Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 11:36
Static task
static1
Behavioral task
behavioral1
Sample
946b9ddf8ffac1f1afd2c17a3764dd02_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
946b9ddf8ffac1f1afd2c17a3764dd02_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
946b9ddf8ffac1f1afd2c17a3764dd02_JaffaCakes118.exe
-
Size
168KB
-
MD5
946b9ddf8ffac1f1afd2c17a3764dd02
-
SHA1
6074d348d472038c6da3b479ad3d46c8a829dffe
-
SHA256
5a206b2df16f9abcdc152e342618a2dc58fbff11fd8e2c64d80590702a437dd6
-
SHA512
4a4abec5a119a63f713e1ebf64baba839bb1205113997ce55398da99c906b76bd1c5f9132df8ea5809f62cee6d1c53dcf8628bcff10932a9505112c71feef775
-
SSDEEP
3072:4GEEhNJBDZ6Zi0mCdUvogGsz7rMX2sRleSsal2AsFsmzVQN6Fl/WA2RDCi+GBpmj:4GP3Z6gFI1jsz74X2sudfsmzW4Fl/Wvq
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 17 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpfv1.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpfv1.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpfv1.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpfv1.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 946b9ddf8ffac1f1afd2c17a3764dd02_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpfv1.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpfv1.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpfv1.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpfv1.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpfv1.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpfv1.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpfv1.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpfv1.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpfv1.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpfv1.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpfv1.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpfv1.exe -
Deletes itself 1 IoCs
pid Process 4220 wmpfv1.exe -
Executes dropped EXE 34 IoCs
pid Process 4548 wmpfv1.exe 4220 wmpfv1.exe 5028 wmpfv1.exe 4424 wmpfv1.exe 4500 wmpfv1.exe 1584 wmpfv1.exe 920 wmpfv1.exe 4716 wmpfv1.exe 4504 wmpfv1.exe 388 wmpfv1.exe 3656 wmpfv1.exe 2312 wmpfv1.exe 3492 wmpfv1.exe 1532 wmpfv1.exe 4968 wmpfv1.exe 1856 wmpfv1.exe 1588 wmpfv1.exe 2916 wmpfv1.exe 1456 wmpfv1.exe 4548 wmpfv1.exe 3508 wmpfv1.exe 2920 wmpfv1.exe 1020 wmpfv1.exe 1680 wmpfv1.exe 2092 wmpfv1.exe 4984 wmpfv1.exe 1752 wmpfv1.exe 4304 wmpfv1.exe 5108 wmpfv1.exe 1712 wmpfv1.exe 3712 wmpfv1.exe 1888 wmpfv1.exe 3496 wmpfv1.exe 4404 wmpfv1.exe -
Drops file in System32 directory 34 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wmpfv1.exe wmpfv1.exe File created C:\Windows\SysWOW64\wmpfv1.exe wmpfv1.exe File created C:\Windows\SysWOW64\wmpfv1.exe wmpfv1.exe File created C:\Windows\SysWOW64\wmpfv1.exe wmpfv1.exe File created C:\Windows\SysWOW64\wmpfv1.exe wmpfv1.exe File opened for modification C:\Windows\SysWOW64\wmpfv1.exe wmpfv1.exe File created C:\Windows\SysWOW64\wmpfv1.exe wmpfv1.exe File opened for modification C:\Windows\SysWOW64\wmpfv1.exe wmpfv1.exe File opened for modification C:\Windows\SysWOW64\wmpfv1.exe wmpfv1.exe File opened for modification C:\Windows\SysWOW64\wmpfv1.exe 946b9ddf8ffac1f1afd2c17a3764dd02_JaffaCakes118.exe File created C:\Windows\SysWOW64\wmpfv1.exe 946b9ddf8ffac1f1afd2c17a3764dd02_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wmpfv1.exe wmpfv1.exe File opened for modification C:\Windows\SysWOW64\wmpfv1.exe wmpfv1.exe File created C:\Windows\SysWOW64\wmpfv1.exe wmpfv1.exe File created C:\Windows\SysWOW64\wmpfv1.exe wmpfv1.exe File opened for modification C:\Windows\SysWOW64\wmpfv1.exe wmpfv1.exe File created C:\Windows\SysWOW64\wmpfv1.exe wmpfv1.exe File opened for modification C:\Windows\SysWOW64\wmpfv1.exe wmpfv1.exe File created C:\Windows\SysWOW64\wmpfv1.exe wmpfv1.exe File created C:\Windows\SysWOW64\wmpfv1.exe wmpfv1.exe File opened for modification C:\Windows\SysWOW64\wmpfv1.exe wmpfv1.exe File created C:\Windows\SysWOW64\wmpfv1.exe wmpfv1.exe File opened for modification C:\Windows\SysWOW64\wmpfv1.exe wmpfv1.exe File created C:\Windows\SysWOW64\wmpfv1.exe wmpfv1.exe File created C:\Windows\SysWOW64\wmpfv1.exe wmpfv1.exe File created C:\Windows\SysWOW64\wmpfv1.exe wmpfv1.exe File opened for modification C:\Windows\SysWOW64\wmpfv1.exe wmpfv1.exe File opened for modification C:\Windows\SysWOW64\wmpfv1.exe wmpfv1.exe File created C:\Windows\SysWOW64\wmpfv1.exe wmpfv1.exe File opened for modification C:\Windows\SysWOW64\wmpfv1.exe wmpfv1.exe File opened for modification C:\Windows\SysWOW64\wmpfv1.exe wmpfv1.exe File opened for modification C:\Windows\SysWOW64\wmpfv1.exe wmpfv1.exe File opened for modification C:\Windows\SysWOW64\wmpfv1.exe wmpfv1.exe File created C:\Windows\SysWOW64\wmpfv1.exe wmpfv1.exe -
Suspicious use of SetThreadContext 18 IoCs
description pid Process procid_target PID 1240 set thread context of 4988 1240 946b9ddf8ffac1f1afd2c17a3764dd02_JaffaCakes118.exe 84 PID 4548 set thread context of 4220 4548 wmpfv1.exe 91 PID 5028 set thread context of 4424 5028 wmpfv1.exe 93 PID 4500 set thread context of 1584 4500 wmpfv1.exe 95 PID 920 set thread context of 4716 920 wmpfv1.exe 99 PID 4504 set thread context of 388 4504 wmpfv1.exe 101 PID 3656 set thread context of 2312 3656 wmpfv1.exe 103 PID 3492 set thread context of 1532 3492 wmpfv1.exe 105 PID 4968 set thread context of 1856 4968 wmpfv1.exe 107 PID 1588 set thread context of 2916 1588 wmpfv1.exe 109 PID 1456 set thread context of 4548 1456 wmpfv1.exe 111 PID 3508 set thread context of 2920 3508 wmpfv1.exe 113 PID 1020 set thread context of 1680 1020 wmpfv1.exe 115 PID 2092 set thread context of 4984 2092 wmpfv1.exe 117 PID 1752 set thread context of 4304 1752 wmpfv1.exe 119 PID 5108 set thread context of 1712 5108 wmpfv1.exe 121 PID 3712 set thread context of 1888 3712 wmpfv1.exe 123 PID 3496 set thread context of 4404 3496 wmpfv1.exe 125 -
resource yara_rule behavioral2/memory/4988-1-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4988-2-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4988-0-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4988-5-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4988-6-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4988-8-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4988-7-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4988-9-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4988-44-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4220-53-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4220-54-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4220-56-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4220-52-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4220-51-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4220-50-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4220-58-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4424-68-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4424-67-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4424-66-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4424-65-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4424-71-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/1584-82-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4716-91-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4716-96-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/388-108-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/2312-122-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/1532-129-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/1532-136-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/1856-149-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/2916-162-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4548-169-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4548-177-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/2920-184-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/2920-191-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/1680-205-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4984-218-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4304-231-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/1712-244-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/1888-257-0x0000000000400000-0x000000000046C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 35 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpfv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpfv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpfv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpfv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpfv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpfv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpfv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpfv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpfv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpfv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpfv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpfv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpfv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpfv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpfv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 946b9ddf8ffac1f1afd2c17a3764dd02_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpfv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpfv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpfv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpfv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpfv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpfv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpfv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpfv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpfv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpfv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 946b9ddf8ffac1f1afd2c17a3764dd02_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpfv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpfv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpfv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpfv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpfv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpfv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpfv1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpfv1.exe -
Modifies registry class 17 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 946b9ddf8ffac1f1afd2c17a3764dd02_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpfv1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpfv1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpfv1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpfv1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpfv1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpfv1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpfv1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpfv1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpfv1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpfv1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpfv1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpfv1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpfv1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpfv1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpfv1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpfv1.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 4988 946b9ddf8ffac1f1afd2c17a3764dd02_JaffaCakes118.exe 4988 946b9ddf8ffac1f1afd2c17a3764dd02_JaffaCakes118.exe 4220 wmpfv1.exe 4220 wmpfv1.exe 4424 wmpfv1.exe 4424 wmpfv1.exe 1584 wmpfv1.exe 1584 wmpfv1.exe 4716 wmpfv1.exe 4716 wmpfv1.exe 388 wmpfv1.exe 388 wmpfv1.exe 2312 wmpfv1.exe 2312 wmpfv1.exe 1532 wmpfv1.exe 1532 wmpfv1.exe 1856 wmpfv1.exe 1856 wmpfv1.exe 2916 wmpfv1.exe 2916 wmpfv1.exe 4548 wmpfv1.exe 4548 wmpfv1.exe 2920 wmpfv1.exe 2920 wmpfv1.exe 1680 wmpfv1.exe 1680 wmpfv1.exe 4984 wmpfv1.exe 4984 wmpfv1.exe 4304 wmpfv1.exe 4304 wmpfv1.exe 1712 wmpfv1.exe 1712 wmpfv1.exe 1888 wmpfv1.exe 1888 wmpfv1.exe 4404 wmpfv1.exe 4404 wmpfv1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1240 wrote to memory of 4988 1240 946b9ddf8ffac1f1afd2c17a3764dd02_JaffaCakes118.exe 84 PID 1240 wrote to memory of 4988 1240 946b9ddf8ffac1f1afd2c17a3764dd02_JaffaCakes118.exe 84 PID 1240 wrote to memory of 4988 1240 946b9ddf8ffac1f1afd2c17a3764dd02_JaffaCakes118.exe 84 PID 1240 wrote to memory of 4988 1240 946b9ddf8ffac1f1afd2c17a3764dd02_JaffaCakes118.exe 84 PID 1240 wrote to memory of 4988 1240 946b9ddf8ffac1f1afd2c17a3764dd02_JaffaCakes118.exe 84 PID 1240 wrote to memory of 4988 1240 946b9ddf8ffac1f1afd2c17a3764dd02_JaffaCakes118.exe 84 PID 1240 wrote to memory of 4988 1240 946b9ddf8ffac1f1afd2c17a3764dd02_JaffaCakes118.exe 84 PID 1240 wrote to memory of 4988 1240 946b9ddf8ffac1f1afd2c17a3764dd02_JaffaCakes118.exe 84 PID 4988 wrote to memory of 4548 4988 946b9ddf8ffac1f1afd2c17a3764dd02_JaffaCakes118.exe 90 PID 4988 wrote to memory of 4548 4988 946b9ddf8ffac1f1afd2c17a3764dd02_JaffaCakes118.exe 90 PID 4988 wrote to memory of 4548 4988 946b9ddf8ffac1f1afd2c17a3764dd02_JaffaCakes118.exe 90 PID 4548 wrote to memory of 4220 4548 wmpfv1.exe 91 PID 4548 wrote to memory of 4220 4548 wmpfv1.exe 91 PID 4548 wrote to memory of 4220 4548 wmpfv1.exe 91 PID 4548 wrote to memory of 4220 4548 wmpfv1.exe 91 PID 4548 wrote to memory of 4220 4548 wmpfv1.exe 91 PID 4548 wrote to memory of 4220 4548 wmpfv1.exe 91 PID 4548 wrote to memory of 4220 4548 wmpfv1.exe 91 PID 4548 wrote to memory of 4220 4548 wmpfv1.exe 91 PID 4220 wrote to memory of 5028 4220 wmpfv1.exe 92 PID 4220 wrote to memory of 5028 4220 wmpfv1.exe 92 PID 4220 wrote to memory of 5028 4220 wmpfv1.exe 92 PID 5028 wrote to memory of 4424 5028 wmpfv1.exe 93 PID 5028 wrote to memory of 4424 5028 wmpfv1.exe 93 PID 5028 wrote to memory of 4424 5028 wmpfv1.exe 93 PID 5028 wrote to memory of 4424 5028 wmpfv1.exe 93 PID 5028 wrote to memory of 4424 5028 wmpfv1.exe 93 PID 5028 wrote to memory of 4424 5028 wmpfv1.exe 93 PID 5028 wrote to memory of 4424 5028 wmpfv1.exe 93 PID 5028 wrote to memory of 4424 5028 wmpfv1.exe 93 PID 4424 wrote to memory of 4500 4424 wmpfv1.exe 94 PID 4424 wrote to memory of 4500 4424 wmpfv1.exe 94 PID 4424 wrote to memory of 4500 4424 wmpfv1.exe 94 PID 4500 wrote to memory of 1584 4500 wmpfv1.exe 95 PID 4500 wrote to memory of 1584 4500 wmpfv1.exe 95 PID 4500 wrote to memory of 1584 4500 wmpfv1.exe 95 PID 4500 wrote to memory of 1584 4500 wmpfv1.exe 95 PID 4500 wrote to memory of 1584 4500 wmpfv1.exe 95 PID 4500 wrote to memory of 1584 4500 wmpfv1.exe 95 PID 4500 wrote to memory of 1584 4500 wmpfv1.exe 95 PID 4500 wrote to memory of 1584 4500 wmpfv1.exe 95 PID 1584 wrote to memory of 920 1584 wmpfv1.exe 97 PID 1584 wrote to memory of 920 1584 wmpfv1.exe 97 PID 1584 wrote to memory of 920 1584 wmpfv1.exe 97 PID 920 wrote to memory of 4716 920 wmpfv1.exe 99 PID 920 wrote to memory of 4716 920 wmpfv1.exe 99 PID 920 wrote to memory of 4716 920 wmpfv1.exe 99 PID 920 wrote to memory of 4716 920 wmpfv1.exe 99 PID 920 wrote to memory of 4716 920 wmpfv1.exe 99 PID 920 wrote to memory of 4716 920 wmpfv1.exe 99 PID 920 wrote to memory of 4716 920 wmpfv1.exe 99 PID 920 wrote to memory of 4716 920 wmpfv1.exe 99 PID 4716 wrote to memory of 4504 4716 wmpfv1.exe 100 PID 4716 wrote to memory of 4504 4716 wmpfv1.exe 100 PID 4716 wrote to memory of 4504 4716 wmpfv1.exe 100 PID 4504 wrote to memory of 388 4504 wmpfv1.exe 101 PID 4504 wrote to memory of 388 4504 wmpfv1.exe 101 PID 4504 wrote to memory of 388 4504 wmpfv1.exe 101 PID 4504 wrote to memory of 388 4504 wmpfv1.exe 101 PID 4504 wrote to memory of 388 4504 wmpfv1.exe 101 PID 4504 wrote to memory of 388 4504 wmpfv1.exe 101 PID 4504 wrote to memory of 388 4504 wmpfv1.exe 101 PID 4504 wrote to memory of 388 4504 wmpfv1.exe 101 PID 388 wrote to memory of 3656 388 wmpfv1.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\946b9ddf8ffac1f1afd2c17a3764dd02_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\946b9ddf8ffac1f1afd2c17a3764dd02_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\946b9ddf8ffac1f1afd2c17a3764dd02_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\946b9ddf8ffac1f1afd2c17a3764dd02_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\wmpfv1.exe"C:\Windows\system32\wmpfv1.exe" C:\Users\Admin\AppData\Local\Temp\946B9D~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\SysWOW64\wmpfv1.exe"C:\Windows\system32\wmpfv1.exe" C:\Users\Admin\AppData\Local\Temp\946B9D~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\SysWOW64\wmpfv1.exe"C:\Windows\system32\wmpfv1.exe" C:\Windows\SysWOW64\wmpfv1.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\SysWOW64\wmpfv1.exe"C:\Windows\system32\wmpfv1.exe" C:\Windows\SysWOW64\wmpfv1.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\SysWOW64\wmpfv1.exe"C:\Windows\system32\wmpfv1.exe" C:\Windows\SysWOW64\wmpfv1.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\SysWOW64\wmpfv1.exe"C:\Windows\system32\wmpfv1.exe" C:\Windows\SysWOW64\wmpfv1.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\SysWOW64\wmpfv1.exe"C:\Windows\system32\wmpfv1.exe" C:\Windows\SysWOW64\wmpfv1.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\SysWOW64\wmpfv1.exe"C:\Windows\system32\wmpfv1.exe" C:\Windows\SysWOW64\wmpfv1.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\SysWOW64\wmpfv1.exe"C:\Windows\system32\wmpfv1.exe" C:\Windows\SysWOW64\wmpfv1.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\SysWOW64\wmpfv1.exe"C:\Windows\system32\wmpfv1.exe" C:\Windows\SysWOW64\wmpfv1.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\SysWOW64\wmpfv1.exe"C:\Windows\system32\wmpfv1.exe" C:\Windows\SysWOW64\wmpfv1.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3656 -
C:\Windows\SysWOW64\wmpfv1.exe"C:\Windows\system32\wmpfv1.exe" C:\Windows\SysWOW64\wmpfv1.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2312 -
C:\Windows\SysWOW64\wmpfv1.exe"C:\Windows\system32\wmpfv1.exe" C:\Windows\SysWOW64\wmpfv1.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3492 -
C:\Windows\SysWOW64\wmpfv1.exe"C:\Windows\system32\wmpfv1.exe" C:\Windows\SysWOW64\wmpfv1.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1532 -
C:\Windows\SysWOW64\wmpfv1.exe"C:\Windows\system32\wmpfv1.exe" C:\Windows\SysWOW64\wmpfv1.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4968 -
C:\Windows\SysWOW64\wmpfv1.exe"C:\Windows\system32\wmpfv1.exe" C:\Windows\SysWOW64\wmpfv1.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1856 -
C:\Windows\SysWOW64\wmpfv1.exe"C:\Windows\system32\wmpfv1.exe" C:\Windows\SysWOW64\wmpfv1.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1588 -
C:\Windows\SysWOW64\wmpfv1.exe"C:\Windows\system32\wmpfv1.exe" C:\Windows\SysWOW64\wmpfv1.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2916 -
C:\Windows\SysWOW64\wmpfv1.exe"C:\Windows\system32\wmpfv1.exe" C:\Windows\SysWOW64\wmpfv1.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1456 -
C:\Windows\SysWOW64\wmpfv1.exe"C:\Windows\system32\wmpfv1.exe" C:\Windows\SysWOW64\wmpfv1.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4548 -
C:\Windows\SysWOW64\wmpfv1.exe"C:\Windows\system32\wmpfv1.exe" C:\Windows\SysWOW64\wmpfv1.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3508 -
C:\Windows\SysWOW64\wmpfv1.exe"C:\Windows\system32\wmpfv1.exe" C:\Windows\SysWOW64\wmpfv1.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2920 -
C:\Windows\SysWOW64\wmpfv1.exe"C:\Windows\system32\wmpfv1.exe" C:\Windows\SysWOW64\wmpfv1.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1020 -
C:\Windows\SysWOW64\wmpfv1.exe"C:\Windows\system32\wmpfv1.exe" C:\Windows\SysWOW64\wmpfv1.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1680 -
C:\Windows\SysWOW64\wmpfv1.exe"C:\Windows\system32\wmpfv1.exe" C:\Windows\SysWOW64\wmpfv1.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2092 -
C:\Windows\SysWOW64\wmpfv1.exe"C:\Windows\system32\wmpfv1.exe" C:\Windows\SysWOW64\wmpfv1.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4984 -
C:\Windows\SysWOW64\wmpfv1.exe"C:\Windows\system32\wmpfv1.exe" C:\Windows\SysWOW64\wmpfv1.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1752 -
C:\Windows\SysWOW64\wmpfv1.exe"C:\Windows\system32\wmpfv1.exe" C:\Windows\SysWOW64\wmpfv1.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4304 -
C:\Windows\SysWOW64\wmpfv1.exe"C:\Windows\system32\wmpfv1.exe" C:\Windows\SysWOW64\wmpfv1.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5108 -
C:\Windows\SysWOW64\wmpfv1.exe"C:\Windows\system32\wmpfv1.exe" C:\Windows\SysWOW64\wmpfv1.exe32⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1712 -
C:\Windows\SysWOW64\wmpfv1.exe"C:\Windows\system32\wmpfv1.exe" C:\Windows\SysWOW64\wmpfv1.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3712 -
C:\Windows\SysWOW64\wmpfv1.exe"C:\Windows\system32\wmpfv1.exe" C:\Windows\SysWOW64\wmpfv1.exe34⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1888 -
C:\Windows\SysWOW64\wmpfv1.exe"C:\Windows\system32\wmpfv1.exe" C:\Windows\SysWOW64\wmpfv1.exe35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3496 -
C:\Windows\SysWOW64\wmpfv1.exe"C:\Windows\system32\wmpfv1.exe" C:\Windows\SysWOW64\wmpfv1.exe36⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4404
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5946b9ddf8ffac1f1afd2c17a3764dd02
SHA16074d348d472038c6da3b479ad3d46c8a829dffe
SHA2565a206b2df16f9abcdc152e342618a2dc58fbff11fd8e2c64d80590702a437dd6
SHA5124a4abec5a119a63f713e1ebf64baba839bb1205113997ce55398da99c906b76bd1c5f9132df8ea5809f62cee6d1c53dcf8628bcff10932a9505112c71feef775