Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 00:13
Static task
static1
Behavioral task
behavioral1
Sample
980b18762056b316782591c1726012d9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
980b18762056b316782591c1726012d9_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
980b18762056b316782591c1726012d9_JaffaCakes118.exe
-
Size
152KB
-
MD5
980b18762056b316782591c1726012d9
-
SHA1
e1a9b6d7483e9799a3950879c485b2793d6efa8f
-
SHA256
81aab6d8b41fe078a1bd0117f67de3fbcce8703bc960a083b7844b7495d54e6f
-
SHA512
c67c7550174662e3fadc09142d2e80bf5676122b2848cba897d83f88efc432e396369396291cb8450f506e5b848ca96b7944f1d0035b9dc5c7e8811311f4776f
-
SSDEEP
3072:DFLn23B8dG5pK736eDcPb173iXHuB8ysMvJlZcrWjFCORuIYy:J2rpCqh928bLLuiBuIYy
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2732 wmpntv32.exe -
Executes dropped EXE 29 IoCs
pid Process 2884 wmpntv32.exe 2732 wmpntv32.exe 2024 wmpntv32.exe 3020 wmpntv32.exe 1688 wmpntv32.exe 1696 wmpntv32.exe 1000 wmpntv32.exe 2784 wmpntv32.exe 392 wmpntv32.exe 1884 wmpntv32.exe 1616 wmpntv32.exe 1456 wmpntv32.exe 2112 wmpntv32.exe 1864 wmpntv32.exe 2512 wmpntv32.exe 1520 wmpntv32.exe 2776 wmpntv32.exe 2720 wmpntv32.exe 2772 wmpntv32.exe 2632 wmpntv32.exe 1432 wmpntv32.exe 1688 wmpntv32.exe 2896 wmpntv32.exe 1936 wmpntv32.exe 2256 wmpntv32.exe 1976 wmpntv32.exe 576 wmpntv32.exe 1856 wmpntv32.exe 1504 wmpntv32.exe -
Loads dropped DLL 58 IoCs
pid Process 2544 980b18762056b316782591c1726012d9_JaffaCakes118.exe 2544 980b18762056b316782591c1726012d9_JaffaCakes118.exe 2884 wmpntv32.exe 2884 wmpntv32.exe 2732 wmpntv32.exe 2732 wmpntv32.exe 2024 wmpntv32.exe 2024 wmpntv32.exe 3020 wmpntv32.exe 3020 wmpntv32.exe 1688 wmpntv32.exe 1688 wmpntv32.exe 1696 wmpntv32.exe 1696 wmpntv32.exe 1000 wmpntv32.exe 1000 wmpntv32.exe 2784 wmpntv32.exe 2784 wmpntv32.exe 392 wmpntv32.exe 392 wmpntv32.exe 1884 wmpntv32.exe 1884 wmpntv32.exe 1616 wmpntv32.exe 1616 wmpntv32.exe 1456 wmpntv32.exe 1456 wmpntv32.exe 2112 wmpntv32.exe 2112 wmpntv32.exe 1864 wmpntv32.exe 1864 wmpntv32.exe 2512 wmpntv32.exe 2512 wmpntv32.exe 1520 wmpntv32.exe 1520 wmpntv32.exe 2776 wmpntv32.exe 2776 wmpntv32.exe 2720 wmpntv32.exe 2720 wmpntv32.exe 2772 wmpntv32.exe 2772 wmpntv32.exe 2632 wmpntv32.exe 2632 wmpntv32.exe 1432 wmpntv32.exe 1432 wmpntv32.exe 1688 wmpntv32.exe 1688 wmpntv32.exe 2896 wmpntv32.exe 2896 wmpntv32.exe 1936 wmpntv32.exe 1936 wmpntv32.exe 2256 wmpntv32.exe 2256 wmpntv32.exe 1976 wmpntv32.exe 1976 wmpntv32.exe 576 wmpntv32.exe 576 wmpntv32.exe 1856 wmpntv32.exe 1856 wmpntv32.exe -
Maps connected drives based on registry 3 TTPs 30 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpntv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpntv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpntv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpntv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpntv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpntv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpntv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpntv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpntv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpntv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpntv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpntv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 980b18762056b316782591c1726012d9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpntv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpntv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 980b18762056b316782591c1726012d9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpntv32.exe -
Drops file in System32 directory 45 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ wmpntv32.exe File created C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File created C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File created C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File created C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File opened for modification C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File opened for modification C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File opened for modification C:\Windows\SysWOW64\ 980b18762056b316782591c1726012d9_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wmpntv32.exe 980b18762056b316782591c1726012d9_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File opened for modification C:\Windows\SysWOW64\ wmpntv32.exe File opened for modification C:\Windows\SysWOW64\ wmpntv32.exe File opened for modification C:\Windows\SysWOW64\ wmpntv32.exe File opened for modification C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File created C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File created C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File opened for modification C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File opened for modification C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File opened for modification C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File opened for modification C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File opened for modification C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File opened for modification C:\Windows\SysWOW64\ wmpntv32.exe File opened for modification C:\Windows\SysWOW64\ wmpntv32.exe File opened for modification C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File opened for modification C:\Windows\SysWOW64\ wmpntv32.exe File opened for modification C:\Windows\SysWOW64\ wmpntv32.exe File created C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File opened for modification C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File opened for modification C:\Windows\SysWOW64\ wmpntv32.exe File opened for modification C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File created C:\Windows\SysWOW64\wmpntv32.exe 980b18762056b316782591c1726012d9_JaffaCakes118.exe File created C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File opened for modification C:\Windows\SysWOW64\ wmpntv32.exe File opened for modification C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File opened for modification C:\Windows\SysWOW64\ wmpntv32.exe File created C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File opened for modification C:\Windows\SysWOW64\ wmpntv32.exe File opened for modification C:\Windows\SysWOW64\ wmpntv32.exe File created C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File created C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File created C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File opened for modification C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File created C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File created C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File opened for modification C:\Windows\SysWOW64\ wmpntv32.exe -
Suspicious use of SetThreadContext 15 IoCs
description pid Process procid_target PID 2504 set thread context of 2544 2504 980b18762056b316782591c1726012d9_JaffaCakes118.exe 30 PID 2884 set thread context of 2732 2884 wmpntv32.exe 33 PID 2024 set thread context of 3020 2024 wmpntv32.exe 35 PID 1688 set thread context of 1696 1688 wmpntv32.exe 37 PID 1000 set thread context of 2784 1000 wmpntv32.exe 39 PID 392 set thread context of 1884 392 wmpntv32.exe 41 PID 1616 set thread context of 1456 1616 wmpntv32.exe 43 PID 2112 set thread context of 1864 2112 wmpntv32.exe 45 PID 2512 set thread context of 1520 2512 wmpntv32.exe 47 PID 2776 set thread context of 2720 2776 wmpntv32.exe 49 PID 2772 set thread context of 2632 2772 wmpntv32.exe 51 PID 1432 set thread context of 1688 1432 wmpntv32.exe 53 PID 2896 set thread context of 1936 2896 wmpntv32.exe 55 PID 2256 set thread context of 1976 2256 wmpntv32.exe 57 PID 576 set thread context of 1856 576 wmpntv32.exe 59 -
resource yara_rule behavioral1/memory/2544-12-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2544-11-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2544-10-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2544-7-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2544-5-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2544-3-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2544-13-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2544-14-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2544-25-0x00000000030E0000-0x000000000311C000-memory.dmp upx behavioral1/memory/2544-24-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2544-30-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2732-47-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2732-48-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2732-46-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2732-45-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2732-49-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2732-54-0x0000000003610000-0x000000000364C000-memory.dmp upx behavioral1/memory/2732-59-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/3020-72-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/3020-80-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/3020-81-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1696-95-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1696-101-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1696-107-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2784-122-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2784-126-0x00000000027F0000-0x000000000282C000-memory.dmp upx behavioral1/memory/2784-129-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2784-132-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1884-145-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1884-153-0x00000000031A0000-0x00000000031DC000-memory.dmp upx behavioral1/memory/1884-151-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1884-157-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1456-171-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1456-174-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1456-180-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1864-194-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1864-202-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1864-205-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1520-219-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1520-224-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1520-230-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2720-245-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2720-249-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2720-253-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2772-255-0x0000000000220000-0x000000000025C000-memory.dmp upx behavioral1/memory/2632-264-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2632-270-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2632-273-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1688-284-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1688-286-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1688-290-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1936-301-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1936-304-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1936-303-0x0000000003150000-0x000000000318C000-memory.dmp upx behavioral1/memory/1936-308-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1976-320-0x0000000000400000-0x0000000000456000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 30 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 980b18762056b316782591c1726012d9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 980b18762056b316782591c1726012d9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2544 980b18762056b316782591c1726012d9_JaffaCakes118.exe 2544 980b18762056b316782591c1726012d9_JaffaCakes118.exe 2732 wmpntv32.exe 2732 wmpntv32.exe 3020 wmpntv32.exe 3020 wmpntv32.exe 1696 wmpntv32.exe 1696 wmpntv32.exe 2784 wmpntv32.exe 2784 wmpntv32.exe 1884 wmpntv32.exe 1884 wmpntv32.exe 1456 wmpntv32.exe 1456 wmpntv32.exe 1864 wmpntv32.exe 1864 wmpntv32.exe 1520 wmpntv32.exe 1520 wmpntv32.exe 2720 wmpntv32.exe 2720 wmpntv32.exe 2632 wmpntv32.exe 2632 wmpntv32.exe 1688 wmpntv32.exe 1688 wmpntv32.exe 1936 wmpntv32.exe 1936 wmpntv32.exe 1976 wmpntv32.exe 1976 wmpntv32.exe 1856 wmpntv32.exe 1856 wmpntv32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2544 2504 980b18762056b316782591c1726012d9_JaffaCakes118.exe 30 PID 2504 wrote to memory of 2544 2504 980b18762056b316782591c1726012d9_JaffaCakes118.exe 30 PID 2504 wrote to memory of 2544 2504 980b18762056b316782591c1726012d9_JaffaCakes118.exe 30 PID 2504 wrote to memory of 2544 2504 980b18762056b316782591c1726012d9_JaffaCakes118.exe 30 PID 2504 wrote to memory of 2544 2504 980b18762056b316782591c1726012d9_JaffaCakes118.exe 30 PID 2504 wrote to memory of 2544 2504 980b18762056b316782591c1726012d9_JaffaCakes118.exe 30 PID 2504 wrote to memory of 2544 2504 980b18762056b316782591c1726012d9_JaffaCakes118.exe 30 PID 2544 wrote to memory of 2884 2544 980b18762056b316782591c1726012d9_JaffaCakes118.exe 32 PID 2544 wrote to memory of 2884 2544 980b18762056b316782591c1726012d9_JaffaCakes118.exe 32 PID 2544 wrote to memory of 2884 2544 980b18762056b316782591c1726012d9_JaffaCakes118.exe 32 PID 2544 wrote to memory of 2884 2544 980b18762056b316782591c1726012d9_JaffaCakes118.exe 32 PID 2884 wrote to memory of 2732 2884 wmpntv32.exe 33 PID 2884 wrote to memory of 2732 2884 wmpntv32.exe 33 PID 2884 wrote to memory of 2732 2884 wmpntv32.exe 33 PID 2884 wrote to memory of 2732 2884 wmpntv32.exe 33 PID 2884 wrote to memory of 2732 2884 wmpntv32.exe 33 PID 2884 wrote to memory of 2732 2884 wmpntv32.exe 33 PID 2884 wrote to memory of 2732 2884 wmpntv32.exe 33 PID 2732 wrote to memory of 2024 2732 wmpntv32.exe 34 PID 2732 wrote to memory of 2024 2732 wmpntv32.exe 34 PID 2732 wrote to memory of 2024 2732 wmpntv32.exe 34 PID 2732 wrote to memory of 2024 2732 wmpntv32.exe 34 PID 2024 wrote to memory of 3020 2024 wmpntv32.exe 35 PID 2024 wrote to memory of 3020 2024 wmpntv32.exe 35 PID 2024 wrote to memory of 3020 2024 wmpntv32.exe 35 PID 2024 wrote to memory of 3020 2024 wmpntv32.exe 35 PID 2024 wrote to memory of 3020 2024 wmpntv32.exe 35 PID 2024 wrote to memory of 3020 2024 wmpntv32.exe 35 PID 2024 wrote to memory of 3020 2024 wmpntv32.exe 35 PID 3020 wrote to memory of 1688 3020 wmpntv32.exe 36 PID 3020 wrote to memory of 1688 3020 wmpntv32.exe 36 PID 3020 wrote to memory of 1688 3020 wmpntv32.exe 36 PID 3020 wrote to memory of 1688 3020 wmpntv32.exe 36 PID 1688 wrote to memory of 1696 1688 wmpntv32.exe 37 PID 1688 wrote to memory of 1696 1688 wmpntv32.exe 37 PID 1688 wrote to memory of 1696 1688 wmpntv32.exe 37 PID 1688 wrote to memory of 1696 1688 wmpntv32.exe 37 PID 1688 wrote to memory of 1696 1688 wmpntv32.exe 37 PID 1688 wrote to memory of 1696 1688 wmpntv32.exe 37 PID 1688 wrote to memory of 1696 1688 wmpntv32.exe 37 PID 1696 wrote to memory of 1000 1696 wmpntv32.exe 38 PID 1696 wrote to memory of 1000 1696 wmpntv32.exe 38 PID 1696 wrote to memory of 1000 1696 wmpntv32.exe 38 PID 1696 wrote to memory of 1000 1696 wmpntv32.exe 38 PID 1000 wrote to memory of 2784 1000 wmpntv32.exe 39 PID 1000 wrote to memory of 2784 1000 wmpntv32.exe 39 PID 1000 wrote to memory of 2784 1000 wmpntv32.exe 39 PID 1000 wrote to memory of 2784 1000 wmpntv32.exe 39 PID 1000 wrote to memory of 2784 1000 wmpntv32.exe 39 PID 1000 wrote to memory of 2784 1000 wmpntv32.exe 39 PID 1000 wrote to memory of 2784 1000 wmpntv32.exe 39 PID 2784 wrote to memory of 392 2784 wmpntv32.exe 40 PID 2784 wrote to memory of 392 2784 wmpntv32.exe 40 PID 2784 wrote to memory of 392 2784 wmpntv32.exe 40 PID 2784 wrote to memory of 392 2784 wmpntv32.exe 40 PID 392 wrote to memory of 1884 392 wmpntv32.exe 41 PID 392 wrote to memory of 1884 392 wmpntv32.exe 41 PID 392 wrote to memory of 1884 392 wmpntv32.exe 41 PID 392 wrote to memory of 1884 392 wmpntv32.exe 41 PID 392 wrote to memory of 1884 392 wmpntv32.exe 41 PID 392 wrote to memory of 1884 392 wmpntv32.exe 41 PID 392 wrote to memory of 1884 392 wmpntv32.exe 41 PID 1884 wrote to memory of 1616 1884 wmpntv32.exe 42 PID 1884 wrote to memory of 1616 1884 wmpntv32.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\980b18762056b316782591c1726012d9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\980b18762056b316782591c1726012d9_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\980b18762056b316782591c1726012d9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\980b18762056b316782591c1726012d9_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Users\Admin\AppData\Local\Temp\980B18~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Users\Admin\AppData\Local\Temp\980B18~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1616 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1456 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2112 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1864 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2512 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1520 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2776 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2720 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2772 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2632 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1432 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1688 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2896 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1936 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2256 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1976 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:576 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1856 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe31⤵
- Executes dropped EXE
PID:1504
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152KB
MD5980b18762056b316782591c1726012d9
SHA1e1a9b6d7483e9799a3950879c485b2793d6efa8f
SHA25681aab6d8b41fe078a1bd0117f67de3fbcce8703bc960a083b7844b7495d54e6f
SHA512c67c7550174662e3fadc09142d2e80bf5676122b2848cba897d83f88efc432e396369396291cb8450f506e5b848ca96b7944f1d0035b9dc5c7e8811311f4776f