Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 23:15
Static task
static1
Behavioral task
behavioral1
Sample
9e78ebe8bb3d0358b724ebeef918fbb5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9e78ebe8bb3d0358b724ebeef918fbb5_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
9e78ebe8bb3d0358b724ebeef918fbb5_JaffaCakes118.exe
-
Size
187KB
-
MD5
9e78ebe8bb3d0358b724ebeef918fbb5
-
SHA1
f4fbdf8ab4685ebc01cd60845e2be1342a4e729e
-
SHA256
f45d79d013ad4afe9703bfd29cc2aa2ffb8b974db59dd6434313663ddc8ef779
-
SHA512
0fc5e8313099aa5c0fdd0660e7e74fcd2a7810d888a1280e70cd2477f863a22d54ba55e16c7bbe15ce0574a4a3509dc81d588a0c535ccb6453eb6971da2b32a6
-
SSDEEP
3072:LF1XKTKRJ+/AgikuhfTsYBM4GcC2ACpzCXxU+Prgbx+FuB:rXKT4fwyMRcC2PpzixXQxZ
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 48 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 9e78ebe8bb3d0358b724ebeef918fbb5_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wmpxr3.exe -
Deletes itself 1 IoCs
pid Process 4920 wmpxr3.exe -
Executes dropped EXE 48 IoCs
pid Process 4920 wmpxr3.exe 872 wmpxr3.exe 1652 wmpxr3.exe 3460 wmpxr3.exe 4632 wmpxr3.exe 1412 wmpxr3.exe 4884 wmpxr3.exe 2956 wmpxr3.exe 4496 wmpxr3.exe 4272 wmpxr3.exe 3184 wmpxr3.exe 1148 wmpxr3.exe 464 wmpxr3.exe 1936 wmpxr3.exe 1680 wmpxr3.exe 4204 wmpxr3.exe 4872 wmpxr3.exe 5076 wmpxr3.exe 2596 wmpxr3.exe 3516 wmpxr3.exe 3124 wmpxr3.exe 1268 wmpxr3.exe 1352 wmpxr3.exe 2764 wmpxr3.exe 788 wmpxr3.exe 3632 wmpxr3.exe 5060 wmpxr3.exe 2324 wmpxr3.exe 3376 wmpxr3.exe 324 wmpxr3.exe 840 wmpxr3.exe 1844 wmpxr3.exe 552 wmpxr3.exe 4748 wmpxr3.exe 1084 wmpxr3.exe 4692 wmpxr3.exe 3012 wmpxr3.exe 4092 wmpxr3.exe 884 wmpxr3.exe 2088 wmpxr3.exe 700 wmpxr3.exe 5064 wmpxr3.exe 4200 wmpxr3.exe 2608 wmpxr3.exe 4260 wmpxr3.exe 1992 wmpxr3.exe 3416 wmpxr3.exe 2860 wmpxr3.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 9e78ebe8bb3d0358b724ebeef918fbb5_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 9e78ebe8bb3d0358b724ebeef918fbb5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxr3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpxr3.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe 9e78ebe8bb3d0358b724ebeef918fbb5_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe 9e78ebe8bb3d0358b724ebeef918fbb5_JaffaCakes118.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File created C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe File opened for modification C:\Windows\SysWOW64\wmpxr3.exe wmpxr3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 49 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9e78ebe8bb3d0358b724ebeef918fbb5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxr3.exe -
Modifies registry class 48 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 9e78ebe8bb3d0358b724ebeef918fbb5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxr3.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1788 9e78ebe8bb3d0358b724ebeef918fbb5_JaffaCakes118.exe 1788 9e78ebe8bb3d0358b724ebeef918fbb5_JaffaCakes118.exe 4920 wmpxr3.exe 4920 wmpxr3.exe 872 wmpxr3.exe 872 wmpxr3.exe 1652 wmpxr3.exe 1652 wmpxr3.exe 3460 wmpxr3.exe 3460 wmpxr3.exe 4632 wmpxr3.exe 4632 wmpxr3.exe 1412 wmpxr3.exe 1412 wmpxr3.exe 4884 wmpxr3.exe 4884 wmpxr3.exe 2956 wmpxr3.exe 2956 wmpxr3.exe 4496 wmpxr3.exe 4496 wmpxr3.exe 4272 wmpxr3.exe 4272 wmpxr3.exe 3184 wmpxr3.exe 3184 wmpxr3.exe 1148 wmpxr3.exe 1148 wmpxr3.exe 464 wmpxr3.exe 464 wmpxr3.exe 1936 wmpxr3.exe 1936 wmpxr3.exe 1680 wmpxr3.exe 1680 wmpxr3.exe 4204 wmpxr3.exe 4204 wmpxr3.exe 4872 wmpxr3.exe 4872 wmpxr3.exe 5076 wmpxr3.exe 5076 wmpxr3.exe 2596 wmpxr3.exe 2596 wmpxr3.exe 3516 wmpxr3.exe 3516 wmpxr3.exe 3124 wmpxr3.exe 3124 wmpxr3.exe 1268 wmpxr3.exe 1268 wmpxr3.exe 1352 wmpxr3.exe 1352 wmpxr3.exe 2764 wmpxr3.exe 2764 wmpxr3.exe 788 wmpxr3.exe 788 wmpxr3.exe 3632 wmpxr3.exe 3632 wmpxr3.exe 5060 wmpxr3.exe 5060 wmpxr3.exe 2324 wmpxr3.exe 2324 wmpxr3.exe 3376 wmpxr3.exe 3376 wmpxr3.exe 324 wmpxr3.exe 324 wmpxr3.exe 840 wmpxr3.exe 840 wmpxr3.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1788 wrote to memory of 4920 1788 9e78ebe8bb3d0358b724ebeef918fbb5_JaffaCakes118.exe 82 PID 1788 wrote to memory of 4920 1788 9e78ebe8bb3d0358b724ebeef918fbb5_JaffaCakes118.exe 82 PID 1788 wrote to memory of 4920 1788 9e78ebe8bb3d0358b724ebeef918fbb5_JaffaCakes118.exe 82 PID 4920 wrote to memory of 872 4920 wmpxr3.exe 87 PID 4920 wrote to memory of 872 4920 wmpxr3.exe 87 PID 4920 wrote to memory of 872 4920 wmpxr3.exe 87 PID 872 wrote to memory of 1652 872 wmpxr3.exe 89 PID 872 wrote to memory of 1652 872 wmpxr3.exe 89 PID 872 wrote to memory of 1652 872 wmpxr3.exe 89 PID 1652 wrote to memory of 3460 1652 wmpxr3.exe 92 PID 1652 wrote to memory of 3460 1652 wmpxr3.exe 92 PID 1652 wrote to memory of 3460 1652 wmpxr3.exe 92 PID 3460 wrote to memory of 4632 3460 wmpxr3.exe 93 PID 3460 wrote to memory of 4632 3460 wmpxr3.exe 93 PID 3460 wrote to memory of 4632 3460 wmpxr3.exe 93 PID 4632 wrote to memory of 1412 4632 wmpxr3.exe 94 PID 4632 wrote to memory of 1412 4632 wmpxr3.exe 94 PID 4632 wrote to memory of 1412 4632 wmpxr3.exe 94 PID 1412 wrote to memory of 4884 1412 wmpxr3.exe 95 PID 1412 wrote to memory of 4884 1412 wmpxr3.exe 95 PID 1412 wrote to memory of 4884 1412 wmpxr3.exe 95 PID 4884 wrote to memory of 2956 4884 wmpxr3.exe 96 PID 4884 wrote to memory of 2956 4884 wmpxr3.exe 96 PID 4884 wrote to memory of 2956 4884 wmpxr3.exe 96 PID 2956 wrote to memory of 4496 2956 wmpxr3.exe 97 PID 2956 wrote to memory of 4496 2956 wmpxr3.exe 97 PID 2956 wrote to memory of 4496 2956 wmpxr3.exe 97 PID 4496 wrote to memory of 4272 4496 wmpxr3.exe 98 PID 4496 wrote to memory of 4272 4496 wmpxr3.exe 98 PID 4496 wrote to memory of 4272 4496 wmpxr3.exe 98 PID 4272 wrote to memory of 3184 4272 wmpxr3.exe 100 PID 4272 wrote to memory of 3184 4272 wmpxr3.exe 100 PID 4272 wrote to memory of 3184 4272 wmpxr3.exe 100 PID 3184 wrote to memory of 1148 3184 wmpxr3.exe 102 PID 3184 wrote to memory of 1148 3184 wmpxr3.exe 102 PID 3184 wrote to memory of 1148 3184 wmpxr3.exe 102 PID 1148 wrote to memory of 464 1148 wmpxr3.exe 103 PID 1148 wrote to memory of 464 1148 wmpxr3.exe 103 PID 1148 wrote to memory of 464 1148 wmpxr3.exe 103 PID 464 wrote to memory of 1936 464 wmpxr3.exe 104 PID 464 wrote to memory of 1936 464 wmpxr3.exe 104 PID 464 wrote to memory of 1936 464 wmpxr3.exe 104 PID 1936 wrote to memory of 1680 1936 wmpxr3.exe 105 PID 1936 wrote to memory of 1680 1936 wmpxr3.exe 105 PID 1936 wrote to memory of 1680 1936 wmpxr3.exe 105 PID 1680 wrote to memory of 4204 1680 wmpxr3.exe 106 PID 1680 wrote to memory of 4204 1680 wmpxr3.exe 106 PID 1680 wrote to memory of 4204 1680 wmpxr3.exe 106 PID 4204 wrote to memory of 4872 4204 wmpxr3.exe 107 PID 4204 wrote to memory of 4872 4204 wmpxr3.exe 107 PID 4204 wrote to memory of 4872 4204 wmpxr3.exe 107 PID 4872 wrote to memory of 5076 4872 wmpxr3.exe 108 PID 4872 wrote to memory of 5076 4872 wmpxr3.exe 108 PID 4872 wrote to memory of 5076 4872 wmpxr3.exe 108 PID 5076 wrote to memory of 2596 5076 wmpxr3.exe 109 PID 5076 wrote to memory of 2596 5076 wmpxr3.exe 109 PID 5076 wrote to memory of 2596 5076 wmpxr3.exe 109 PID 2596 wrote to memory of 3516 2596 wmpxr3.exe 110 PID 2596 wrote to memory of 3516 2596 wmpxr3.exe 110 PID 2596 wrote to memory of 3516 2596 wmpxr3.exe 110 PID 3516 wrote to memory of 3124 3516 wmpxr3.exe 111 PID 3516 wrote to memory of 3124 3516 wmpxr3.exe 111 PID 3516 wrote to memory of 3124 3516 wmpxr3.exe 111 PID 3124 wrote to memory of 1268 3124 wmpxr3.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e78ebe8bb3d0358b724ebeef918fbb5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9e78ebe8bb3d0358b724ebeef918fbb5_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Users\Admin\AppData\Local\Temp\9E78EB~1.EXE2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe7⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe9⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe11⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe13⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe15⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe17⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe19⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe21⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe23⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1268 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1352 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe25⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2764 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:788 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe27⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3632 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5060 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe29⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2324 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3376 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe31⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:324 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe32⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:840 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe33⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1844 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe34⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:552 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe35⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4748 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe36⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1084 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe37⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4692 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe38⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3012 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe39⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4092 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe40⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:884 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe41⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2088 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe42⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:700 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe43⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5064 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe44⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4200 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe45⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2608 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe46⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4260 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe47⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1992 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe48⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3416 -
C:\Windows\SysWOW64\wmpxr3.exe"C:\Windows\system32\wmpxr3.exe" C:\Windows\SysWOW64\wmpxr3.exe49⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2860
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
187KB
MD59e78ebe8bb3d0358b724ebeef918fbb5
SHA1f4fbdf8ab4685ebc01cd60845e2be1342a4e729e
SHA256f45d79d013ad4afe9703bfd29cc2aa2ffb8b974db59dd6434313663ddc8ef779
SHA5120fc5e8313099aa5c0fdd0660e7e74fcd2a7810d888a1280e70cd2477f863a22d54ba55e16c7bbe15ce0574a4a3509dc81d588a0c535ccb6453eb6971da2b32a6