Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 14:00
Static task
static1
Behavioral task
behavioral1
Sample
a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe
-
Size
164KB
-
MD5
a82cb0780c7a48983dc4e061361da2b9
-
SHA1
08d5188f52214220ccf5ad66b8c4c53403b48092
-
SHA256
d8c50fb040912e02a8f4c9a34329f0f26244a55ed0494daa5a14e526e59210d6
-
SHA512
4b64375d5fdf7adf2dc254026404c363dc9c35420a3249455bab1c9085a7e7e3dc2578fba36d184d67ecd83c9aa6864046db871c4dc71aba5c4d2e7e3ed07e06
-
SSDEEP
3072:m4OwiHtBl7NRDaG9vb/eNtHv6F4Qsq4OFXUTIxPPnbkDw1NXEGUU4v97j:cxXDF9zeNtPc4wFXUTWPPbkkXOl7j
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 42 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wnpdx2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wnpdx2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wnpdx2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wnpdx2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wnpdx2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wnpdx2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wnpdx2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wnpdx2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wnpdx2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wnpdx2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wnpdx2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wnpdx2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wnpdx2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wnpdx2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wnpdx2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wnpdx2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wnpdx2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wnpdx2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wnpdx2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wnpdx2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wnpdx2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wnpdx2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wnpdx2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wnpdx2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wnpdx2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wnpdx2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wnpdx2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wnpdx2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wnpdx2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wnpdx2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wnpdx2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wnpdx2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wnpdx2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wnpdx2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wnpdx2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wnpdx2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wnpdx2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wnpdx2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wnpdx2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wnpdx2.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wnpdx2.exe -
Deletes itself 1 IoCs
pid Process 4784 wnpdx2.exe -
Executes dropped EXE 64 IoCs
pid Process 4064 wnpdx2.exe 4784 wnpdx2.exe 2700 wnpdx2.exe 3580 wnpdx2.exe 728 wnpdx2.exe 3864 wnpdx2.exe 4212 wnpdx2.exe 4512 wnpdx2.exe 2964 wnpdx2.exe 2728 wnpdx2.exe 3704 wnpdx2.exe 3324 wnpdx2.exe 3740 wnpdx2.exe 384 wnpdx2.exe 4328 wnpdx2.exe 1836 wnpdx2.exe 3476 wnpdx2.exe 1472 wnpdx2.exe 1660 wnpdx2.exe 4816 wnpdx2.exe 4916 wnpdx2.exe 728 wnpdx2.exe 928 wnpdx2.exe 1036 wnpdx2.exe 1664 wnpdx2.exe 2408 wnpdx2.exe 2964 wnpdx2.exe 3452 wnpdx2.exe 4072 wnpdx2.exe 3324 wnpdx2.exe 3116 wnpdx2.exe 3772 wnpdx2.exe 2716 wnpdx2.exe 540 wnpdx2.exe 228 wnpdx2.exe 616 wnpdx2.exe 4828 wnpdx2.exe 3956 wnpdx2.exe 2744 wnpdx2.exe 2824 wnpdx2.exe 3848 wnpdx2.exe 4668 wnpdx2.exe 3760 wnpdx2.exe 2132 wnpdx2.exe 3520 wnpdx2.exe 2212 wnpdx2.exe 4152 wnpdx2.exe 3524 wnpdx2.exe 3684 wnpdx2.exe 1980 wnpdx2.exe 3832 wnpdx2.exe 3496 wnpdx2.exe 1472 wnpdx2.exe 4056 wnpdx2.exe 1912 wnpdx2.exe 4932 wnpdx2.exe 832 wnpdx2.exe 2744 wnpdx2.exe 1276 wnpdx2.exe 3024 wnpdx2.exe 1204 wnpdx2.exe 2620 wnpdx2.exe 3760 wnpdx2.exe 2356 wnpdx2.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdx2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wnpdx2.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File created C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe File opened for modification C:\Windows\SysWOW64\wnpdx2.exe wnpdx2.exe -
Suspicious use of SetThreadContext 43 IoCs
description pid Process procid_target PID 4980 set thread context of 4456 4980 a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe 83 PID 4064 set thread context of 4784 4064 wnpdx2.exe 85 PID 2700 set thread context of 3580 2700 wnpdx2.exe 94 PID 728 set thread context of 3864 728 wnpdx2.exe 98 PID 4212 set thread context of 4512 4212 wnpdx2.exe 103 PID 2964 set thread context of 2728 2964 wnpdx2.exe 105 PID 3704 set thread context of 3324 3704 wnpdx2.exe 107 PID 3740 set thread context of 384 3740 wnpdx2.exe 109 PID 4328 set thread context of 1836 4328 wnpdx2.exe 111 PID 3476 set thread context of 1472 3476 wnpdx2.exe 115 PID 1660 set thread context of 4816 1660 wnpdx2.exe 117 PID 4916 set thread context of 728 4916 wnpdx2.exe 119 PID 928 set thread context of 1036 928 wnpdx2.exe 121 PID 1664 set thread context of 2408 1664 wnpdx2.exe 123 PID 2964 set thread context of 3452 2964 wnpdx2.exe 125 PID 4072 set thread context of 3324 4072 wnpdx2.exe 127 PID 3116 set thread context of 3772 3116 wnpdx2.exe 129 PID 2716 set thread context of 540 2716 wnpdx2.exe 132 PID 228 set thread context of 616 228 wnpdx2.exe 134 PID 4828 set thread context of 3956 4828 wnpdx2.exe 136 PID 2744 set thread context of 2824 2744 wnpdx2.exe 138 PID 3848 set thread context of 4668 3848 wnpdx2.exe 140 PID 3760 set thread context of 2132 3760 wnpdx2.exe 142 PID 3520 set thread context of 2212 3520 wnpdx2.exe 144 PID 4152 set thread context of 3524 4152 wnpdx2.exe 146 PID 3684 set thread context of 1980 3684 wnpdx2.exe 148 PID 3832 set thread context of 3496 3832 wnpdx2.exe 150 PID 1472 set thread context of 4056 1472 wnpdx2.exe 152 PID 1912 set thread context of 4932 1912 wnpdx2.exe 154 PID 832 set thread context of 2744 832 wnpdx2.exe 156 PID 1276 set thread context of 3024 1276 wnpdx2.exe 158 PID 1204 set thread context of 2620 1204 wnpdx2.exe 160 PID 3760 set thread context of 2356 3760 wnpdx2.exe 162 PID 2684 set thread context of 3520 2684 wnpdx2.exe 164 PID 1504 set thread context of 5044 1504 wnpdx2.exe 166 PID 4412 set thread context of 2064 4412 wnpdx2.exe 168 PID 3212 set thread context of 1660 3212 wnpdx2.exe 170 PID 3256 set thread context of 5056 3256 wnpdx2.exe 172 PID 1012 set thread context of 3460 1012 wnpdx2.exe 174 PID 4788 set thread context of 1752 4788 wnpdx2.exe 176 PID 2828 set thread context of 1292 2828 wnpdx2.exe 178 PID 3280 set thread context of 4248 3280 wnpdx2.exe 180 PID 4872 set thread context of 1896 4872 wnpdx2.exe 182 -
resource yara_rule behavioral2/memory/4456-0-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/4456-4-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/4456-5-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/4456-3-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/4456-39-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/4784-46-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/4784-45-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/4784-44-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/4784-48-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/3580-54-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/3580-53-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/3580-52-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/3580-56-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/3864-62-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/3864-65-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/4512-70-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/4512-69-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/4512-71-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/4512-72-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/2728-79-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/2728-81-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/3324-85-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/3324-87-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/384-93-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/384-96-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/1836-102-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/1836-104-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/1472-110-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/1472-112-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/4816-118-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/4816-119-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/728-126-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/728-128-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/1036-134-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/1036-137-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/2408-143-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/2408-147-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/3452-152-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/3452-156-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/3324-162-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/3772-170-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/540-175-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/540-179-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/616-187-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/3956-192-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/3956-196-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/2824-201-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/2824-206-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/4668-211-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/4668-215-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/2132-220-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/2132-224-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/2212-229-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/2212-234-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/3524-237-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/3524-241-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/1980-247-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/3496-253-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/4056-257-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/4056-260-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/4932-266-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/2744-270-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/2744-273-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/3024-279-0x0000000000400000-0x0000000000468000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx2.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings wnpdx2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdx2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdx2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdx2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdx2.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings wnpdx2.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings wnpdx2.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings wnpdx2.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings wnpdx2.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings wnpdx2.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings wnpdx2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdx2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdx2.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings wnpdx2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdx2.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings wnpdx2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdx2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdx2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdx2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdx2.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings wnpdx2.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings wnpdx2.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings wnpdx2.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings wnpdx2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdx2.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings wnpdx2.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings wnpdx2.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings wnpdx2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdx2.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings wnpdx2.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings wnpdx2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdx2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdx2.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings wnpdx2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdx2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdx2.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings wnpdx2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdx2.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings wnpdx2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdx2.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings wnpdx2.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings wnpdx2.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings wnpdx2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdx2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdx2.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings wnpdx2.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings wnpdx2.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings wnpdx2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdx2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdx2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdx2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdx2.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings wnpdx2.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings wnpdx2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdx2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdx2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdx2.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings wnpdx2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdx2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wnpdx2.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings wnpdx2.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings wnpdx2.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings wnpdx2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4456 a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe 4456 a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe 4784 wnpdx2.exe 4784 wnpdx2.exe 3580 wnpdx2.exe 3580 wnpdx2.exe 3864 wnpdx2.exe 3864 wnpdx2.exe 4512 wnpdx2.exe 4512 wnpdx2.exe 2728 wnpdx2.exe 2728 wnpdx2.exe 384 wnpdx2.exe 384 wnpdx2.exe 1836 wnpdx2.exe 1836 wnpdx2.exe 1472 wnpdx2.exe 1472 wnpdx2.exe 4816 wnpdx2.exe 4816 wnpdx2.exe 728 wnpdx2.exe 728 wnpdx2.exe 1036 wnpdx2.exe 1036 wnpdx2.exe 2408 wnpdx2.exe 2408 wnpdx2.exe 3452 wnpdx2.exe 3452 wnpdx2.exe 3772 wnpdx2.exe 3772 wnpdx2.exe 540 wnpdx2.exe 540 wnpdx2.exe 616 wnpdx2.exe 616 wnpdx2.exe 3956 wnpdx2.exe 3956 wnpdx2.exe 2824 wnpdx2.exe 2824 wnpdx2.exe 4668 wnpdx2.exe 4668 wnpdx2.exe 2132 wnpdx2.exe 2132 wnpdx2.exe 2212 wnpdx2.exe 2212 wnpdx2.exe 3524 wnpdx2.exe 3524 wnpdx2.exe 1980 wnpdx2.exe 1980 wnpdx2.exe 3496 wnpdx2.exe 3496 wnpdx2.exe 4056 wnpdx2.exe 4056 wnpdx2.exe 4932 wnpdx2.exe 4932 wnpdx2.exe 2744 wnpdx2.exe 2744 wnpdx2.exe 3024 wnpdx2.exe 3024 wnpdx2.exe 2620 wnpdx2.exe 2620 wnpdx2.exe 2356 wnpdx2.exe 2356 wnpdx2.exe 3520 wnpdx2.exe 3520 wnpdx2.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4980 wrote to memory of 4456 4980 a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe 83 PID 4980 wrote to memory of 4456 4980 a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe 83 PID 4980 wrote to memory of 4456 4980 a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe 83 PID 4980 wrote to memory of 4456 4980 a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe 83 PID 4980 wrote to memory of 4456 4980 a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe 83 PID 4980 wrote to memory of 4456 4980 a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe 83 PID 4980 wrote to memory of 4456 4980 a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe 83 PID 4456 wrote to memory of 4064 4456 a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe 84 PID 4456 wrote to memory of 4064 4456 a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe 84 PID 4456 wrote to memory of 4064 4456 a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe 84 PID 4064 wrote to memory of 4784 4064 wnpdx2.exe 85 PID 4064 wrote to memory of 4784 4064 wnpdx2.exe 85 PID 4064 wrote to memory of 4784 4064 wnpdx2.exe 85 PID 4064 wrote to memory of 4784 4064 wnpdx2.exe 85 PID 4064 wrote to memory of 4784 4064 wnpdx2.exe 85 PID 4064 wrote to memory of 4784 4064 wnpdx2.exe 85 PID 4064 wrote to memory of 4784 4064 wnpdx2.exe 85 PID 4784 wrote to memory of 2700 4784 wnpdx2.exe 93 PID 4784 wrote to memory of 2700 4784 wnpdx2.exe 93 PID 4784 wrote to memory of 2700 4784 wnpdx2.exe 93 PID 2700 wrote to memory of 3580 2700 wnpdx2.exe 94 PID 2700 wrote to memory of 3580 2700 wnpdx2.exe 94 PID 2700 wrote to memory of 3580 2700 wnpdx2.exe 94 PID 2700 wrote to memory of 3580 2700 wnpdx2.exe 94 PID 2700 wrote to memory of 3580 2700 wnpdx2.exe 94 PID 2700 wrote to memory of 3580 2700 wnpdx2.exe 94 PID 2700 wrote to memory of 3580 2700 wnpdx2.exe 94 PID 3580 wrote to memory of 728 3580 wnpdx2.exe 97 PID 3580 wrote to memory of 728 3580 wnpdx2.exe 97 PID 3580 wrote to memory of 728 3580 wnpdx2.exe 97 PID 728 wrote to memory of 3864 728 wnpdx2.exe 98 PID 728 wrote to memory of 3864 728 wnpdx2.exe 98 PID 728 wrote to memory of 3864 728 wnpdx2.exe 98 PID 728 wrote to memory of 3864 728 wnpdx2.exe 98 PID 728 wrote to memory of 3864 728 wnpdx2.exe 98 PID 728 wrote to memory of 3864 728 wnpdx2.exe 98 PID 728 wrote to memory of 3864 728 wnpdx2.exe 98 PID 3864 wrote to memory of 4212 3864 wnpdx2.exe 102 PID 3864 wrote to memory of 4212 3864 wnpdx2.exe 102 PID 3864 wrote to memory of 4212 3864 wnpdx2.exe 102 PID 4212 wrote to memory of 4512 4212 wnpdx2.exe 103 PID 4212 wrote to memory of 4512 4212 wnpdx2.exe 103 PID 4212 wrote to memory of 4512 4212 wnpdx2.exe 103 PID 4212 wrote to memory of 4512 4212 wnpdx2.exe 103 PID 4212 wrote to memory of 4512 4212 wnpdx2.exe 103 PID 4212 wrote to memory of 4512 4212 wnpdx2.exe 103 PID 4212 wrote to memory of 4512 4212 wnpdx2.exe 103 PID 4512 wrote to memory of 2964 4512 wnpdx2.exe 104 PID 4512 wrote to memory of 2964 4512 wnpdx2.exe 104 PID 4512 wrote to memory of 2964 4512 wnpdx2.exe 104 PID 2964 wrote to memory of 2728 2964 wnpdx2.exe 105 PID 2964 wrote to memory of 2728 2964 wnpdx2.exe 105 PID 2964 wrote to memory of 2728 2964 wnpdx2.exe 105 PID 2964 wrote to memory of 2728 2964 wnpdx2.exe 105 PID 2964 wrote to memory of 2728 2964 wnpdx2.exe 105 PID 2964 wrote to memory of 2728 2964 wnpdx2.exe 105 PID 2964 wrote to memory of 2728 2964 wnpdx2.exe 105 PID 2728 wrote to memory of 3704 2728 wnpdx2.exe 106 PID 2728 wrote to memory of 3704 2728 wnpdx2.exe 106 PID 2728 wrote to memory of 3704 2728 wnpdx2.exe 106 PID 3704 wrote to memory of 3324 3704 wnpdx2.exe 107 PID 3704 wrote to memory of 3324 3704 wnpdx2.exe 107 PID 3704 wrote to memory of 3324 3704 wnpdx2.exe 107 PID 3704 wrote to memory of 3324 3704 wnpdx2.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a82cb0780c7a48983dc4e061361da2b9_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Users\Admin\AppData\Local\Temp\A82CB0~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Users\Admin\AppData\Local\Temp\A82CB0~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Modifies registry class
PID:3324 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3740 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:384 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4328 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1836 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3476 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1472 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1660 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4816 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4916 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:728 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:928 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1036 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1664 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2408 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2964 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3452 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4072 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe32⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
PID:3324 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3116 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe34⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3772 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2716 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe36⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:540 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:228 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe38⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:616 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4828 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe40⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3956 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2744 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe42⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2824 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3848 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe44⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4668 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3760 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe46⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2132 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
PID:3520 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe48⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2212 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4152 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe50⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3524 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3684 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe52⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1980 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3832 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe54⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3496 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1472 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe56⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4056 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1912 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe58⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4932 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
PID:832 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe60⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2744 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1276 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe62⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3024 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1204 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe64⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2620 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3760 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe66⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2356 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe67⤵
- Suspicious use of SetThreadContext
- Modifies registry class
PID:2684 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe68⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3520 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe69⤵
- Suspicious use of SetThreadContext
- Modifies registry class
PID:1504 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe70⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:5044 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe71⤵
- Suspicious use of SetThreadContext
- Modifies registry class
PID:4412 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe72⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2064 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe73⤵
- Suspicious use of SetThreadContext
- Modifies registry class
PID:3212 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe74⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1660 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe75⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3256 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe76⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5056 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe77⤵
- Suspicious use of SetThreadContext
- Modifies registry class
PID:1012 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe78⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:3460 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe79⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4788 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe80⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1752 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe81⤵
- Suspicious use of SetThreadContext
PID:2828 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe82⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:1292 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe83⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3280 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe84⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4248 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe85⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4872 -
C:\Windows\SysWOW64\wnpdx2.exe"C:\Windows\system32\wnpdx2.exe" C:\Windows\SysWOW64\wnpdx2.exe86⤵
- Maps connected drives based on registry
PID:1896
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164KB
MD5a82cb0780c7a48983dc4e061361da2b9
SHA108d5188f52214220ccf5ad66b8c4c53403b48092
SHA256d8c50fb040912e02a8f4c9a34329f0f26244a55ed0494daa5a14e526e59210d6
SHA5124b64375d5fdf7adf2dc254026404c363dc9c35420a3249455bab1c9085a7e7e3dc2578fba36d184d67ecd83c9aa6864046db871c4dc71aba5c4d2e7e3ed07e06