Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-11-2024 14:00
Static task
static1
Behavioral task
behavioral1
Sample
a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe
-
Size
164KB
-
MD5
a82cb0780c7a48983dc4e061361da2b9
-
SHA1
08d5188f52214220ccf5ad66b8c4c53403b48092
-
SHA256
d8c50fb040912e02a8f4c9a34329f0f26244a55ed0494daa5a14e526e59210d6
-
SHA512
4b64375d5fdf7adf2dc254026404c363dc9c35420a3249455bab1c9085a7e7e3dc2578fba36d184d67ecd83c9aa6864046db871c4dc71aba5c4d2e7e3ed07e06
-
SSDEEP
3072:m4OwiHtBl7NRDaG9vb/eNtHv6F4Qsq4OFXUTIxPPnbkDw1NXEGUU4v97j:cxXDF9zeNtPc4wFXUTWPPbkkXOl7j
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2848 wnpdx2.exe -
Executes dropped EXE 64 IoCs
pid Process 2508 wnpdx2.exe 2848 wnpdx2.exe 2572 wnpdx2.exe 320 wnpdx2.exe 576 wnpdx2.exe 552 wnpdx2.exe 2336 wnpdx2.exe 1812 wnpdx2.exe 796 wnpdx2.exe 2008 wnpdx2.exe 2540 wnpdx2.exe 3036 wnpdx2.exe 676 wnpdx2.exe 1300 wnpdx2.exe 1164 wnpdx2.exe 2180 wnpdx2.exe 1844 wnpdx2.exe 2392 wnpdx2.exe 2704 wnpdx2.exe 2664 wnpdx2.exe 2496 wnpdx2.exe 332 wnpdx2.exe 572 wnpdx2.exe 2560 wnpdx2.exe 2860 wnpdx2.exe 2460 wnpdx2.exe 1076 wnpdx2.exe 1972 wnpdx2.exe 2992 wnpdx2.exe 1244 wnpdx2.exe 600 wnpdx2.exe 2124 wnpdx2.exe 1564 wnpdx2.exe 2092 wnpdx2.exe 888 wnpdx2.exe 1784 wnpdx2.exe 1512 wnpdx2.exe 2656 wnpdx2.exe 2660 wnpdx2.exe 2144 wnpdx2.exe 2980 wnpdx2.exe 2784 wnpdx2.exe 2796 wnpdx2.exe 2844 wnpdx2.exe 2476 wnpdx2.exe 1764 wnpdx2.exe 2472 wnpdx2.exe 2872 wnpdx2.exe 1996 wnpdx2.exe 2920 wnpdx2.exe 316 wnpdx2.exe 1720 wnpdx2.exe 2268 wnpdx2.exe 1928 wnpdx2.exe 1320 wnpdx2.exe 1652 wnpdx2.exe 2332 wnpdx2.exe 3024 wnpdx2.exe 2972 wnpdx2.exe 2660 wnpdx2.exe 792 wnpdx2.exe 2980 wnpdx2.exe 2868 wnpdx2.exe 2776 wnpdx2.exe -
Loads dropped DLL 64 IoCs
pid Process 1072 a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe 1072 a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe 2848 wnpdx2.exe 2848 wnpdx2.exe 320 wnpdx2.exe 320 wnpdx2.exe 552 wnpdx2.exe 552 wnpdx2.exe 1812 wnpdx2.exe 1812 wnpdx2.exe 2008 wnpdx2.exe 2008 wnpdx2.exe 3036 wnpdx2.exe 3036 wnpdx2.exe 1300 wnpdx2.exe 1300 wnpdx2.exe 2180 wnpdx2.exe 2180 wnpdx2.exe 2392 wnpdx2.exe 2392 wnpdx2.exe 2664 wnpdx2.exe 2664 wnpdx2.exe 332 wnpdx2.exe 332 wnpdx2.exe 2560 wnpdx2.exe 2560 wnpdx2.exe 2460 wnpdx2.exe 2460 wnpdx2.exe 1972 wnpdx2.exe 1972 wnpdx2.exe 1244 wnpdx2.exe 1244 wnpdx2.exe 2124 wnpdx2.exe 2124 wnpdx2.exe 2092 wnpdx2.exe 2092 wnpdx2.exe 1784 wnpdx2.exe 1784 wnpdx2.exe 2656 wnpdx2.exe 2656 wnpdx2.exe 2144 wnpdx2.exe 2144 wnpdx2.exe 2784 wnpdx2.exe 2784 wnpdx2.exe 2844 wnpdx2.exe 2844 wnpdx2.exe 1764 wnpdx2.exe 1764 wnpdx2.exe 2872 wnpdx2.exe 2872 wnpdx2.exe 2920 wnpdx2.exe 2920 wnpdx2.exe 1720 wnpdx2.exe 1720 wnpdx2.exe 1928 wnpdx2.exe 1928 wnpdx2.exe 1652 wnpdx2.exe 1652 wnpdx2.exe 3024 wnpdx2.exe 3024 wnpdx2.exe 2660 wnpdx2.exe 2660 wnpdx2.exe 2980 wnpdx2.exe 2980 wnpdx2.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx2.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe -
Suspicious use of SetThreadContext 50 IoCs
description pid Process procid_target PID 1044 set thread context of 1072 1044 a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe 28 PID 2508 set thread context of 2848 2508 wnpdx2.exe 30 PID 2572 set thread context of 320 2572 wnpdx2.exe 32 PID 576 set thread context of 552 576 wnpdx2.exe 34 PID 2336 set thread context of 1812 2336 wnpdx2.exe 36 PID 796 set thread context of 2008 796 wnpdx2.exe 38 PID 2540 set thread context of 3036 2540 wnpdx2.exe 40 PID 676 set thread context of 1300 676 wnpdx2.exe 42 PID 1164 set thread context of 2180 1164 wnpdx2.exe 44 PID 1844 set thread context of 2392 1844 wnpdx2.exe 46 PID 2704 set thread context of 2664 2704 wnpdx2.exe 50 PID 2496 set thread context of 332 2496 wnpdx2.exe 52 PID 572 set thread context of 2560 572 wnpdx2.exe 54 PID 2860 set thread context of 2460 2860 wnpdx2.exe 56 PID 1076 set thread context of 1972 1076 wnpdx2.exe 58 PID 2992 set thread context of 1244 2992 wnpdx2.exe 60 PID 600 set thread context of 2124 600 wnpdx2.exe 62 PID 1564 set thread context of 2092 1564 wnpdx2.exe 64 PID 888 set thread context of 1784 888 wnpdx2.exe 66 PID 1512 set thread context of 2656 1512 wnpdx2.exe 68 PID 2660 set thread context of 2144 2660 wnpdx2.exe 70 PID 2980 set thread context of 2784 2980 wnpdx2.exe 72 PID 2796 set thread context of 2844 2796 wnpdx2.exe 74 PID 2476 set thread context of 1764 2476 wnpdx2.exe 76 PID 2472 set thread context of 2872 2472 wnpdx2.exe 78 PID 1996 set thread context of 2920 1996 wnpdx2.exe 80 PID 316 set thread context of 1720 316 wnpdx2.exe 82 PID 2268 set thread context of 1928 2268 wnpdx2.exe 84 PID 1320 set thread context of 1652 1320 wnpdx2.exe 86 PID 2332 set thread context of 3024 2332 wnpdx2.exe 88 PID 2972 set thread context of 2660 2972 wnpdx2.exe 90 PID 792 set thread context of 2980 792 wnpdx2.exe 92 PID 2868 set thread context of 2776 2868 wnpdx2.exe 94 PID 2820 set thread context of 1752 2820 wnpdx2.exe 96 PID 664 set thread context of 2020 664 wnpdx2.exe 98 PID 2680 set thread context of 684 2680 wnpdx2.exe 100 PID 1760 set thread context of 408 1760 wnpdx2.exe 102 PID 1744 set thread context of 1368 1744 wnpdx2.exe 104 PID 3032 set thread context of 892 3032 wnpdx2.exe 106 PID 2112 set thread context of 2892 2112 wnpdx2.exe 108 PID 1012 set thread context of 2696 1012 wnpdx2.exe 110 PID 2572 set thread context of 792 2572 wnpdx2.exe 112 PID 2804 set thread context of 2812 2804 wnpdx2.exe 114 PID 1712 set thread context of 1672 1712 wnpdx2.exe 116 PID 1508 set thread context of 2968 1508 wnpdx2.exe 118 PID 2912 set thread context of 2944 2912 wnpdx2.exe 120 PID 600 set thread context of 2356 600 wnpdx2.exe 122 PID 1564 set thread context of 1296 1564 wnpdx2.exe 124 PID 2716 set thread context of 2520 2716 wnpdx2.exe 128 PID 2548 set thread context of 1500 2548 wnpdx2.exe 130 -
resource yara_rule behavioral1/memory/1072-2-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1072-3-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1072-4-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1072-6-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1072-8-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1072-7-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1072-9-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1072-22-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2848-32-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2848-33-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2848-34-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2848-40-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/320-56-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/552-72-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1812-88-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2008-104-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/3036-114-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/3036-121-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1300-131-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1300-138-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2180-148-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2180-155-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2392-164-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2392-172-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2664-188-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/332-205-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2560-215-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2560-222-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2460-236-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1972-248-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1244-257-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1244-261-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2124-273-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2092-285-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1784-293-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1784-298-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2656-310-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2144-322-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2784-330-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2784-335-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2844-347-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1764-355-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1764-360-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2872-369-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2872-373-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2920-382-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2920-386-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1720-398-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1928-410-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1652-422-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/3024-431-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/3024-435-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2660-443-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2660-448-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2980-460-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2776-472-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1752-484-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2020-493-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2020-497-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/684-505-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/684-510-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/408-522-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1368-530-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1368-535-0x0000000000400000-0x0000000000468000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe -
Suspicious behavior: EnumeratesProcesses 51 IoCs
pid Process 1072 a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe 2848 wnpdx2.exe 320 wnpdx2.exe 552 wnpdx2.exe 1812 wnpdx2.exe 2008 wnpdx2.exe 3036 wnpdx2.exe 1300 wnpdx2.exe 2180 wnpdx2.exe 2392 wnpdx2.exe 2664 wnpdx2.exe 332 wnpdx2.exe 2560 wnpdx2.exe 2460 wnpdx2.exe 1972 wnpdx2.exe 1244 wnpdx2.exe 2124 wnpdx2.exe 2092 wnpdx2.exe 1784 wnpdx2.exe 2656 wnpdx2.exe 2144 wnpdx2.exe 2784 wnpdx2.exe 2844 wnpdx2.exe 1764 wnpdx2.exe 2872 wnpdx2.exe 2920 wnpdx2.exe 1720 wnpdx2.exe 1928 wnpdx2.exe 1652 wnpdx2.exe 3024 wnpdx2.exe 2660 wnpdx2.exe 2980 wnpdx2.exe 2776 wnpdx2.exe 1752 wnpdx2.exe 2020 wnpdx2.exe 684 wnpdx2.exe 408 wnpdx2.exe 1368 wnpdx2.exe 892 wnpdx2.exe 2892 wnpdx2.exe 2696 wnpdx2.exe 792 wnpdx2.exe 2812 wnpdx2.exe 1672 wnpdx2.exe 2968 wnpdx2.exe 2944 wnpdx2.exe 2356 wnpdx2.exe 1296 wnpdx2.exe 996 wnpdx2.exe 2520 wnpdx2.exe 1500 wnpdx2.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1044 wrote to memory of 1072 1044 a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe 28 PID 1044 wrote to memory of 1072 1044 a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe 28 PID 1044 wrote to memory of 1072 1044 a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe 28 PID 1044 wrote to memory of 1072 1044 a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe 28 PID 1044 wrote to memory of 1072 1044 a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe 28 PID 1044 wrote to memory of 1072 1044 a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe 28 PID 1044 wrote to memory of 1072 1044 a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe 28 PID 1072 wrote to memory of 2508 1072 a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe 29 PID 1072 wrote to memory of 2508 1072 a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe 29 PID 1072 wrote to memory of 2508 1072 a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe 29 PID 1072 wrote to memory of 2508 1072 a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe 29 PID 2508 wrote to memory of 2848 2508 wnpdx2.exe 30 PID 2508 wrote to memory of 2848 2508 wnpdx2.exe 30 PID 2508 wrote to memory of 2848 2508 wnpdx2.exe 30 PID 2508 wrote to memory of 2848 2508 wnpdx2.exe 30 PID 2508 wrote to memory of 2848 2508 wnpdx2.exe 30 PID 2508 wrote to memory of 2848 2508 wnpdx2.exe 30 PID 2508 wrote to memory of 2848 2508 wnpdx2.exe 30 PID 2848 wrote to memory of 2572 2848 wnpdx2.exe 31 PID 2848 wrote to memory of 2572 2848 wnpdx2.exe 31 PID 2848 wrote to memory of 2572 2848 wnpdx2.exe 31 PID 2848 wrote to memory of 2572 2848 wnpdx2.exe 31 PID 2572 wrote to memory of 320 2572 wnpdx2.exe 32 PID 2572 wrote to memory of 320 2572 wnpdx2.exe 32 PID 2572 wrote to memory of 320 2572 wnpdx2.exe 32 PID 2572 wrote to memory of 320 2572 wnpdx2.exe 32 PID 2572 wrote to memory of 320 2572 wnpdx2.exe 32 PID 2572 wrote to memory of 320 2572 wnpdx2.exe 32 PID 2572 wrote to memory of 320 2572 wnpdx2.exe 32 PID 320 wrote to memory of 576 320 wnpdx2.exe 33 PID 320 wrote to memory of 576 320 wnpdx2.exe 33 PID 320 wrote to memory of 576 320 wnpdx2.exe 33 PID 320 wrote to memory of 576 320 wnpdx2.exe 33 PID 576 wrote to memory of 552 576 wnpdx2.exe 34 PID 576 wrote to memory of 552 576 wnpdx2.exe 34 PID 576 wrote to memory of 552 576 wnpdx2.exe 34 PID 576 wrote to memory of 552 576 wnpdx2.exe 34 PID 576 wrote to memory of 552 576 wnpdx2.exe 34 PID 576 wrote to memory of 552 576 wnpdx2.exe 34 PID 576 wrote to memory of 552 576 wnpdx2.exe 34 PID 552 wrote to memory of 2336 552 wnpdx2.exe 35 PID 552 wrote to memory of 2336 552 wnpdx2.exe 35 PID 552 wrote to memory of 2336 552 wnpdx2.exe 35 PID 552 wrote to memory of 2336 552 wnpdx2.exe 35 PID 2336 wrote to memory of 1812 2336 wnpdx2.exe 36 PID 2336 wrote to memory of 1812 2336 wnpdx2.exe 36 PID 2336 wrote to memory of 1812 2336 wnpdx2.exe 36 PID 2336 wrote to memory of 1812 2336 wnpdx2.exe 36 PID 2336 wrote to memory of 1812 2336 wnpdx2.exe 36 PID 2336 wrote to memory of 1812 2336 wnpdx2.exe 36 PID 2336 wrote to memory of 1812 2336 wnpdx2.exe 36 PID 1812 wrote to memory of 796 1812 wnpdx2.exe 37 PID 1812 wrote to memory of 796 1812 wnpdx2.exe 37 PID 1812 wrote to memory of 796 1812 wnpdx2.exe 37 PID 1812 wrote to memory of 796 1812 wnpdx2.exe 37 PID 796 wrote to memory of 2008 796 wnpdx2.exe 38 PID 796 wrote to memory of 2008 796 wnpdx2.exe 38 PID 796 wrote to memory of 2008 796 wnpdx2.exe 38 PID 796 wrote to memory of 2008 796 wnpdx2.exe 38 PID 796 wrote to memory of 2008 796 wnpdx2.exe 38 PID 796 wrote to memory of 2008 796 wnpdx2.exe 38 PID 796 wrote to memory of 2008 796 wnpdx2.exe 38 PID 2008 wrote to memory of 2540 2008 wnpdx2.exe 39 PID 2008 wrote to memory of 2540 2008 wnpdx2.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Users\Admin\AppData\Local\Temp\A82CB0~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Users\Admin\AppData\Local\Temp\A82CB0~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2540 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3036 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:676 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1300 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1164 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2180 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1844 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2392 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2704 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2664 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2496 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:332 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:572 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2560 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2860 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2460 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1076 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1972 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2992 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1244 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:600 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe34⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2124 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1564 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe36⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2092 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:888 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe38⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1784 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1512 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe40⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2656 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2660 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe42⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2144 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2980 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe44⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2784 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2796 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe46⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2844 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2476 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe48⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1764 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2472 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe50⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2872 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1996 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe52⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2920 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:316 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe54⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1720 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2268 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe56⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1928 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1320 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe58⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1652 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2332 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe60⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3024 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2972 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe62⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2660 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:792 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe64⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2980 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2868 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe66⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2776 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe67⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2820 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe68⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1752 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe69⤵
- Suspicious use of SetThreadContext
PID:664 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe70⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2020 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe71⤵
- Suspicious use of SetThreadContext
PID:2680 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe72⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:684 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe73⤵
- Suspicious use of SetThreadContext
PID:1760 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe74⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:408 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe75⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1744 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe76⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1368 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe77⤵
- Suspicious use of SetThreadContext
PID:3032 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe78⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:892 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe79⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2112 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe80⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2892 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe81⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1012 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe82⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2696 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe83⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2572 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe84⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:792 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe85⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2804 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe86⤵
- Suspicious behavior: EnumeratesProcesses
PID:2812 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe87⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1712 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe88⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1672 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe89⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1508 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe90⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2968 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe91⤵
- Suspicious use of SetThreadContext
PID:2912 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe92⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2944 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe93⤵
- Suspicious use of SetThreadContext
PID:600 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe94⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2356 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe95⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1564 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe96⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1296 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe97⤵PID:2316
-
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe98⤵
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:996 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe99⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2716 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe100⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2520 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe101⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2548 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe102⤵
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:1500
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164KB
MD5a82cb0780c7a48983dc4e061361da2b9
SHA108d5188f52214220ccf5ad66b8c4c53403b48092
SHA256d8c50fb040912e02a8f4c9a34329f0f26244a55ed0494daa5a14e526e59210d6
SHA5124b64375d5fdf7adf2dc254026404c363dc9c35420a3249455bab1c9085a7e7e3dc2578fba36d184d67ecd83c9aa6864046db871c4dc71aba5c4d2e7e3ed07e06