\wmisrvc.exe"C:\Windows\system32\wmisrvc.exe" C:\Windows\SysWOW64\wmisrvc.exe113⤵PID:2636
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
119KB
MD5925bb25233da281843c47b4518d0250d
SHA18b1c9a4554b15fb23bf2c1ed5db212b78507e832
SHA256e19a27753b1bbb06c11ee8f10d4fa64e872ddbe687cff591b249b75de9b005d8
SHA512abd509099e815b76b0ba551138b49d9be7997cbaa7d219f22ace67d4203f97e0c43b0456c8c8929aa5f0f581d219369a99e7ff9a85db00ec47bce22f2acb2b09