Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 23:15
Static task
static1
Behavioral task
behavioral1
Sample
9e78ebe8bb3d0358b724ebeef918fbb5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9e78ebe8bb3d0358b724ebeef918fbb5_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
9e78ebe8bb3d0358b724ebeef918fbb5_JaffaCakes118.exe
-
Size
187KB
-
MD5
9e78ebe8bb3d0358b724ebeef918fbb5
-
SHA1
f4fbdf8ab4685ebc01cd60845e2be1342a4e729e
-
SHA256
f45d79d013ad4afe9703bfd29cc2aa2ffb8b974db59dd6434313663ddc8ef779
-
SHA512
0fc5e8313099aa5c0fdd0660e7e74fcd2a7810d888a1280e70cd2477f863a22d54ba55e16c7bbe15ce0574a4a3509dc81d588a0c535ccb6453eb6971da2b32a6
-
SSDEEP
3072:LF1XKTKRJ+/AgikuhfTsYBM4GcC2ACpzCXxU+Prgbx+FuB:rXKT4fwyMRcC2PpzixXQxZ
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2852 wmpxr3.exe -
Executes dropped EXE 57 IoCs
pid Process 2852 wmpxr3.exe 1476 wmpxr3.exe 1056 wmpxr3.exe 2820 wmpxr3.exe 2900 wmpxr3.exe 1136 wmpxr3.exe 932 wmpxr3.exe 2480 wmpxr3.exe 1588 wmpxr3.exe 2668 wmpxr3.exe 2660 wmpxr3.exe 656 wmpxr3.exe 584 wmpxr3.exe 1296 wmpxr3.exe 2232 wmpxr3.exe 1736 wmpxr3.exe 1516 wmpxr3.exe 320 wmpxr3.exe 1784 wmpxr3.exe 2876 wmpxr3.exe 3008 wmpxr3.exe 2428 wmpxr3.exe 1280 wmpxr3.exe 2108 wmpxr3.exe 1992 wmpxr3.exe 2916 wmpxr3.exe 912 wmpxr3.exe 1648 wmpxr3.exe 684 wmpxr3.exe 2260 wmpxr3.exe 3040 wmpxr3.exe 2876 wmpxr3.exe 2264 wmpxr3.exe 1284 wmpxr3.exe 2424 wmpxr3.exe 1892 wmpxr3.exe 916 wmpxr3.exe 108 wmpxr3.exe 1520 wmpxr3.exe 1212 wmpxr3.exe 2672 wmpxr3.exe 2592 wmpxr3.exe 2712 wmpxr3.exe 1856 wmpxr3.exe 584 wmpxr3.exe 1056 wmpxr3.exe 3036 wmpxr3.exe 904 wmpxr3.exe 916 wmpxr3.exe 1636 wmpxr3.exe 2816 wmpxr3.exe 2692 wmpxr3.exe 2740 wmpxr3.exe 2620 wmpxr3.exe 1372 wmpxr3.exe 1696 wmpxr3.exe 740 wmpxr3.exe -
Loads dropped DLL 64 IoCs
pid Process 2224 9e78ebe8bb3d0358b724ebeef918fbb5_JaffaCakes118.exe 2224 9e78ebe8bb3d0358b724ebeef918fbb5_JaffaCakes118.exe 2852 wmpxr3.exe 2852 wmpxr3.exe 1476 wmpxr3.exe 1476 wmpxr3.exe 1056 wmpxr3.exe 1056 wmpxr3.exe 2820 wmpxr3.exe 2820 wmpxr3.exe 2900 wmpxr3.exe 2900 wmpxr3.exe 1136 wmpxr3.exe 1136 wmpxr3.exe 932 wmpxr3.exe 932 wmpxr3.exe 2480 wmpxr3.exe 2480 wmpxr3.exe 1588 wmpxr3.exe 1588 wmpxr3.exe 2668 wmpxr3.exe 2668 wmpxr3.exe 2660 wmpxr3.exe 2660 wmpxr3.exe 656 wmpxr3.exe 656 wmpxr3.exe 584 wmpxr3.exe 584 wmpxr3.exe 1296 wmpxr3.exe 1296 wmpxr3.exe 2232 wmpxr3.exe 2232 wmpxr3.exe 1736 wmpxr3.exe 1736 wmpxr3.exe 1516 wmpxr3.exe 1516 wmpxr3.exe 320 wmpxr3.exe 320 wmpxr3.exe 1784 wmpxr3.exe 1784 wmpxr3.exe 2876 wmpxr3.exe 2876 wmpxr3.exe 3008 wmpxr3.exe 3008 wmpxr3.exe 2428 wmpxr3.exe 2428 wmpxr3.exe 1280 wmpxr3.exe 1280 wmpxr3.exe 2108 wmpxr3.exe 2108 wmpxr3.exe 1992 wmpxr3.exe 1992 wmpxr3.exe 2916 wmpxr3.exe 2916 wmpxr3.exe 912 wmpxr3.exe 912 wmpxr3.exe 1648 wmpxr3.exe 1648 wmpxr3.exe 684 wmpxr3.exe 684 wmpxr3.exe 2260 wmpxr3.exe 2260 wmpxr3.exe 3040 wmpxr3.exe 3040 wmpxr3.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 9e78ebe8bb3d0358b724ebeef918fbb5_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxr3.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe 9e78ebe8bb3d0358b724ebeef918fbb5_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 57 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9e78ebe8bb3d0358b724ebeef918fbb5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe -
Suspicious behavior: EnumeratesProcesses 58 IoCs
pid Process 2224 9e78ebe8bb3d0358b724ebeef918fbb5_JaffaCakes118.exe 2852 wmpxr3.exe 1476 wmpxr3.exe 1056 wmpxr3.exe 2820 wmpxr3.exe 2900 wmpxr3.exe 1136 wmpxr3.exe 932 wmpxr3.exe 2480 wmpxr3.exe 1588 wmpxr3.exe 2668 wmpxr3.exe 2660 wmpxr3.exe 656 wmpxr3.exe 584 wmpxr3.exe 1296 wmpxr3.exe 2232 wmpxr3.exe 1736 wmpxr3.exe 1516 wmpxr3.exe 320 wmpxr3.exe 1784 wmpxr3.exe 2876 wmpxr3.exe 3008 wmpxr3.exe 2428 wmpxr3.exe 1280 wmpxr3.exe 2108 wmpxr3.exe 1992 wmpxr3.exe 2916 wmpxr3.exe 912 wmpxr3.exe 1648 wmpxr3.exe 684 wmpxr3.exe 2260 wmpxr3.exe 3040 wmpxr3.exe 2876 wmpxr3.exe 2264 wmpxr3.exe 1284 wmpxr3.exe 2424 wmpxr3.exe 1892 wmpxr3.exe 916 wmpxr3.exe 108 wmpxr3.exe 1520 wmpxr3.exe 1212 wmpxr3.exe 2672 wmpxr3.exe 2592 wmpxr3.exe 2712 wmpxr3.exe 1856 wmpxr3.exe 584 wmpxr3.exe 1056 wmpxr3.exe 3036 wmpxr3.exe 904 wmpxr3.exe 916 wmpxr3.exe 1636 wmpxr3.exe 2816 wmpxr3.exe 2692 wmpxr3.exe 2740 wmpxr3.exe 2620 wmpxr3.exe 1372 wmpxr3.exe 1696 wmpxr3.exe 740 wmpxr3.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2852 2224 9e78ebe8bb3d0358b724ebeef918fbb5_JaffaCakes118.exe 31 PID 2224 wrote to memory of 2852 2224 9e78ebe8bb3d0358b724ebeef918fbb5_JaffaCakes118.exe 31 PID 2224 wrote to memory of 2852 2224 9e78ebe8bb3d0358b724ebeef918fbb5_JaffaCakes118.exe 31 PID 2224 wrote to memory of 2852 2224 9e78ebe8bb3d0358b724ebeef918fbb5_JaffaCakes118.exe 31 PID 2852 wrote to memory of 1476 2852 wmpxr3.exe 32 PID 2852 wrote to memory of 1476 2852 wmpxr3.exe 32 PID 2852 wrote to memory of 1476 2852 wmpxr3.exe 32 PID 2852 wrote to memory of 1476 2852 wmpxr3.exe 32 PID 1476 wrote to memory of 1056 1476 wmpxr3.exe 33 PID 1476 wrote to memory of 1056 1476 wmpxr3.exe 33 PID 1476 wrote to memory of 1056 1476 wmpxr3.exe 33 PID 1476 wrote to memory of 1056 1476 wmpxr3.exe 33 PID 1056 wrote to memory of 2820 1056 wmpxr3.exe 34 PID 1056 wrote to memory of 2820 1056 wmpxr3.exe 34 PID 1056 wrote to memory of 2820 1056 wmpxr3.exe 34 PID 1056 wrote to memory of 2820 1056 wmpxr3.exe 34 PID 2820 wrote to memory of 2900 2820 wmpxr3.exe 35 PID 2820 wrote to memory of 2900 2820 wmpxr3.exe 35 PID 2820 wrote to memory of 2900 2820 wmpxr3.exe 35 PID 2820 wrote to memory of 2900 2820 wmpxr3.exe 35 PID 2900 wrote to memory of 1136 2900 wmpxr3.exe 36 PID 2900 wrote to memory of 1136 2900 wmpxr3.exe 36 PID 2900 wrote to memory of 1136 2900 wmpxr3.exe 36 PID 2900 wrote to memory of 1136 2900 wmpxr3.exe 36 PID 1136 wrote to memory of 932 1136 wmpxr3.exe 37 PID 1136 wrote to memory of 932 1136 wmpxr3.exe 37 PID 1136 wrote to memory of 932 1136 wmpxr3.exe 37 PID 1136 wrote to memory of 932 1136 wmpxr3.exe 37 PID 932 wrote to memory of 2480 932 wmpxr3.exe 38 PID 932 wrote to memory of 2480 932 wmpxr3.exe 38 PID 932 wrote to memory of 2480 932 wmpxr3.exe 38 PID 932 wrote to memory of 2480 932 wmpxr3.exe 38 PID 2480 wrote to memory of 1588 2480 wmpxr3.exe 39 PID 2480 wrote to memory of 1588 2480 wmpxr3.exe 39 PID 2480 wrote to memory of 1588 2480 wmpxr3.exe 39 PID 2480 wrote to memory of 1588 2480 wmpxr3.exe 39 PID 1588 wrote to memory of 2668 1588 wmpxr3.exe 40 PID 1588 wrote to memory of 2668 1588 wmpxr3.exe 40 PID 1588 wrote to memory of 2668 1588 wmpxr3.exe 40 PID 1588 wrote to memory of 2668 1588 wmpxr3.exe 40 PID 2668 wrote to memory of 2660 2668 wmpxr3.exe 41 PID 2668 wrote to memory of 2660 2668 wmpxr3.exe 41 PID 2668 wrote to memory of 2660 2668 wmpxr3.exe 41 PID 2668 wrote to memory of 2660 2668 wmpxr3.exe 41 PID 2660 wrote to memory of 656 2660 wmpxr3.exe 42 PID 2660 wrote to memory of 656 2660 wmpxr3.exe 42 PID 2660 wrote to memory of 656 2660 wmpxr3.exe 42 PID 2660 wrote to memory of 656 2660 wmpxr3.exe 42 PID 656 wrote to memory of 584 656 wmpxr3.exe 43 PID 656 wrote to memory of 584 656 wmpxr3.exe 43 PID 656 wrote to memory of 584 656 wmpxr3.exe 43 PID 656 wrote to memory of 584 656 wmpxr3.exe 43 PID 584 wrote to memory of 1296 584 wmpxr3.exe 44 PID 584 wrote to memory of 1296 584 wmpxr3.exe 44 PID 584 wrote to memory of 1296 584 wmpxr3.exe 44 PID 584 wrote to memory of 1296 584 wmpxr3.exe 44 PID 1296 wrote to memory of 2232 1296 wmpxr3.exe 45 PID 1296 wrote to memory of 2232 1296 wmpxr3.exe 45 PID 1296 wrote to memory of 2232 1296 wmpxr3.exe 45 PID 1296 wrote to memory of 2232 1296 wmpxr3.exe 45 PID 2232 wrote to memory of 1736 2232 wmpxr3.exe 46 PID 2232 wrote to memory of 1736 2232 wmpxr3.exe 46 PID 2232 wrote to memory of 1736 2232 wmpxr3.exe 46 PID 2232 wrote to memory of 1736 2232 wmpxr3.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e78ebe8bb3d0358b724ebeef918fbb5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9e78ebe8bb3d0358b724ebeef918fbb5_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Users\Admin\AppData\Local\Temp\9E78EB~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1736 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1516 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:320 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1784 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2876 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3008 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2428 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1280 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2108 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1992 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2916 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:912 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1648 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:684 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2260 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3040 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2876 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2264 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1284 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2424 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1892 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:916 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:108 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1520 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe41⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1212 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe42⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2672 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2592 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2712 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1856 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:584 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe47⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1056 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe48⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3036 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe49⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:904 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe50⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:916 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe51⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1636 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2816 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe53⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2692 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe54⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2740 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe55⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2620 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe56⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1372 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe57⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1696 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe58⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:740
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
187KB
MD59e78ebe8bb3d0358b724ebeef918fbb5
SHA1f4fbdf8ab4685ebc01cd60845e2be1342a4e729e
SHA256f45d79d013ad4afe9703bfd29cc2aa2ffb8b974db59dd6434313663ddc8ef779
SHA5120fc5e8313099aa5c0fdd0660e7e74fcd2a7810d888a1280e70cd2477f863a22d54ba55e16c7bbe15ce0574a4a3509dc81d588a0c535ccb6453eb6971da2b32a6