Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-11-2024 10:27
Static task
static1
Behavioral task
behavioral1
Sample
a763573243b374b99bbeed9710709da3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a763573243b374b99bbeed9710709da3_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a763573243b374b99bbeed9710709da3_JaffaCakes118.exe
-
Size
253KB
-
MD5
a763573243b374b99bbeed9710709da3
-
SHA1
b8c74fc1e56689c1d0ed303ca4deda31a50e5a97
-
SHA256
a63b74ead0e28dc9b9873cd15e65d656f0694ddfacd0f78965c291d0e87879f9
-
SHA512
2a877d2ad008534fa963130ad5c866d82852f1fa287f26e525dd9c9a3945a0f400a2aab5e82b38f2d5b329b06cefb304e3c3723fce1e887666170e42d3f2a9f8
-
SSDEEP
6144:wohZUPi4NiH5rGPm0gTOjpFfu/Db5l/kPjomLT:VhZ+uOXunijL
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2948 wmpxc2.exe -
Executes dropped EXE 53 IoCs
pid Process 2948 wmpxc2.exe 2612 wmpxc2.exe 764 wmpxc2.exe 1960 wmpxc2.exe 612 wmpxc2.exe 1668 wmpxc2.exe 1256 wmpxc2.exe 1880 wmpxc2.exe 2248 wmpxc2.exe 2172 wmpxc2.exe 676 wmpxc2.exe 1948 wmpxc2.exe 1672 wmpxc2.exe 1552 wmpxc2.exe 1708 wmpxc2.exe 1720 wmpxc2.exe 1608 wmpxc2.exe 2796 wmpxc2.exe 1144 wmpxc2.exe 1940 wmpxc2.exe 2348 wmpxc2.exe 776 wmpxc2.exe 1768 wmpxc2.exe 1600 wmpxc2.exe 2932 wmpxc2.exe 2308 wmpxc2.exe 2516 wmpxc2.exe 1124 wmpxc2.exe 2752 wmpxc2.exe 2156 wmpxc2.exe 1884 wmpxc2.exe 2080 wmpxc2.exe 2580 wmpxc2.exe 2964 wmpxc2.exe 2504 wmpxc2.exe 2800 wmpxc2.exe 2568 wmpxc2.exe 2388 wmpxc2.exe 676 wmpxc2.exe 2348 wmpxc2.exe 1704 wmpxc2.exe 1668 wmpxc2.exe 2576 wmpxc2.exe 2004 wmpxc2.exe 2996 wmpxc2.exe 1624 wmpxc2.exe 2984 wmpxc2.exe 2088 wmpxc2.exe 1088 wmpxc2.exe 2372 wmpxc2.exe 2480 wmpxc2.exe 2164 wmpxc2.exe 2700 wmpxc2.exe -
Loads dropped DLL 64 IoCs
pid Process 2136 a763573243b374b99bbeed9710709da3_JaffaCakes118.exe 2136 a763573243b374b99bbeed9710709da3_JaffaCakes118.exe 2948 wmpxc2.exe 2948 wmpxc2.exe 2612 wmpxc2.exe 2612 wmpxc2.exe 764 wmpxc2.exe 764 wmpxc2.exe 1960 wmpxc2.exe 1960 wmpxc2.exe 612 wmpxc2.exe 612 wmpxc2.exe 1668 wmpxc2.exe 1668 wmpxc2.exe 1256 wmpxc2.exe 1256 wmpxc2.exe 1880 wmpxc2.exe 1880 wmpxc2.exe 2248 wmpxc2.exe 2248 wmpxc2.exe 2172 wmpxc2.exe 2172 wmpxc2.exe 676 wmpxc2.exe 676 wmpxc2.exe 1948 wmpxc2.exe 1948 wmpxc2.exe 1672 wmpxc2.exe 1672 wmpxc2.exe 1552 wmpxc2.exe 1552 wmpxc2.exe 1708 wmpxc2.exe 1708 wmpxc2.exe 1720 wmpxc2.exe 1720 wmpxc2.exe 1608 wmpxc2.exe 1608 wmpxc2.exe 2796 wmpxc2.exe 2796 wmpxc2.exe 1144 wmpxc2.exe 1144 wmpxc2.exe 1940 wmpxc2.exe 1940 wmpxc2.exe 2348 wmpxc2.exe 2348 wmpxc2.exe 776 wmpxc2.exe 776 wmpxc2.exe 1768 wmpxc2.exe 1768 wmpxc2.exe 1600 wmpxc2.exe 1600 wmpxc2.exe 2932 wmpxc2.exe 2932 wmpxc2.exe 2308 wmpxc2.exe 2308 wmpxc2.exe 2516 wmpxc2.exe 2516 wmpxc2.exe 1124 wmpxc2.exe 1124 wmpxc2.exe 2752 wmpxc2.exe 2752 wmpxc2.exe 2156 wmpxc2.exe 2156 wmpxc2.exe 1884 wmpxc2.exe 1884 wmpxc2.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxc2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxc2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxc2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxc2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum a763573243b374b99bbeed9710709da3_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxc2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxc2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxc2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxc2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxc2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxc2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxc2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxc2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxc2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxc2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxc2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxc2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxc2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxc2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxc2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxc2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxc2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxc2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxc2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxc2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 a763573243b374b99bbeed9710709da3_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxc2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxc2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpxc2.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wmpxc2.exe wmpxc2.exe File opened for modification C:\Windows\SysWOW64\wmpxc2.exe wmpxc2.exe File opened for modification C:\Windows\SysWOW64\ wmpxc2.exe File opened for modification C:\Windows\SysWOW64\ wmpxc2.exe File opened for modification C:\Windows\SysWOW64\wmpxc2.exe wmpxc2.exe File opened for modification C:\Windows\SysWOW64\ wmpxc2.exe File created C:\Windows\SysWOW64\wmpxc2.exe wmpxc2.exe File opened for modification C:\Windows\SysWOW64\wmpxc2.exe wmpxc2.exe File opened for modification C:\Windows\SysWOW64\wmpxc2.exe wmpxc2.exe File created C:\Windows\SysWOW64\wmpxc2.exe wmpxc2.exe File opened for modification C:\Windows\SysWOW64\ wmpxc2.exe File opened for modification C:\Windows\SysWOW64\wmpxc2.exe wmpxc2.exe File opened for modification C:\Windows\SysWOW64\wmpxc2.exe wmpxc2.exe File opened for modification C:\Windows\SysWOW64\wmpxc2.exe wmpxc2.exe File opened for modification C:\Windows\SysWOW64\wmpxc2.exe wmpxc2.exe File created C:\Windows\SysWOW64\wmpxc2.exe wmpxc2.exe File created C:\Windows\SysWOW64\wmpxc2.exe wmpxc2.exe File created C:\Windows\SysWOW64\wmpxc2.exe wmpxc2.exe File opened for modification C:\Windows\SysWOW64\wmpxc2.exe wmpxc2.exe File created C:\Windows\SysWOW64\wmpxc2.exe wmpxc2.exe File opened for modification C:\Windows\SysWOW64\wmpxc2.exe wmpxc2.exe File created C:\Windows\SysWOW64\wmpxc2.exe wmpxc2.exe File opened for modification C:\Windows\SysWOW64\ wmpxc2.exe File opened for modification C:\Windows\SysWOW64\wmpxc2.exe wmpxc2.exe File created C:\Windows\SysWOW64\wmpxc2.exe wmpxc2.exe File created C:\Windows\SysWOW64\wmpxc2.exe wmpxc2.exe File opened for modification C:\Windows\SysWOW64\ wmpxc2.exe File opened for modification C:\Windows\SysWOW64\wmpxc2.exe wmpxc2.exe File opened for modification C:\Windows\SysWOW64\ wmpxc2.exe File opened for modification C:\Windows\SysWOW64\ wmpxc2.exe File opened for modification C:\Windows\SysWOW64\ wmpxc2.exe File opened for modification C:\Windows\SysWOW64\wmpxc2.exe wmpxc2.exe File created C:\Windows\SysWOW64\wmpxc2.exe wmpxc2.exe File opened for modification C:\Windows\SysWOW64\ wmpxc2.exe File created C:\Windows\SysWOW64\wmpxc2.exe wmpxc2.exe File opened for modification C:\Windows\SysWOW64\ wmpxc2.exe File opened for modification C:\Windows\SysWOW64\wmpxc2.exe wmpxc2.exe File opened for modification C:\Windows\SysWOW64\wmpxc2.exe wmpxc2.exe File opened for modification C:\Windows\SysWOW64\ wmpxc2.exe File opened for modification C:\Windows\SysWOW64\ wmpxc2.exe File opened for modification C:\Windows\SysWOW64\wmpxc2.exe wmpxc2.exe File opened for modification C:\Windows\SysWOW64\ wmpxc2.exe File opened for modification C:\Windows\SysWOW64\ wmpxc2.exe File opened for modification C:\Windows\SysWOW64\ wmpxc2.exe File opened for modification C:\Windows\SysWOW64\wmpxc2.exe wmpxc2.exe File created C:\Windows\SysWOW64\wmpxc2.exe wmpxc2.exe File created C:\Windows\SysWOW64\wmpxc2.exe wmpxc2.exe File opened for modification C:\Windows\SysWOW64\ wmpxc2.exe File opened for modification C:\Windows\SysWOW64\ wmpxc2.exe File opened for modification C:\Windows\SysWOW64\ wmpxc2.exe File created C:\Windows\SysWOW64\wmpxc2.exe wmpxc2.exe File opened for modification C:\Windows\SysWOW64\wmpxc2.exe wmpxc2.exe File opened for modification C:\Windows\SysWOW64\wmpxc2.exe wmpxc2.exe File opened for modification C:\Windows\SysWOW64\ wmpxc2.exe File opened for modification C:\Windows\SysWOW64\ wmpxc2.exe File opened for modification C:\Windows\SysWOW64\wmpxc2.exe wmpxc2.exe File opened for modification C:\Windows\SysWOW64\ wmpxc2.exe File created C:\Windows\SysWOW64\wmpxc2.exe wmpxc2.exe File opened for modification C:\Windows\SysWOW64\wmpxc2.exe wmpxc2.exe File opened for modification C:\Windows\SysWOW64\wmpxc2.exe wmpxc2.exe File created C:\Windows\SysWOW64\wmpxc2.exe wmpxc2.exe File opened for modification C:\Windows\SysWOW64\ wmpxc2.exe File created C:\Windows\SysWOW64\wmpxc2.exe wmpxc2.exe File created C:\Windows\SysWOW64\wmpxc2.exe wmpxc2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 53 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a763573243b374b99bbeed9710709da3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxc2.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 2136 a763573243b374b99bbeed9710709da3_JaffaCakes118.exe 2948 wmpxc2.exe 2612 wmpxc2.exe 764 wmpxc2.exe 1960 wmpxc2.exe 612 wmpxc2.exe 1668 wmpxc2.exe 1256 wmpxc2.exe 1880 wmpxc2.exe 2248 wmpxc2.exe 2172 wmpxc2.exe 676 wmpxc2.exe 1948 wmpxc2.exe 1672 wmpxc2.exe 1552 wmpxc2.exe 1708 wmpxc2.exe 1720 wmpxc2.exe 1608 wmpxc2.exe 2796 wmpxc2.exe 1144 wmpxc2.exe 1940 wmpxc2.exe 2348 wmpxc2.exe 776 wmpxc2.exe 1768 wmpxc2.exe 1600 wmpxc2.exe 2932 wmpxc2.exe 2308 wmpxc2.exe 2516 wmpxc2.exe 1124 wmpxc2.exe 2752 wmpxc2.exe 2156 wmpxc2.exe 1884 wmpxc2.exe 2080 wmpxc2.exe 2580 wmpxc2.exe 2964 wmpxc2.exe 2504 wmpxc2.exe 2800 wmpxc2.exe 2568 wmpxc2.exe 2388 wmpxc2.exe 676 wmpxc2.exe 2348 wmpxc2.exe 1704 wmpxc2.exe 1668 wmpxc2.exe 2576 wmpxc2.exe 2004 wmpxc2.exe 2996 wmpxc2.exe 1624 wmpxc2.exe 2984 wmpxc2.exe 2088 wmpxc2.exe 1088 wmpxc2.exe 2372 wmpxc2.exe 2480 wmpxc2.exe 2164 wmpxc2.exe 2700 wmpxc2.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2948 2136 a763573243b374b99bbeed9710709da3_JaffaCakes118.exe 28 PID 2136 wrote to memory of 2948 2136 a763573243b374b99bbeed9710709da3_JaffaCakes118.exe 28 PID 2136 wrote to memory of 2948 2136 a763573243b374b99bbeed9710709da3_JaffaCakes118.exe 28 PID 2136 wrote to memory of 2948 2136 a763573243b374b99bbeed9710709da3_JaffaCakes118.exe 28 PID 2948 wrote to memory of 2612 2948 wmpxc2.exe 29 PID 2948 wrote to memory of 2612 2948 wmpxc2.exe 29 PID 2948 wrote to memory of 2612 2948 wmpxc2.exe 29 PID 2948 wrote to memory of 2612 2948 wmpxc2.exe 29 PID 2612 wrote to memory of 764 2612 wmpxc2.exe 30 PID 2612 wrote to memory of 764 2612 wmpxc2.exe 30 PID 2612 wrote to memory of 764 2612 wmpxc2.exe 30 PID 2612 wrote to memory of 764 2612 wmpxc2.exe 30 PID 764 wrote to memory of 1960 764 wmpxc2.exe 31 PID 764 wrote to memory of 1960 764 wmpxc2.exe 31 PID 764 wrote to memory of 1960 764 wmpxc2.exe 31 PID 764 wrote to memory of 1960 764 wmpxc2.exe 31 PID 1960 wrote to memory of 612 1960 wmpxc2.exe 34 PID 1960 wrote to memory of 612 1960 wmpxc2.exe 34 PID 1960 wrote to memory of 612 1960 wmpxc2.exe 34 PID 1960 wrote to memory of 612 1960 wmpxc2.exe 34 PID 612 wrote to memory of 1668 612 wmpxc2.exe 35 PID 612 wrote to memory of 1668 612 wmpxc2.exe 35 PID 612 wrote to memory of 1668 612 wmpxc2.exe 35 PID 612 wrote to memory of 1668 612 wmpxc2.exe 35 PID 1668 wrote to memory of 1256 1668 wmpxc2.exe 36 PID 1668 wrote to memory of 1256 1668 wmpxc2.exe 36 PID 1668 wrote to memory of 1256 1668 wmpxc2.exe 36 PID 1668 wrote to memory of 1256 1668 wmpxc2.exe 36 PID 1256 wrote to memory of 1880 1256 wmpxc2.exe 37 PID 1256 wrote to memory of 1880 1256 wmpxc2.exe 37 PID 1256 wrote to memory of 1880 1256 wmpxc2.exe 37 PID 1256 wrote to memory of 1880 1256 wmpxc2.exe 37 PID 1880 wrote to memory of 2248 1880 wmpxc2.exe 38 PID 1880 wrote to memory of 2248 1880 wmpxc2.exe 38 PID 1880 wrote to memory of 2248 1880 wmpxc2.exe 38 PID 1880 wrote to memory of 2248 1880 wmpxc2.exe 38 PID 2248 wrote to memory of 2172 2248 wmpxc2.exe 39 PID 2248 wrote to memory of 2172 2248 wmpxc2.exe 39 PID 2248 wrote to memory of 2172 2248 wmpxc2.exe 39 PID 2248 wrote to memory of 2172 2248 wmpxc2.exe 39 PID 2172 wrote to memory of 676 2172 wmpxc2.exe 40 PID 2172 wrote to memory of 676 2172 wmpxc2.exe 40 PID 2172 wrote to memory of 676 2172 wmpxc2.exe 40 PID 2172 wrote to memory of 676 2172 wmpxc2.exe 40 PID 676 wrote to memory of 1948 676 wmpxc2.exe 41 PID 676 wrote to memory of 1948 676 wmpxc2.exe 41 PID 676 wrote to memory of 1948 676 wmpxc2.exe 41 PID 676 wrote to memory of 1948 676 wmpxc2.exe 41 PID 1948 wrote to memory of 1672 1948 wmpxc2.exe 42 PID 1948 wrote to memory of 1672 1948 wmpxc2.exe 42 PID 1948 wrote to memory of 1672 1948 wmpxc2.exe 42 PID 1948 wrote to memory of 1672 1948 wmpxc2.exe 42 PID 1672 wrote to memory of 1552 1672 wmpxc2.exe 43 PID 1672 wrote to memory of 1552 1672 wmpxc2.exe 43 PID 1672 wrote to memory of 1552 1672 wmpxc2.exe 43 PID 1672 wrote to memory of 1552 1672 wmpxc2.exe 43 PID 1552 wrote to memory of 1708 1552 wmpxc2.exe 44 PID 1552 wrote to memory of 1708 1552 wmpxc2.exe 44 PID 1552 wrote to memory of 1708 1552 wmpxc2.exe 44 PID 1552 wrote to memory of 1708 1552 wmpxc2.exe 44 PID 1708 wrote to memory of 1720 1708 wmpxc2.exe 45 PID 1708 wrote to memory of 1720 1708 wmpxc2.exe 45 PID 1708 wrote to memory of 1720 1708 wmpxc2.exe 45 PID 1708 wrote to memory of 1720 1708 wmpxc2.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\a763573243b374b99bbeed9710709da3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a763573243b374b99bbeed9710709da3_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Users\Admin\AppData\Local\Temp\A76357~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1720 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1608 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2796 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1144 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1940 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2348 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:776 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1768 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1600 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2932 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2308 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2516 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1124 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2752 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2156 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1884 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2080 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2580 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2964 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2504 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2800 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2568 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2388 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:676 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2348 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe42⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1704 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1668 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2576 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2004 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2996 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe47⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1624 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe48⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2984 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2088 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe50⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1088 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe51⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2372 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe52⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2480 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe53⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2164 -
C:\Windows\SysWOW64\wmpxc2.exe"C:\Windows\system32\wmpxc2.exe" C:\Windows\SysWOW64\wmpxc2.exe54⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2700
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
253KB
MD5a763573243b374b99bbeed9710709da3
SHA1b8c74fc1e56689c1d0ed303ca4deda31a50e5a97
SHA256a63b74ead0e28dc9b9873cd15e65d656f0694ddfacd0f78965c291d0e87879f9
SHA5122a877d2ad008534fa963130ad5c866d82852f1fa287f26e525dd9c9a3945a0f400a2aab5e82b38f2d5b329b06cefb304e3c3723fce1e887666170e42d3f2a9f8