Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 18:28
Static task
static1
Behavioral task
behavioral1
Sample
b311a3067e3ed8c492a89a739107968a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b311a3067e3ed8c492a89a739107968a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
b311a3067e3ed8c492a89a739107968a_JaffaCakes118.exe
-
Size
152KB
-
MD5
b311a3067e3ed8c492a89a739107968a
-
SHA1
90c6250c33b8de8a7fef82e6b81ce60c9aede222
-
SHA256
dab4a725cf58297af585cbeb681118047568407ff5f0df653ea14e73656e91fd
-
SHA512
7f216583c7a6d5ffdab5edd5451334941ea948ce87deda077f631314928a7390cc20357b80a774c7cbfecab552b0e3a3bf523f1573ac45470d9a018a954fdf72
-
SSDEEP
3072:I4DtuD+6GXAPAwcLw8WSqgy3GMhU2R8p3TYntVyfwcYX:YD+m4wcLSSMGMhvRkTYHyITX
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2760 wnptvx.exe -
Executes dropped EXE 50 IoCs
pid Process 2152 wnptvx.exe 2760 wnptvx.exe 2628 wnptvx.exe 2020 wnptvx.exe 2836 wnptvx.exe 2432 wnptvx.exe 1272 wnptvx.exe 1620 wnptvx.exe 2188 wnptvx.exe 444 wnptvx.exe 1952 wnptvx.exe 912 wnptvx.exe 544 wnptvx.exe 1652 wnptvx.exe 2052 wnptvx.exe 2080 wnptvx.exe 2396 wnptvx.exe 2152 wnptvx.exe 2644 wnptvx.exe 2628 wnptvx.exe 1656 wnptvx.exe 1208 wnptvx.exe 1276 wnptvx.exe 2952 wnptvx.exe 2716 wnptvx.exe 1516 wnptvx.exe 760 wnptvx.exe 1040 wnptvx.exe 1756 wnptvx.exe 1852 wnptvx.exe 1940 wnptvx.exe 2304 wnptvx.exe 2928 wnptvx.exe 2464 wnptvx.exe 1744 wnptvx.exe 3012 wnptvx.exe 320 wnptvx.exe 1400 wnptvx.exe 1764 wnptvx.exe 2012 wnptvx.exe 2812 wnptvx.exe 2772 wnptvx.exe 2716 wnptvx.exe 2044 wnptvx.exe 2108 wnptvx.exe 1780 wnptvx.exe 2400 wnptvx.exe 3040 wnptvx.exe 1628 wnptvx.exe 2488 wnptvx.exe -
Loads dropped DLL 51 IoCs
pid Process 2552 b311a3067e3ed8c492a89a739107968a_JaffaCakes118.exe 2552 b311a3067e3ed8c492a89a739107968a_JaffaCakes118.exe 2152 wnptvx.exe 2760 wnptvx.exe 2760 wnptvx.exe 2020 wnptvx.exe 2020 wnptvx.exe 2432 wnptvx.exe 2432 wnptvx.exe 1620 wnptvx.exe 1620 wnptvx.exe 444 wnptvx.exe 444 wnptvx.exe 912 wnptvx.exe 912 wnptvx.exe 1652 wnptvx.exe 1652 wnptvx.exe 2080 wnptvx.exe 2080 wnptvx.exe 2152 wnptvx.exe 2152 wnptvx.exe 2628 wnptvx.exe 2628 wnptvx.exe 1208 wnptvx.exe 1208 wnptvx.exe 2952 wnptvx.exe 2952 wnptvx.exe 1516 wnptvx.exe 1516 wnptvx.exe 1040 wnptvx.exe 1040 wnptvx.exe 1852 wnptvx.exe 1852 wnptvx.exe 2304 wnptvx.exe 2304 wnptvx.exe 2464 wnptvx.exe 2464 wnptvx.exe 3012 wnptvx.exe 3012 wnptvx.exe 1400 wnptvx.exe 1400 wnptvx.exe 2012 wnptvx.exe 2012 wnptvx.exe 2772 wnptvx.exe 2772 wnptvx.exe 2044 wnptvx.exe 2044 wnptvx.exe 1780 wnptvx.exe 1780 wnptvx.exe 3040 wnptvx.exe 3040 wnptvx.exe -
Maps connected drives based on registry 3 TTPs 50 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnptvx.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnptvx.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnptvx.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnptvx.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnptvx.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnptvx.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnptvx.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum b311a3067e3ed8c492a89a739107968a_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnptvx.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnptvx.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnptvx.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnptvx.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnptvx.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnptvx.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnptvx.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnptvx.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnptvx.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 b311a3067e3ed8c492a89a739107968a_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnptvx.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnptvx.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnptvx.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnptvx.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnptvx.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnptvx.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnptvx.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnptvx.exe -
Drops file in System32 directory 50 IoCs
description ioc Process File created C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File opened for modification C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File created C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File opened for modification C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File opened for modification C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File opened for modification C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File created C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File opened for modification C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File created C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File opened for modification C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File opened for modification C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File created C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File created C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File opened for modification C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File opened for modification C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File opened for modification C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File created C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File opened for modification C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File opened for modification C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File opened for modification C:\Windows\SysWOW64\wnptvx.exe b311a3067e3ed8c492a89a739107968a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File created C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File opened for modification C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File created C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File opened for modification C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File opened for modification C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File created C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File created C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File created C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File created C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File opened for modification C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File created C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File created C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File created C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File created C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File created C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File created C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File opened for modification C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File created C:\Windows\SysWOW64\wnptvx.exe b311a3067e3ed8c492a89a739107968a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File created C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File opened for modification C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File opened for modification C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File created C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File opened for modification C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File opened for modification C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File created C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File opened for modification C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File created C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe File created C:\Windows\SysWOW64\wnptvx.exe wnptvx.exe -
Suspicious use of SetThreadContext 26 IoCs
description pid Process procid_target PID 2080 set thread context of 2552 2080 b311a3067e3ed8c492a89a739107968a_JaffaCakes118.exe 31 PID 2152 set thread context of 2760 2152 wnptvx.exe 33 PID 2628 set thread context of 2020 2628 wnptvx.exe 36 PID 2836 set thread context of 2432 2836 wnptvx.exe 38 PID 1272 set thread context of 1620 1272 wnptvx.exe 41 PID 2188 set thread context of 444 2188 wnptvx.exe 43 PID 1952 set thread context of 912 1952 wnptvx.exe 46 PID 544 set thread context of 1652 544 wnptvx.exe 49 PID 2052 set thread context of 2080 2052 wnptvx.exe 51 PID 2396 set thread context of 2152 2396 wnptvx.exe 54 PID 2644 set thread context of 2628 2644 wnptvx.exe 56 PID 1656 set thread context of 1208 1656 wnptvx.exe 59 PID 1276 set thread context of 2952 1276 wnptvx.exe 61 PID 2716 set thread context of 1516 2716 wnptvx.exe 63 PID 760 set thread context of 1040 760 wnptvx.exe 67 PID 1756 set thread context of 1852 1756 wnptvx.exe 70 PID 1940 set thread context of 2304 1940 wnptvx.exe 72 PID 2928 set thread context of 2464 2928 wnptvx.exe 75 PID 1744 set thread context of 3012 1744 wnptvx.exe 78 PID 320 set thread context of 1400 320 wnptvx.exe 81 PID 1764 set thread context of 2012 1764 wnptvx.exe 83 PID 2812 set thread context of 2772 2812 wnptvx.exe 85 PID 2716 set thread context of 2044 2716 wnptvx.exe 88 PID 2108 set thread context of 1780 2108 wnptvx.exe 91 PID 2400 set thread context of 3040 2400 wnptvx.exe 93 PID 1628 set thread context of 2488 1628 wnptvx.exe 96 -
resource yara_rule behavioral1/memory/2552-3-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2552-6-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2552-8-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2552-7-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2552-4-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2552-2-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2552-9-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2552-22-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2760-34-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2760-33-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2760-35-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2760-40-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2020-50-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2020-59-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2432-70-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2432-74-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1620-85-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1620-84-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1620-86-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1620-91-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/444-102-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/444-109-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/912-125-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1652-135-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1652-142-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2080-158-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2152-170-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2152-176-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2628-187-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2628-194-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1208-204-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1208-212-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2952-228-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1516-238-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1516-245-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1040-254-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1040-258-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1852-267-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1852-271-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2304-281-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2304-284-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2464-293-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2464-297-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/3012-305-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/3012-310-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1400-319-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1400-323-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2012-332-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2012-336-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2772-348-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2044-358-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2044-361-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1780-370-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1780-374-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/3040-383-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/3040-387-0x0000000000400000-0x0000000000457000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 51 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b311a3067e3ed8c492a89a739107968a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b311a3067e3ed8c492a89a739107968a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnptvx.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2552 b311a3067e3ed8c492a89a739107968a_JaffaCakes118.exe 2760 wnptvx.exe 2020 wnptvx.exe 2432 wnptvx.exe 1620 wnptvx.exe 444 wnptvx.exe 912 wnptvx.exe 1652 wnptvx.exe 2080 wnptvx.exe 2152 wnptvx.exe 2628 wnptvx.exe 1208 wnptvx.exe 2952 wnptvx.exe 1516 wnptvx.exe 1040 wnptvx.exe 1852 wnptvx.exe 2304 wnptvx.exe 2464 wnptvx.exe 3012 wnptvx.exe 1400 wnptvx.exe 2012 wnptvx.exe 2772 wnptvx.exe 2044 wnptvx.exe 1780 wnptvx.exe 3040 wnptvx.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2552 2080 b311a3067e3ed8c492a89a739107968a_JaffaCakes118.exe 31 PID 2080 wrote to memory of 2552 2080 b311a3067e3ed8c492a89a739107968a_JaffaCakes118.exe 31 PID 2080 wrote to memory of 2552 2080 b311a3067e3ed8c492a89a739107968a_JaffaCakes118.exe 31 PID 2080 wrote to memory of 2552 2080 b311a3067e3ed8c492a89a739107968a_JaffaCakes118.exe 31 PID 2080 wrote to memory of 2552 2080 b311a3067e3ed8c492a89a739107968a_JaffaCakes118.exe 31 PID 2080 wrote to memory of 2552 2080 b311a3067e3ed8c492a89a739107968a_JaffaCakes118.exe 31 PID 2080 wrote to memory of 2552 2080 b311a3067e3ed8c492a89a739107968a_JaffaCakes118.exe 31 PID 2552 wrote to memory of 2152 2552 b311a3067e3ed8c492a89a739107968a_JaffaCakes118.exe 32 PID 2552 wrote to memory of 2152 2552 b311a3067e3ed8c492a89a739107968a_JaffaCakes118.exe 32 PID 2552 wrote to memory of 2152 2552 b311a3067e3ed8c492a89a739107968a_JaffaCakes118.exe 32 PID 2552 wrote to memory of 2152 2552 b311a3067e3ed8c492a89a739107968a_JaffaCakes118.exe 32 PID 2152 wrote to memory of 2760 2152 wnptvx.exe 33 PID 2152 wrote to memory of 2760 2152 wnptvx.exe 33 PID 2152 wrote to memory of 2760 2152 wnptvx.exe 33 PID 2152 wrote to memory of 2760 2152 wnptvx.exe 33 PID 2152 wrote to memory of 2760 2152 wnptvx.exe 33 PID 2152 wrote to memory of 2760 2152 wnptvx.exe 33 PID 2152 wrote to memory of 2760 2152 wnptvx.exe 33 PID 2760 wrote to memory of 2628 2760 wnptvx.exe 35 PID 2760 wrote to memory of 2628 2760 wnptvx.exe 35 PID 2760 wrote to memory of 2628 2760 wnptvx.exe 35 PID 2760 wrote to memory of 2628 2760 wnptvx.exe 35 PID 2628 wrote to memory of 2020 2628 wnptvx.exe 36 PID 2628 wrote to memory of 2020 2628 wnptvx.exe 36 PID 2628 wrote to memory of 2020 2628 wnptvx.exe 36 PID 2628 wrote to memory of 2020 2628 wnptvx.exe 36 PID 2628 wrote to memory of 2020 2628 wnptvx.exe 36 PID 2628 wrote to memory of 2020 2628 wnptvx.exe 36 PID 2628 wrote to memory of 2020 2628 wnptvx.exe 36 PID 2020 wrote to memory of 2836 2020 wnptvx.exe 37 PID 2020 wrote to memory of 2836 2020 wnptvx.exe 37 PID 2020 wrote to memory of 2836 2020 wnptvx.exe 37 PID 2020 wrote to memory of 2836 2020 wnptvx.exe 37 PID 2836 wrote to memory of 2432 2836 wnptvx.exe 38 PID 2836 wrote to memory of 2432 2836 wnptvx.exe 38 PID 2836 wrote to memory of 2432 2836 wnptvx.exe 38 PID 2836 wrote to memory of 2432 2836 wnptvx.exe 38 PID 2836 wrote to memory of 2432 2836 wnptvx.exe 38 PID 2836 wrote to memory of 2432 2836 wnptvx.exe 38 PID 2836 wrote to memory of 2432 2836 wnptvx.exe 38 PID 2432 wrote to memory of 1272 2432 wnptvx.exe 40 PID 2432 wrote to memory of 1272 2432 wnptvx.exe 40 PID 2432 wrote to memory of 1272 2432 wnptvx.exe 40 PID 2432 wrote to memory of 1272 2432 wnptvx.exe 40 PID 1272 wrote to memory of 1620 1272 wnptvx.exe 41 PID 1272 wrote to memory of 1620 1272 wnptvx.exe 41 PID 1272 wrote to memory of 1620 1272 wnptvx.exe 41 PID 1272 wrote to memory of 1620 1272 wnptvx.exe 41 PID 1272 wrote to memory of 1620 1272 wnptvx.exe 41 PID 1272 wrote to memory of 1620 1272 wnptvx.exe 41 PID 1272 wrote to memory of 1620 1272 wnptvx.exe 41 PID 1620 wrote to memory of 2188 1620 wnptvx.exe 42 PID 1620 wrote to memory of 2188 1620 wnptvx.exe 42 PID 1620 wrote to memory of 2188 1620 wnptvx.exe 42 PID 1620 wrote to memory of 2188 1620 wnptvx.exe 42 PID 2188 wrote to memory of 444 2188 wnptvx.exe 43 PID 2188 wrote to memory of 444 2188 wnptvx.exe 43 PID 2188 wrote to memory of 444 2188 wnptvx.exe 43 PID 2188 wrote to memory of 444 2188 wnptvx.exe 43 PID 2188 wrote to memory of 444 2188 wnptvx.exe 43 PID 2188 wrote to memory of 444 2188 wnptvx.exe 43 PID 2188 wrote to memory of 444 2188 wnptvx.exe 43 PID 444 wrote to memory of 1952 444 wnptvx.exe 45 PID 444 wrote to memory of 1952 444 wnptvx.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\b311a3067e3ed8c492a89a739107968a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b311a3067e3ed8c492a89a739107968a_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\b311a3067e3ed8c492a89a739107968a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b311a3067e3ed8c492a89a739107968a_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Users\Admin\AppData\Local\Temp\B311A3~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Users\Admin\AppData\Local\Temp\B311A3~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1952 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:912 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:544 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1652 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2052 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2080 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2396 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2152 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2644 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2628 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1656 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1208 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1276 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2952 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2716 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1516 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:760 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1040 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1756 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1852 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1940 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe34⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2304 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2928 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe36⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2464 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1744 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe38⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3012 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:320 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe40⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1400 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1764 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe42⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2012 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2812 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe44⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2772 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2716 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe46⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2044 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2108 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe48⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1780 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2400 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe50⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3040 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1628 -
C:\Windows\SysWOW64\wnptvx.exe"C:\Windows\system32\wnptvx.exe" C:\Windows\SysWOW64\wnptvx.exe52⤵
- Executes dropped EXE
PID:2488
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152KB
MD5b311a3067e3ed8c492a89a739107968a
SHA190c6250c33b8de8a7fef82e6b81ce60c9aede222
SHA256dab4a725cf58297af585cbeb681118047568407ff5f0df653ea14e73656e91fd
SHA5127f216583c7a6d5ffdab5edd5451334941ea948ce87deda077f631314928a7390cc20357b80a774c7cbfecab552b0e3a3bf523f1573ac45470d9a018a954fdf72