Analysis
-
max time kernel
148s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 00:04
Static task
static1
Behavioral task
behavioral1
Sample
9800cc568d34ab93a585eb640313fdc2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9800cc568d34ab93a585eb640313fdc2_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
9800cc568d34ab93a585eb640313fdc2_JaffaCakes118.exe
-
Size
130KB
-
MD5
9800cc568d34ab93a585eb640313fdc2
-
SHA1
fd0817266331bcf3c48bba94d701ed0f4dd4b69b
-
SHA256
dbd6345e0329d3ffb4e04a695c678e27b71f887b8b767c7a7d8c7db0f91e8a3c
-
SHA512
836b7f4ee138f3f3716ea7ebbc30cf7a6f645a6e291183019f9cf73fef841aba8fd344ddd24f840cd28f0c3a866ff86498da8bcebaa3875ed1f46ff260dfd075
-
SSDEEP
3072:TLwEBbPERA6g2gThra6LQAKEfSo9pOcOWhVjtg:TMCPER02e9QqjpVOWBg
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2348 wnfpt4.exe -
Executes dropped EXE 50 IoCs
pid Process 280 wnfpt4.exe 2348 wnfpt4.exe 2940 wnfpt4.exe 2728 wnfpt4.exe 1984 wnfpt4.exe 580 wnfpt4.exe 1300 wnfpt4.exe 756 wnfpt4.exe 816 wnfpt4.exe 1084 wnfpt4.exe 1636 wnfpt4.exe 2456 wnfpt4.exe 1604 wnfpt4.exe 2596 wnfpt4.exe 2220 wnfpt4.exe 1696 wnfpt4.exe 536 wnfpt4.exe 2188 wnfpt4.exe 1712 wnfpt4.exe 3036 wnfpt4.exe 2428 wnfpt4.exe 1152 wnfpt4.exe 2776 wnfpt4.exe 2724 wnfpt4.exe 2660 wnfpt4.exe 2692 wnfpt4.exe 1984 wnfpt4.exe 812 wnfpt4.exe 1824 wnfpt4.exe 2676 wnfpt4.exe 1832 wnfpt4.exe 2956 wnfpt4.exe 2068 wnfpt4.exe 2508 wnfpt4.exe 820 wnfpt4.exe 1372 wnfpt4.exe 804 wnfpt4.exe 856 wnfpt4.exe 1728 wnfpt4.exe 1172 wnfpt4.exe 1768 wnfpt4.exe 2124 wnfpt4.exe 2428 wnfpt4.exe 1028 wnfpt4.exe 2860 wnfpt4.exe 2840 wnfpt4.exe 2940 wnfpt4.exe 2616 wnfpt4.exe 2668 wnfpt4.exe 2076 wnfpt4.exe -
Loads dropped DLL 26 IoCs
pid Process 2552 9800cc568d34ab93a585eb640313fdc2_JaffaCakes118.exe 280 wnfpt4.exe 2348 wnfpt4.exe 2728 wnfpt4.exe 580 wnfpt4.exe 756 wnfpt4.exe 1084 wnfpt4.exe 2456 wnfpt4.exe 2596 wnfpt4.exe 1696 wnfpt4.exe 2188 wnfpt4.exe 3036 wnfpt4.exe 1152 wnfpt4.exe 2724 wnfpt4.exe 2692 wnfpt4.exe 812 wnfpt4.exe 2676 wnfpt4.exe 2956 wnfpt4.exe 2508 wnfpt4.exe 1372 wnfpt4.exe 856 wnfpt4.exe 1172 wnfpt4.exe 2124 wnfpt4.exe 1028 wnfpt4.exe 2840 wnfpt4.exe 2616 wnfpt4.exe -
Maps connected drives based on registry 3 TTPs 52 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnfpt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnfpt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnfpt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnfpt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnfpt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnfpt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnfpt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnfpt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnfpt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 9800cc568d34ab93a585eb640313fdc2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnfpt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnfpt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnfpt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 9800cc568d34ab93a585eb640313fdc2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnfpt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnfpt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnfpt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnfpt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnfpt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnfpt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnfpt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnfpt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnfpt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnfpt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnfpt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnfpt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnfpt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnfpt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnfpt4.exe -
Drops file in System32 directory 48 IoCs
description ioc Process File created C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File opened for modification C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File created C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File created C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File opened for modification C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File created C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File opened for modification C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File created C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File created C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File opened for modification C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File opened for modification C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File created C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File opened for modification C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File opened for modification C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File created C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File opened for modification C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File opened for modification C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File created C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File created C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File opened for modification C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File opened for modification C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File opened for modification C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File created C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File opened for modification C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File opened for modification C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File created C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File opened for modification C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File created C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File created C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File opened for modification C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File created C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File created C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File opened for modification C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File opened for modification C:\Windows\SysWOW64\wnfpt4.exe 9800cc568d34ab93a585eb640313fdc2_JaffaCakes118.exe File created C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File created C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File created C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File opened for modification C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File opened for modification C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File created C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File created C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File created C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File created C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File created C:\Windows\SysWOW64\wnfpt4.exe 9800cc568d34ab93a585eb640313fdc2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File opened for modification C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File opened for modification C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe File opened for modification C:\Windows\SysWOW64\wnfpt4.exe wnfpt4.exe -
Suspicious use of SetThreadContext 26 IoCs
description pid Process procid_target PID 2960 set thread context of 2552 2960 9800cc568d34ab93a585eb640313fdc2_JaffaCakes118.exe 30 PID 280 set thread context of 2348 280 wnfpt4.exe 33 PID 2940 set thread context of 2728 2940 wnfpt4.exe 35 PID 1984 set thread context of 580 1984 wnfpt4.exe 37 PID 1300 set thread context of 756 1300 wnfpt4.exe 39 PID 816 set thread context of 1084 816 wnfpt4.exe 41 PID 1636 set thread context of 2456 1636 wnfpt4.exe 43 PID 1604 set thread context of 2596 1604 wnfpt4.exe 45 PID 2220 set thread context of 1696 2220 wnfpt4.exe 47 PID 536 set thread context of 2188 536 wnfpt4.exe 49 PID 1712 set thread context of 3036 1712 wnfpt4.exe 51 PID 2428 set thread context of 1152 2428 wnfpt4.exe 53 PID 2776 set thread context of 2724 2776 wnfpt4.exe 55 PID 2660 set thread context of 2692 2660 wnfpt4.exe 57 PID 1984 set thread context of 812 1984 wnfpt4.exe 59 PID 1824 set thread context of 2676 1824 wnfpt4.exe 61 PID 1832 set thread context of 2956 1832 wnfpt4.exe 63 PID 2068 set thread context of 2508 2068 wnfpt4.exe 65 PID 820 set thread context of 1372 820 wnfpt4.exe 67 PID 804 set thread context of 856 804 wnfpt4.exe 69 PID 1728 set thread context of 1172 1728 wnfpt4.exe 71 PID 1768 set thread context of 2124 1768 wnfpt4.exe 73 PID 2428 set thread context of 1028 2428 wnfpt4.exe 75 PID 2860 set thread context of 2840 2860 wnfpt4.exe 77 PID 2940 set thread context of 2616 2940 wnfpt4.exe 79 PID 2668 set thread context of 2076 2668 wnfpt4.exe 81 -
resource yara_rule behavioral1/memory/2552-4-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2552-7-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2552-3-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2552-2-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2552-9-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2552-8-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2552-19-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2348-32-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2348-31-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2348-30-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2348-37-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2728-48-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2728-47-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2728-46-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2728-51-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/580-61-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/580-68-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/756-78-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/756-84-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1084-95-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1084-100-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2456-111-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2456-117-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2596-127-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2596-133-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1696-144-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1696-150-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2188-161-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2188-166-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/3036-182-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1152-193-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1152-198-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2724-207-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2724-213-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2692-225-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2692-230-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/812-244-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2676-256-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2676-261-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2956-272-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2956-277-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2508-288-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2508-291-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1372-303-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/856-312-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/856-316-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1172-326-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1172-329-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2124-337-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2124-345-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1028-357-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2840-367-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2840-370-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2616-380-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2616-383-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2076-393-0x0000000000400000-0x0000000000458000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 51 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9800cc568d34ab93a585eb640313fdc2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9800cc568d34ab93a585eb640313fdc2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfpt4.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2552 9800cc568d34ab93a585eb640313fdc2_JaffaCakes118.exe 2348 wnfpt4.exe 2728 wnfpt4.exe 580 wnfpt4.exe 756 wnfpt4.exe 1084 wnfpt4.exe 2456 wnfpt4.exe 2596 wnfpt4.exe 1696 wnfpt4.exe 2188 wnfpt4.exe 3036 wnfpt4.exe 1152 wnfpt4.exe 2724 wnfpt4.exe 2692 wnfpt4.exe 812 wnfpt4.exe 2676 wnfpt4.exe 2956 wnfpt4.exe 2508 wnfpt4.exe 1372 wnfpt4.exe 856 wnfpt4.exe 1172 wnfpt4.exe 1028 wnfpt4.exe 2840 wnfpt4.exe 2616 wnfpt4.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2552 2960 9800cc568d34ab93a585eb640313fdc2_JaffaCakes118.exe 30 PID 2960 wrote to memory of 2552 2960 9800cc568d34ab93a585eb640313fdc2_JaffaCakes118.exe 30 PID 2960 wrote to memory of 2552 2960 9800cc568d34ab93a585eb640313fdc2_JaffaCakes118.exe 30 PID 2960 wrote to memory of 2552 2960 9800cc568d34ab93a585eb640313fdc2_JaffaCakes118.exe 30 PID 2960 wrote to memory of 2552 2960 9800cc568d34ab93a585eb640313fdc2_JaffaCakes118.exe 30 PID 2960 wrote to memory of 2552 2960 9800cc568d34ab93a585eb640313fdc2_JaffaCakes118.exe 30 PID 2960 wrote to memory of 2552 2960 9800cc568d34ab93a585eb640313fdc2_JaffaCakes118.exe 30 PID 2552 wrote to memory of 280 2552 9800cc568d34ab93a585eb640313fdc2_JaffaCakes118.exe 32 PID 2552 wrote to memory of 280 2552 9800cc568d34ab93a585eb640313fdc2_JaffaCakes118.exe 32 PID 2552 wrote to memory of 280 2552 9800cc568d34ab93a585eb640313fdc2_JaffaCakes118.exe 32 PID 2552 wrote to memory of 280 2552 9800cc568d34ab93a585eb640313fdc2_JaffaCakes118.exe 32 PID 280 wrote to memory of 2348 280 wnfpt4.exe 33 PID 280 wrote to memory of 2348 280 wnfpt4.exe 33 PID 280 wrote to memory of 2348 280 wnfpt4.exe 33 PID 280 wrote to memory of 2348 280 wnfpt4.exe 33 PID 280 wrote to memory of 2348 280 wnfpt4.exe 33 PID 280 wrote to memory of 2348 280 wnfpt4.exe 33 PID 280 wrote to memory of 2348 280 wnfpt4.exe 33 PID 2348 wrote to memory of 2940 2348 wnfpt4.exe 34 PID 2348 wrote to memory of 2940 2348 wnfpt4.exe 34 PID 2348 wrote to memory of 2940 2348 wnfpt4.exe 34 PID 2348 wrote to memory of 2940 2348 wnfpt4.exe 34 PID 2940 wrote to memory of 2728 2940 wnfpt4.exe 35 PID 2940 wrote to memory of 2728 2940 wnfpt4.exe 35 PID 2940 wrote to memory of 2728 2940 wnfpt4.exe 35 PID 2940 wrote to memory of 2728 2940 wnfpt4.exe 35 PID 2940 wrote to memory of 2728 2940 wnfpt4.exe 35 PID 2940 wrote to memory of 2728 2940 wnfpt4.exe 35 PID 2940 wrote to memory of 2728 2940 wnfpt4.exe 35 PID 2728 wrote to memory of 1984 2728 wnfpt4.exe 36 PID 2728 wrote to memory of 1984 2728 wnfpt4.exe 36 PID 2728 wrote to memory of 1984 2728 wnfpt4.exe 36 PID 2728 wrote to memory of 1984 2728 wnfpt4.exe 36 PID 1984 wrote to memory of 580 1984 wnfpt4.exe 37 PID 1984 wrote to memory of 580 1984 wnfpt4.exe 37 PID 1984 wrote to memory of 580 1984 wnfpt4.exe 37 PID 1984 wrote to memory of 580 1984 wnfpt4.exe 37 PID 1984 wrote to memory of 580 1984 wnfpt4.exe 37 PID 1984 wrote to memory of 580 1984 wnfpt4.exe 37 PID 1984 wrote to memory of 580 1984 wnfpt4.exe 37 PID 580 wrote to memory of 1300 580 wnfpt4.exe 38 PID 580 wrote to memory of 1300 580 wnfpt4.exe 38 PID 580 wrote to memory of 1300 580 wnfpt4.exe 38 PID 580 wrote to memory of 1300 580 wnfpt4.exe 38 PID 1300 wrote to memory of 756 1300 wnfpt4.exe 39 PID 1300 wrote to memory of 756 1300 wnfpt4.exe 39 PID 1300 wrote to memory of 756 1300 wnfpt4.exe 39 PID 1300 wrote to memory of 756 1300 wnfpt4.exe 39 PID 1300 wrote to memory of 756 1300 wnfpt4.exe 39 PID 1300 wrote to memory of 756 1300 wnfpt4.exe 39 PID 1300 wrote to memory of 756 1300 wnfpt4.exe 39 PID 756 wrote to memory of 816 756 wnfpt4.exe 40 PID 756 wrote to memory of 816 756 wnfpt4.exe 40 PID 756 wrote to memory of 816 756 wnfpt4.exe 40 PID 756 wrote to memory of 816 756 wnfpt4.exe 40 PID 816 wrote to memory of 1084 816 wnfpt4.exe 41 PID 816 wrote to memory of 1084 816 wnfpt4.exe 41 PID 816 wrote to memory of 1084 816 wnfpt4.exe 41 PID 816 wrote to memory of 1084 816 wnfpt4.exe 41 PID 816 wrote to memory of 1084 816 wnfpt4.exe 41 PID 816 wrote to memory of 1084 816 wnfpt4.exe 41 PID 816 wrote to memory of 1084 816 wnfpt4.exe 41 PID 1084 wrote to memory of 1636 1084 wnfpt4.exe 42 PID 1084 wrote to memory of 1636 1084 wnfpt4.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\9800cc568d34ab93a585eb640313fdc2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9800cc568d34ab93a585eb640313fdc2_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\9800cc568d34ab93a585eb640313fdc2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9800cc568d34ab93a585eb640313fdc2_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Users\Admin\AppData\Local\Temp\9800CC~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:280 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Users\Admin\AppData\Local\Temp\9800CC~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1636 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2456 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1604 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2596 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2220 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1696 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:536 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2188 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1712 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3036 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2428 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1152 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2776 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2724 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2660 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2692 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1984 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:812 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1824 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2676 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1832 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe34⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2956 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2068 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe36⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2508 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:820 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe38⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1372 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:804 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe40⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:856 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1728 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe42⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1172 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1768 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe44⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2124 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2428 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe46⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1028 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2860 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe48⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2840 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2940 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe50⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2616 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2668 -
C:\Windows\SysWOW64\wnfpt4.exe"C:\Windows\system32\wnfpt4.exe" C:\Windows\SysWOW64\wnfpt4.exe52⤵
- Executes dropped EXE
- Maps connected drives based on registry
PID:2076
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
130KB
MD59800cc568d34ab93a585eb640313fdc2
SHA1fd0817266331bcf3c48bba94d701ed0f4dd4b69b
SHA256dbd6345e0329d3ffb4e04a695c678e27b71f887b8b767c7a7d8c7db0f91e8a3c
SHA512836b7f4ee138f3f3716ea7ebbc30cf7a6f645a6e291183019f9cf73fef841aba8fd344ddd24f840cd28f0c3a866ff86498da8bcebaa3875ed1f46ff260dfd075