Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 11:48
Static task
static1
Behavioral task
behavioral1
Sample
0edcbeec2a709b41ad03902cb61ed187b63aef02dfc07f2549a10ccbd95f6baeN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0edcbeec2a709b41ad03902cb61ed187b63aef02dfc07f2549a10ccbd95f6baeN.exe
Resource
win10v2004-20241007-en
General
-
Target
0edcbeec2a709b41ad03902cb61ed187b63aef02dfc07f2549a10ccbd95f6baeN.exe
-
Size
168KB
-
MD5
a36bf849262e549aac67ec6638fad090
-
SHA1
6289b56969e48e65cb5a11aeaa8eb8a2de1f3194
-
SHA256
0edcbeec2a709b41ad03902cb61ed187b63aef02dfc07f2549a10ccbd95f6bae
-
SHA512
5d3513f101c3906eeffcb4d599989b6e08c6f131c6712ebd495e68e64d81452c84d4d4834e444268814f626f1ba57bb80e4b196824169134d7a6d98915d164db
-
SSDEEP
3072:LHrTUtapRqBxWhwO8pJ8j5ouK9Uq8Rcg2yAXuM9APy0/L6r1+KD60L:rHRAc1OJYoLOq8RAy4uDP5/rc
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 1724 wnpjt3.exe -
Executes dropped EXE 32 IoCs
pid Process 2572 wnpjt3.exe 1724 wnpjt3.exe 1188 wnpjt3.exe 1904 wnpjt3.exe 596 wnpjt3.exe 2208 wnpjt3.exe 2392 wnpjt3.exe 1544 wnpjt3.exe 2000 wnpjt3.exe 2984 wnpjt3.exe 900 wnpjt3.exe 2360 wnpjt3.exe 3064 wnpjt3.exe 3000 wnpjt3.exe 2336 wnpjt3.exe 548 wnpjt3.exe 1852 wnpjt3.exe 1860 wnpjt3.exe 2204 wnpjt3.exe 2416 wnpjt3.exe 1028 wnpjt3.exe 2980 wnpjt3.exe 1528 wnpjt3.exe 1944 wnpjt3.exe 1192 wnpjt3.exe 2908 wnpjt3.exe 1164 wnpjt3.exe 1508 wnpjt3.exe 2880 wnpjt3.exe 2952 wnpjt3.exe 536 wnpjt3.exe 976 wnpjt3.exe -
Loads dropped DLL 32 IoCs
pid Process 2656 0edcbeec2a709b41ad03902cb61ed187b63aef02dfc07f2549a10ccbd95f6baeN.exe 2656 0edcbeec2a709b41ad03902cb61ed187b63aef02dfc07f2549a10ccbd95f6baeN.exe 1724 wnpjt3.exe 1724 wnpjt3.exe 1904 wnpjt3.exe 1904 wnpjt3.exe 2208 wnpjt3.exe 2208 wnpjt3.exe 1544 wnpjt3.exe 1544 wnpjt3.exe 2984 wnpjt3.exe 2984 wnpjt3.exe 2360 wnpjt3.exe 2360 wnpjt3.exe 3000 wnpjt3.exe 3000 wnpjt3.exe 548 wnpjt3.exe 548 wnpjt3.exe 1860 wnpjt3.exe 1860 wnpjt3.exe 2416 wnpjt3.exe 2416 wnpjt3.exe 2980 wnpjt3.exe 2980 wnpjt3.exe 1944 wnpjt3.exe 1944 wnpjt3.exe 2908 wnpjt3.exe 2908 wnpjt3.exe 1508 wnpjt3.exe 1508 wnpjt3.exe 2952 wnpjt3.exe 2952 wnpjt3.exe -
Maps connected drives based on registry 3 TTPs 32 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 0edcbeec2a709b41ad03902cb61ed187b63aef02dfc07f2549a10ccbd95f6baeN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 0edcbeec2a709b41ad03902cb61ed187b63aef02dfc07f2549a10ccbd95f6baeN.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe -
Drops file in System32 directory 32 IoCs
description ioc Process File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe 0edcbeec2a709b41ad03902cb61ed187b63aef02dfc07f2549a10ccbd95f6baeN.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe 0edcbeec2a709b41ad03902cb61ed187b63aef02dfc07f2549a10ccbd95f6baeN.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe -
Suspicious use of SetThreadContext 17 IoCs
description pid Process procid_target PID 1388 set thread context of 2656 1388 0edcbeec2a709b41ad03902cb61ed187b63aef02dfc07f2549a10ccbd95f6baeN.exe 31 PID 2572 set thread context of 1724 2572 wnpjt3.exe 34 PID 1188 set thread context of 1904 1188 wnpjt3.exe 37 PID 596 set thread context of 2208 596 wnpjt3.exe 40 PID 2392 set thread context of 1544 2392 wnpjt3.exe 43 PID 2000 set thread context of 2984 2000 wnpjt3.exe 46 PID 900 set thread context of 2360 900 wnpjt3.exe 49 PID 3064 set thread context of 3000 3064 wnpjt3.exe 52 PID 2336 set thread context of 548 2336 wnpjt3.exe 55 PID 1852 set thread context of 1860 1852 wnpjt3.exe 58 PID 2204 set thread context of 2416 2204 wnpjt3.exe 61 PID 1028 set thread context of 2980 1028 wnpjt3.exe 65 PID 1528 set thread context of 1944 1528 wnpjt3.exe 68 PID 1192 set thread context of 2908 1192 wnpjt3.exe 71 PID 1164 set thread context of 1508 1164 wnpjt3.exe 74 PID 2880 set thread context of 2952 2880 wnpjt3.exe 77 PID 536 set thread context of 976 536 wnpjt3.exe 80 -
resource yara_rule behavioral1/memory/2656-3-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2656-4-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2656-7-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2656-2-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2656-8-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2656-9-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2656-22-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1724-32-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1724-33-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1724-39-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1904-48-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1904-49-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1904-50-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1904-56-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2208-72-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1544-81-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1544-82-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1544-83-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1544-89-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2984-105-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2360-115-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2360-123-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/3000-139-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/548-149-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/548-157-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1860-173-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2416-183-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2416-191-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2980-201-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2980-208-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1944-217-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1944-226-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2908-236-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2908-243-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1508-256-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2952-265-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2952-269-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 33 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0edcbeec2a709b41ad03902cb61ed187b63aef02dfc07f2549a10ccbd95f6baeN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0edcbeec2a709b41ad03902cb61ed187b63aef02dfc07f2549a10ccbd95f6baeN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 2656 0edcbeec2a709b41ad03902cb61ed187b63aef02dfc07f2549a10ccbd95f6baeN.exe 1724 wnpjt3.exe 1904 wnpjt3.exe 2208 wnpjt3.exe 1544 wnpjt3.exe 2984 wnpjt3.exe 2360 wnpjt3.exe 3000 wnpjt3.exe 548 wnpjt3.exe 1860 wnpjt3.exe 2416 wnpjt3.exe 2980 wnpjt3.exe 1944 wnpjt3.exe 2908 wnpjt3.exe 1508 wnpjt3.exe 2952 wnpjt3.exe 976 wnpjt3.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1388 wrote to memory of 2656 1388 0edcbeec2a709b41ad03902cb61ed187b63aef02dfc07f2549a10ccbd95f6baeN.exe 31 PID 1388 wrote to memory of 2656 1388 0edcbeec2a709b41ad03902cb61ed187b63aef02dfc07f2549a10ccbd95f6baeN.exe 31 PID 1388 wrote to memory of 2656 1388 0edcbeec2a709b41ad03902cb61ed187b63aef02dfc07f2549a10ccbd95f6baeN.exe 31 PID 1388 wrote to memory of 2656 1388 0edcbeec2a709b41ad03902cb61ed187b63aef02dfc07f2549a10ccbd95f6baeN.exe 31 PID 1388 wrote to memory of 2656 1388 0edcbeec2a709b41ad03902cb61ed187b63aef02dfc07f2549a10ccbd95f6baeN.exe 31 PID 1388 wrote to memory of 2656 1388 0edcbeec2a709b41ad03902cb61ed187b63aef02dfc07f2549a10ccbd95f6baeN.exe 31 PID 1388 wrote to memory of 2656 1388 0edcbeec2a709b41ad03902cb61ed187b63aef02dfc07f2549a10ccbd95f6baeN.exe 31 PID 2656 wrote to memory of 2572 2656 0edcbeec2a709b41ad03902cb61ed187b63aef02dfc07f2549a10ccbd95f6baeN.exe 33 PID 2656 wrote to memory of 2572 2656 0edcbeec2a709b41ad03902cb61ed187b63aef02dfc07f2549a10ccbd95f6baeN.exe 33 PID 2656 wrote to memory of 2572 2656 0edcbeec2a709b41ad03902cb61ed187b63aef02dfc07f2549a10ccbd95f6baeN.exe 33 PID 2656 wrote to memory of 2572 2656 0edcbeec2a709b41ad03902cb61ed187b63aef02dfc07f2549a10ccbd95f6baeN.exe 33 PID 2572 wrote to memory of 1724 2572 wnpjt3.exe 34 PID 2572 wrote to memory of 1724 2572 wnpjt3.exe 34 PID 2572 wrote to memory of 1724 2572 wnpjt3.exe 34 PID 2572 wrote to memory of 1724 2572 wnpjt3.exe 34 PID 2572 wrote to memory of 1724 2572 wnpjt3.exe 34 PID 2572 wrote to memory of 1724 2572 wnpjt3.exe 34 PID 2572 wrote to memory of 1724 2572 wnpjt3.exe 34 PID 1724 wrote to memory of 1188 1724 wnpjt3.exe 36 PID 1724 wrote to memory of 1188 1724 wnpjt3.exe 36 PID 1724 wrote to memory of 1188 1724 wnpjt3.exe 36 PID 1724 wrote to memory of 1188 1724 wnpjt3.exe 36 PID 1188 wrote to memory of 1904 1188 wnpjt3.exe 37 PID 1188 wrote to memory of 1904 1188 wnpjt3.exe 37 PID 1188 wrote to memory of 1904 1188 wnpjt3.exe 37 PID 1188 wrote to memory of 1904 1188 wnpjt3.exe 37 PID 1188 wrote to memory of 1904 1188 wnpjt3.exe 37 PID 1188 wrote to memory of 1904 1188 wnpjt3.exe 37 PID 1188 wrote to memory of 1904 1188 wnpjt3.exe 37 PID 1904 wrote to memory of 596 1904 wnpjt3.exe 39 PID 1904 wrote to memory of 596 1904 wnpjt3.exe 39 PID 1904 wrote to memory of 596 1904 wnpjt3.exe 39 PID 1904 wrote to memory of 596 1904 wnpjt3.exe 39 PID 596 wrote to memory of 2208 596 wnpjt3.exe 40 PID 596 wrote to memory of 2208 596 wnpjt3.exe 40 PID 596 wrote to memory of 2208 596 wnpjt3.exe 40 PID 596 wrote to memory of 2208 596 wnpjt3.exe 40 PID 596 wrote to memory of 2208 596 wnpjt3.exe 40 PID 596 wrote to memory of 2208 596 wnpjt3.exe 40 PID 596 wrote to memory of 2208 596 wnpjt3.exe 40 PID 2208 wrote to memory of 2392 2208 wnpjt3.exe 42 PID 2208 wrote to memory of 2392 2208 wnpjt3.exe 42 PID 2208 wrote to memory of 2392 2208 wnpjt3.exe 42 PID 2208 wrote to memory of 2392 2208 wnpjt3.exe 42 PID 2392 wrote to memory of 1544 2392 wnpjt3.exe 43 PID 2392 wrote to memory of 1544 2392 wnpjt3.exe 43 PID 2392 wrote to memory of 1544 2392 wnpjt3.exe 43 PID 2392 wrote to memory of 1544 2392 wnpjt3.exe 43 PID 2392 wrote to memory of 1544 2392 wnpjt3.exe 43 PID 2392 wrote to memory of 1544 2392 wnpjt3.exe 43 PID 2392 wrote to memory of 1544 2392 wnpjt3.exe 43 PID 1544 wrote to memory of 2000 1544 wnpjt3.exe 45 PID 1544 wrote to memory of 2000 1544 wnpjt3.exe 45 PID 1544 wrote to memory of 2000 1544 wnpjt3.exe 45 PID 1544 wrote to memory of 2000 1544 wnpjt3.exe 45 PID 2000 wrote to memory of 2984 2000 wnpjt3.exe 46 PID 2000 wrote to memory of 2984 2000 wnpjt3.exe 46 PID 2000 wrote to memory of 2984 2000 wnpjt3.exe 46 PID 2000 wrote to memory of 2984 2000 wnpjt3.exe 46 PID 2000 wrote to memory of 2984 2000 wnpjt3.exe 46 PID 2000 wrote to memory of 2984 2000 wnpjt3.exe 46 PID 2000 wrote to memory of 2984 2000 wnpjt3.exe 46 PID 2984 wrote to memory of 900 2984 wnpjt3.exe 48 PID 2984 wrote to memory of 900 2984 wnpjt3.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\0edcbeec2a709b41ad03902cb61ed187b63aef02dfc07f2549a10ccbd95f6baeN.exe"C:\Users\Admin\AppData\Local\Temp\0edcbeec2a709b41ad03902cb61ed187b63aef02dfc07f2549a10ccbd95f6baeN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\0edcbeec2a709b41ad03902cb61ed187b63aef02dfc07f2549a10ccbd95f6baeN.exe"C:\Users\Admin\AppData\Local\Temp\0edcbeec2a709b41ad03902cb61ed187b63aef02dfc07f2549a10ccbd95f6baeN.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Users\Admin\AppData\Local\Temp\0EDCBE~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Users\Admin\AppData\Local\Temp\0EDCBE~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:900 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2360 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3064 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3000 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2336 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:548 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1852 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1860 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2204 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2416 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1028 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2980 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1528 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1944 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1192 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2908 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1164 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1508 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2880 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2952 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:536 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe34⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:976
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5a36bf849262e549aac67ec6638fad090
SHA16289b56969e48e65cb5a11aeaa8eb8a2de1f3194
SHA2560edcbeec2a709b41ad03902cb61ed187b63aef02dfc07f2549a10ccbd95f6bae
SHA5125d3513f101c3906eeffcb4d599989b6e08c6f131c6712ebd495e68e64d81452c84d4d4834e444268814f626f1ba57bb80e4b196824169134d7a6d98915d164db