Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 18:21
Static task
static1
Behavioral task
behavioral1
Sample
a36bf849262e549aac67ec6638fad090_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a36bf849262e549aac67ec6638fad090_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a36bf849262e549aac67ec6638fad090_JaffaCakes118.exe
-
Size
168KB
-
MD5
a36bf849262e549aac67ec6638fad090
-
SHA1
6289b56969e48e65cb5a11aeaa8eb8a2de1f3194
-
SHA256
0edcbeec2a709b41ad03902cb61ed187b63aef02dfc07f2549a10ccbd95f6bae
-
SHA512
5d3513f101c3906eeffcb4d599989b6e08c6f131c6712ebd495e68e64d81452c84d4d4834e444268814f626f1ba57bb80e4b196824169134d7a6d98915d164db
-
SSDEEP
3072:LHrTUtapRqBxWhwO8pJ8j5ouK9Uq8Rcg2yAXuM9APy0/L6r1+KD60L:rHRAc1OJYoLOq8RAy4uDP5/rc
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2624 wnpjt3.exe -
Executes dropped EXE 30 IoCs
pid Process 3040 wnpjt3.exe 2624 wnpjt3.exe 2976 wnpjt3.exe 952 wnpjt3.exe 1608 wnpjt3.exe 3056 wnpjt3.exe 2440 wnpjt3.exe 2112 wnpjt3.exe 572 wnpjt3.exe 2464 wnpjt3.exe 2688 wnpjt3.exe 2392 wnpjt3.exe 2892 wnpjt3.exe 2120 wnpjt3.exe 1244 wnpjt3.exe 772 wnpjt3.exe 2340 wnpjt3.exe 2192 wnpjt3.exe 1140 wnpjt3.exe 848 wnpjt3.exe 1708 wnpjt3.exe 2784 wnpjt3.exe 2088 wnpjt3.exe 1132 wnpjt3.exe 2796 wnpjt3.exe 2832 wnpjt3.exe 2288 wnpjt3.exe 2236 wnpjt3.exe 2960 wnpjt3.exe 2372 wnpjt3.exe -
Loads dropped DLL 30 IoCs
pid Process 2476 a36bf849262e549aac67ec6638fad090_JaffaCakes118.exe 2476 a36bf849262e549aac67ec6638fad090_JaffaCakes118.exe 2624 wnpjt3.exe 2624 wnpjt3.exe 952 wnpjt3.exe 952 wnpjt3.exe 3056 wnpjt3.exe 3056 wnpjt3.exe 2112 wnpjt3.exe 2112 wnpjt3.exe 2464 wnpjt3.exe 2464 wnpjt3.exe 2392 wnpjt3.exe 2392 wnpjt3.exe 2120 wnpjt3.exe 2120 wnpjt3.exe 772 wnpjt3.exe 772 wnpjt3.exe 2192 wnpjt3.exe 2192 wnpjt3.exe 848 wnpjt3.exe 848 wnpjt3.exe 2784 wnpjt3.exe 2784 wnpjt3.exe 1132 wnpjt3.exe 1132 wnpjt3.exe 2832 wnpjt3.exe 2832 wnpjt3.exe 2236 wnpjt3.exe 2236 wnpjt3.exe -
Maps connected drives based on registry 3 TTPs 32 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum a36bf849262e549aac67ec6638fad090_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 a36bf849262e549aac67ec6638fad090_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe -
Drops file in System32 directory 30 IoCs
description ioc Process File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe a36bf849262e549aac67ec6638fad090_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe a36bf849262e549aac67ec6638fad090_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe -
Suspicious use of SetThreadContext 16 IoCs
description pid Process procid_target PID 1764 set thread context of 2476 1764 a36bf849262e549aac67ec6638fad090_JaffaCakes118.exe 31 PID 3040 set thread context of 2624 3040 wnpjt3.exe 34 PID 2976 set thread context of 952 2976 wnpjt3.exe 37 PID 1608 set thread context of 3056 1608 wnpjt3.exe 40 PID 2440 set thread context of 2112 2440 wnpjt3.exe 43 PID 572 set thread context of 2464 572 wnpjt3.exe 46 PID 2688 set thread context of 2392 2688 wnpjt3.exe 49 PID 2892 set thread context of 2120 2892 wnpjt3.exe 52 PID 1244 set thread context of 772 1244 wnpjt3.exe 54 PID 2340 set thread context of 2192 2340 wnpjt3.exe 56 PID 1140 set thread context of 848 1140 wnpjt3.exe 58 PID 1708 set thread context of 2784 1708 wnpjt3.exe 60 PID 2088 set thread context of 1132 2088 wnpjt3.exe 63 PID 2796 set thread context of 2832 2796 wnpjt3.exe 65 PID 2288 set thread context of 2236 2288 wnpjt3.exe 67 PID 2960 set thread context of 2372 2960 wnpjt3.exe 69 -
resource yara_rule behavioral1/memory/2476-2-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2476-6-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2476-7-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2476-4-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2476-3-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2476-9-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2476-8-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2476-20-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2624-32-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2624-31-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2624-33-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2624-38-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/952-48-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/952-49-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/952-50-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/952-56-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/3056-66-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/3056-65-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/3056-72-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2112-82-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2112-90-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2464-106-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2392-116-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2392-123-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2120-135-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2120-142-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/772-158-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2192-174-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/848-190-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2784-199-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2784-208-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1132-219-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1132-225-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2832-235-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2832-241-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2236-250-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2236-254-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2372-263-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 32 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a36bf849262e549aac67ec6638fad090_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a36bf849262e549aac67ec6638fad090_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 2476 a36bf849262e549aac67ec6638fad090_JaffaCakes118.exe 2624 wnpjt3.exe 952 wnpjt3.exe 3056 wnpjt3.exe 2112 wnpjt3.exe 2464 wnpjt3.exe 2392 wnpjt3.exe 2120 wnpjt3.exe 772 wnpjt3.exe 2192 wnpjt3.exe 848 wnpjt3.exe 2784 wnpjt3.exe 1132 wnpjt3.exe 2832 wnpjt3.exe 2236 wnpjt3.exe 2372 wnpjt3.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1764 wrote to memory of 2476 1764 a36bf849262e549aac67ec6638fad090_JaffaCakes118.exe 31 PID 1764 wrote to memory of 2476 1764 a36bf849262e549aac67ec6638fad090_JaffaCakes118.exe 31 PID 1764 wrote to memory of 2476 1764 a36bf849262e549aac67ec6638fad090_JaffaCakes118.exe 31 PID 1764 wrote to memory of 2476 1764 a36bf849262e549aac67ec6638fad090_JaffaCakes118.exe 31 PID 1764 wrote to memory of 2476 1764 a36bf849262e549aac67ec6638fad090_JaffaCakes118.exe 31 PID 1764 wrote to memory of 2476 1764 a36bf849262e549aac67ec6638fad090_JaffaCakes118.exe 31 PID 1764 wrote to memory of 2476 1764 a36bf849262e549aac67ec6638fad090_JaffaCakes118.exe 31 PID 2476 wrote to memory of 3040 2476 a36bf849262e549aac67ec6638fad090_JaffaCakes118.exe 33 PID 2476 wrote to memory of 3040 2476 a36bf849262e549aac67ec6638fad090_JaffaCakes118.exe 33 PID 2476 wrote to memory of 3040 2476 a36bf849262e549aac67ec6638fad090_JaffaCakes118.exe 33 PID 2476 wrote to memory of 3040 2476 a36bf849262e549aac67ec6638fad090_JaffaCakes118.exe 33 PID 3040 wrote to memory of 2624 3040 wnpjt3.exe 34 PID 3040 wrote to memory of 2624 3040 wnpjt3.exe 34 PID 3040 wrote to memory of 2624 3040 wnpjt3.exe 34 PID 3040 wrote to memory of 2624 3040 wnpjt3.exe 34 PID 3040 wrote to memory of 2624 3040 wnpjt3.exe 34 PID 3040 wrote to memory of 2624 3040 wnpjt3.exe 34 PID 3040 wrote to memory of 2624 3040 wnpjt3.exe 34 PID 2624 wrote to memory of 2976 2624 wnpjt3.exe 36 PID 2624 wrote to memory of 2976 2624 wnpjt3.exe 36 PID 2624 wrote to memory of 2976 2624 wnpjt3.exe 36 PID 2624 wrote to memory of 2976 2624 wnpjt3.exe 36 PID 2976 wrote to memory of 952 2976 wnpjt3.exe 37 PID 2976 wrote to memory of 952 2976 wnpjt3.exe 37 PID 2976 wrote to memory of 952 2976 wnpjt3.exe 37 PID 2976 wrote to memory of 952 2976 wnpjt3.exe 37 PID 2976 wrote to memory of 952 2976 wnpjt3.exe 37 PID 2976 wrote to memory of 952 2976 wnpjt3.exe 37 PID 2976 wrote to memory of 952 2976 wnpjt3.exe 37 PID 952 wrote to memory of 1608 952 wnpjt3.exe 39 PID 952 wrote to memory of 1608 952 wnpjt3.exe 39 PID 952 wrote to memory of 1608 952 wnpjt3.exe 39 PID 952 wrote to memory of 1608 952 wnpjt3.exe 39 PID 1608 wrote to memory of 3056 1608 wnpjt3.exe 40 PID 1608 wrote to memory of 3056 1608 wnpjt3.exe 40 PID 1608 wrote to memory of 3056 1608 wnpjt3.exe 40 PID 1608 wrote to memory of 3056 1608 wnpjt3.exe 40 PID 1608 wrote to memory of 3056 1608 wnpjt3.exe 40 PID 1608 wrote to memory of 3056 1608 wnpjt3.exe 40 PID 1608 wrote to memory of 3056 1608 wnpjt3.exe 40 PID 3056 wrote to memory of 2440 3056 wnpjt3.exe 42 PID 3056 wrote to memory of 2440 3056 wnpjt3.exe 42 PID 3056 wrote to memory of 2440 3056 wnpjt3.exe 42 PID 3056 wrote to memory of 2440 3056 wnpjt3.exe 42 PID 2440 wrote to memory of 2112 2440 wnpjt3.exe 43 PID 2440 wrote to memory of 2112 2440 wnpjt3.exe 43 PID 2440 wrote to memory of 2112 2440 wnpjt3.exe 43 PID 2440 wrote to memory of 2112 2440 wnpjt3.exe 43 PID 2440 wrote to memory of 2112 2440 wnpjt3.exe 43 PID 2440 wrote to memory of 2112 2440 wnpjt3.exe 43 PID 2440 wrote to memory of 2112 2440 wnpjt3.exe 43 PID 2112 wrote to memory of 572 2112 wnpjt3.exe 45 PID 2112 wrote to memory of 572 2112 wnpjt3.exe 45 PID 2112 wrote to memory of 572 2112 wnpjt3.exe 45 PID 2112 wrote to memory of 572 2112 wnpjt3.exe 45 PID 572 wrote to memory of 2464 572 wnpjt3.exe 46 PID 572 wrote to memory of 2464 572 wnpjt3.exe 46 PID 572 wrote to memory of 2464 572 wnpjt3.exe 46 PID 572 wrote to memory of 2464 572 wnpjt3.exe 46 PID 572 wrote to memory of 2464 572 wnpjt3.exe 46 PID 572 wrote to memory of 2464 572 wnpjt3.exe 46 PID 572 wrote to memory of 2464 572 wnpjt3.exe 46 PID 2464 wrote to memory of 2688 2464 wnpjt3.exe 48 PID 2464 wrote to memory of 2688 2464 wnpjt3.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\a36bf849262e549aac67ec6638fad090_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a36bf849262e549aac67ec6638fad090_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\a36bf849262e549aac67ec6638fad090_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a36bf849262e549aac67ec6638fad090_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Users\Admin\AppData\Local\Temp\A36BF8~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Users\Admin\AppData\Local\Temp\A36BF8~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2688 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2392 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2892 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2120 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1244 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:772 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2340 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2192 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1140 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:848 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1708 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2784 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2088 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1132 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2796 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2832 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2288 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2236 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2960 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe32⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2372
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5a36bf849262e549aac67ec6638fad090
SHA16289b56969e48e65cb5a11aeaa8eb8a2de1f3194
SHA2560edcbeec2a709b41ad03902cb61ed187b63aef02dfc07f2549a10ccbd95f6bae
SHA5125d3513f101c3906eeffcb4d599989b6e08c6f131c6712ebd495e68e64d81452c84d4d4834e444268814f626f1ba57bb80e4b196824169134d7a6d98915d164db