Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 15:35
Static task
static1
Behavioral task
behavioral1
Sample
be0eca65895cda00be3570fbf9f71e3d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
be0eca65895cda00be3570fbf9f71e3d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
be0eca65895cda00be3570fbf9f71e3d_JaffaCakes118.exe
-
Size
168KB
-
MD5
be0eca65895cda00be3570fbf9f71e3d
-
SHA1
e6cdf794ccedd55f7355b632936ff84de7adf889
-
SHA256
e94750aa11e7e0946ecd9548d806f4a2dda84ecb75b895c2d9f84b77395ca0f7
-
SHA512
e8e86fb5f8469776fc005ee0bae4de2ce83492f0a2cf5c6a7ee2d376f3fd977cf8b972719872737b242cef6e909449fa890688f29236abba307aaa1f3f597bcc
-
SSDEEP
3072:YzpptnCRqBxWhwO8pJ8j5ouK9Uq8Rcg2yAXuM9APy0/L6r1+KD60L:2DCRAc1OJYoLOq8RAy4uDP5/rg
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2760 wnpjt3.exe -
Executes dropped EXE 44 IoCs
pid Process 2824 wnpjt3.exe 2760 wnpjt3.exe 2668 wnpjt3.exe 1704 wnpjt3.exe 1236 wnpjt3.exe 896 wnpjt3.exe 2148 wnpjt3.exe 2316 wnpjt3.exe 272 wnpjt3.exe 1996 wnpjt3.exe 1284 wnpjt3.exe 2420 wnpjt3.exe 1780 wnpjt3.exe 3032 wnpjt3.exe 1328 wnpjt3.exe 2828 wnpjt3.exe 2332 wnpjt3.exe 2652 wnpjt3.exe 2708 wnpjt3.exe 1784 wnpjt3.exe 2684 wnpjt3.exe 1756 wnpjt3.exe 1372 wnpjt3.exe 1400 wnpjt3.exe 1584 wnpjt3.exe 2792 wnpjt3.exe 1000 wnpjt3.exe 1648 wnpjt3.exe 2860 wnpjt3.exe 1792 wnpjt3.exe 2820 wnpjt3.exe 3044 wnpjt3.exe 2012 wnpjt3.exe 1800 wnpjt3.exe 1776 wnpjt3.exe 2440 wnpjt3.exe 1676 wnpjt3.exe 2464 wnpjt3.exe 272 wnpjt3.exe 1484 wnpjt3.exe 552 wnpjt3.exe 588 wnpjt3.exe 676 wnpjt3.exe 2548 wnpjt3.exe -
Loads dropped DLL 45 IoCs
pid Process 2172 be0eca65895cda00be3570fbf9f71e3d_JaffaCakes118.exe 2172 be0eca65895cda00be3570fbf9f71e3d_JaffaCakes118.exe 2824 wnpjt3.exe 2760 wnpjt3.exe 2760 wnpjt3.exe 1704 wnpjt3.exe 1704 wnpjt3.exe 896 wnpjt3.exe 896 wnpjt3.exe 2316 wnpjt3.exe 2316 wnpjt3.exe 1996 wnpjt3.exe 1996 wnpjt3.exe 2420 wnpjt3.exe 2420 wnpjt3.exe 3032 wnpjt3.exe 3032 wnpjt3.exe 2828 wnpjt3.exe 2828 wnpjt3.exe 2652 wnpjt3.exe 2652 wnpjt3.exe 1784 wnpjt3.exe 1784 wnpjt3.exe 1756 wnpjt3.exe 1756 wnpjt3.exe 1400 wnpjt3.exe 1400 wnpjt3.exe 2792 wnpjt3.exe 2792 wnpjt3.exe 1648 wnpjt3.exe 1648 wnpjt3.exe 1792 wnpjt3.exe 1792 wnpjt3.exe 3044 wnpjt3.exe 3044 wnpjt3.exe 1800 wnpjt3.exe 1800 wnpjt3.exe 2440 wnpjt3.exe 2440 wnpjt3.exe 2464 wnpjt3.exe 2464 wnpjt3.exe 1484 wnpjt3.exe 1484 wnpjt3.exe 588 wnpjt3.exe 588 wnpjt3.exe -
Maps connected drives based on registry 3 TTPs 46 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum be0eca65895cda00be3570fbf9f71e3d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 be0eca65895cda00be3570fbf9f71e3d_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpjt3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpjt3.exe -
Drops file in System32 directory 44 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe be0eca65895cda00be3570fbf9f71e3d_JaffaCakes118.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File opened for modification C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe wnpjt3.exe File created C:\Windows\SysWOW64\wnpjt3.exe be0eca65895cda00be3570fbf9f71e3d_JaffaCakes118.exe -
Suspicious use of SetThreadContext 23 IoCs
description pid Process procid_target PID 2516 set thread context of 2172 2516 be0eca65895cda00be3570fbf9f71e3d_JaffaCakes118.exe 30 PID 2824 set thread context of 2760 2824 wnpjt3.exe 33 PID 2668 set thread context of 1704 2668 wnpjt3.exe 36 PID 1236 set thread context of 896 1236 wnpjt3.exe 38 PID 2148 set thread context of 2316 2148 wnpjt3.exe 41 PID 272 set thread context of 1996 272 wnpjt3.exe 44 PID 1284 set thread context of 2420 1284 wnpjt3.exe 47 PID 1780 set thread context of 3032 1780 wnpjt3.exe 50 PID 1328 set thread context of 2828 1328 wnpjt3.exe 53 PID 2332 set thread context of 2652 2332 wnpjt3.exe 56 PID 2708 set thread context of 1784 2708 wnpjt3.exe 58 PID 2684 set thread context of 1756 2684 wnpjt3.exe 61 PID 1372 set thread context of 1400 1372 wnpjt3.exe 64 PID 1584 set thread context of 2792 1584 wnpjt3.exe 67 PID 1000 set thread context of 1648 1000 wnpjt3.exe 70 PID 2860 set thread context of 1792 2860 wnpjt3.exe 73 PID 2820 set thread context of 3044 2820 wnpjt3.exe 76 PID 2012 set thread context of 1800 2012 wnpjt3.exe 79 PID 1776 set thread context of 2440 1776 wnpjt3.exe 82 PID 1676 set thread context of 2464 1676 wnpjt3.exe 85 PID 272 set thread context of 1484 272 wnpjt3.exe 88 PID 552 set thread context of 588 552 wnpjt3.exe 91 PID 676 set thread context of 2548 676 wnpjt3.exe 94 -
resource yara_rule behavioral1/memory/2172-2-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2172-6-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2172-9-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2172-8-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2172-7-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2172-4-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2172-3-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2172-22-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2760-33-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2760-34-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2760-40-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1704-51-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1704-49-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1704-50-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1704-57-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/896-69-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/896-76-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2316-92-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1996-101-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1996-102-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1996-103-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1996-110-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2420-119-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2420-126-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/3032-138-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/3032-145-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2828-155-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2828-162-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2652-173-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2652-178-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1784-190-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1784-197-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1756-213-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1400-224-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1400-226-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1400-232-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2792-241-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2792-249-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1648-259-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1648-262-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1792-274-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/3044-283-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/3044-287-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1800-299-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2440-308-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2440-312-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2464-324-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1484-334-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1484-337-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/588-349-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2548-358-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 46 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be0eca65895cda00be3570fbf9f71e3d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be0eca65895cda00be3570fbf9f71e3d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpjt3.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 2172 be0eca65895cda00be3570fbf9f71e3d_JaffaCakes118.exe 2760 wnpjt3.exe 1704 wnpjt3.exe 896 wnpjt3.exe 2316 wnpjt3.exe 1996 wnpjt3.exe 2420 wnpjt3.exe 3032 wnpjt3.exe 2828 wnpjt3.exe 2652 wnpjt3.exe 1784 wnpjt3.exe 1756 wnpjt3.exe 1400 wnpjt3.exe 2792 wnpjt3.exe 1648 wnpjt3.exe 1792 wnpjt3.exe 3044 wnpjt3.exe 1800 wnpjt3.exe 2440 wnpjt3.exe 2464 wnpjt3.exe 1484 wnpjt3.exe 588 wnpjt3.exe 2548 wnpjt3.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2172 2516 be0eca65895cda00be3570fbf9f71e3d_JaffaCakes118.exe 30 PID 2516 wrote to memory of 2172 2516 be0eca65895cda00be3570fbf9f71e3d_JaffaCakes118.exe 30 PID 2516 wrote to memory of 2172 2516 be0eca65895cda00be3570fbf9f71e3d_JaffaCakes118.exe 30 PID 2516 wrote to memory of 2172 2516 be0eca65895cda00be3570fbf9f71e3d_JaffaCakes118.exe 30 PID 2516 wrote to memory of 2172 2516 be0eca65895cda00be3570fbf9f71e3d_JaffaCakes118.exe 30 PID 2516 wrote to memory of 2172 2516 be0eca65895cda00be3570fbf9f71e3d_JaffaCakes118.exe 30 PID 2516 wrote to memory of 2172 2516 be0eca65895cda00be3570fbf9f71e3d_JaffaCakes118.exe 30 PID 2172 wrote to memory of 2824 2172 be0eca65895cda00be3570fbf9f71e3d_JaffaCakes118.exe 32 PID 2172 wrote to memory of 2824 2172 be0eca65895cda00be3570fbf9f71e3d_JaffaCakes118.exe 32 PID 2172 wrote to memory of 2824 2172 be0eca65895cda00be3570fbf9f71e3d_JaffaCakes118.exe 32 PID 2172 wrote to memory of 2824 2172 be0eca65895cda00be3570fbf9f71e3d_JaffaCakes118.exe 32 PID 2824 wrote to memory of 2760 2824 wnpjt3.exe 33 PID 2824 wrote to memory of 2760 2824 wnpjt3.exe 33 PID 2824 wrote to memory of 2760 2824 wnpjt3.exe 33 PID 2824 wrote to memory of 2760 2824 wnpjt3.exe 33 PID 2824 wrote to memory of 2760 2824 wnpjt3.exe 33 PID 2824 wrote to memory of 2760 2824 wnpjt3.exe 33 PID 2824 wrote to memory of 2760 2824 wnpjt3.exe 33 PID 2760 wrote to memory of 2668 2760 wnpjt3.exe 35 PID 2760 wrote to memory of 2668 2760 wnpjt3.exe 35 PID 2760 wrote to memory of 2668 2760 wnpjt3.exe 35 PID 2760 wrote to memory of 2668 2760 wnpjt3.exe 35 PID 2668 wrote to memory of 1704 2668 wnpjt3.exe 36 PID 2668 wrote to memory of 1704 2668 wnpjt3.exe 36 PID 2668 wrote to memory of 1704 2668 wnpjt3.exe 36 PID 2668 wrote to memory of 1704 2668 wnpjt3.exe 36 PID 2668 wrote to memory of 1704 2668 wnpjt3.exe 36 PID 2668 wrote to memory of 1704 2668 wnpjt3.exe 36 PID 2668 wrote to memory of 1704 2668 wnpjt3.exe 36 PID 1704 wrote to memory of 1236 1704 wnpjt3.exe 37 PID 1704 wrote to memory of 1236 1704 wnpjt3.exe 37 PID 1704 wrote to memory of 1236 1704 wnpjt3.exe 37 PID 1704 wrote to memory of 1236 1704 wnpjt3.exe 37 PID 1236 wrote to memory of 896 1236 wnpjt3.exe 38 PID 1236 wrote to memory of 896 1236 wnpjt3.exe 38 PID 1236 wrote to memory of 896 1236 wnpjt3.exe 38 PID 1236 wrote to memory of 896 1236 wnpjt3.exe 38 PID 1236 wrote to memory of 896 1236 wnpjt3.exe 38 PID 1236 wrote to memory of 896 1236 wnpjt3.exe 38 PID 1236 wrote to memory of 896 1236 wnpjt3.exe 38 PID 896 wrote to memory of 2148 896 wnpjt3.exe 40 PID 896 wrote to memory of 2148 896 wnpjt3.exe 40 PID 896 wrote to memory of 2148 896 wnpjt3.exe 40 PID 896 wrote to memory of 2148 896 wnpjt3.exe 40 PID 2148 wrote to memory of 2316 2148 wnpjt3.exe 41 PID 2148 wrote to memory of 2316 2148 wnpjt3.exe 41 PID 2148 wrote to memory of 2316 2148 wnpjt3.exe 41 PID 2148 wrote to memory of 2316 2148 wnpjt3.exe 41 PID 2148 wrote to memory of 2316 2148 wnpjt3.exe 41 PID 2148 wrote to memory of 2316 2148 wnpjt3.exe 41 PID 2148 wrote to memory of 2316 2148 wnpjt3.exe 41 PID 2316 wrote to memory of 272 2316 wnpjt3.exe 43 PID 2316 wrote to memory of 272 2316 wnpjt3.exe 43 PID 2316 wrote to memory of 272 2316 wnpjt3.exe 43 PID 2316 wrote to memory of 272 2316 wnpjt3.exe 43 PID 272 wrote to memory of 1996 272 wnpjt3.exe 44 PID 272 wrote to memory of 1996 272 wnpjt3.exe 44 PID 272 wrote to memory of 1996 272 wnpjt3.exe 44 PID 272 wrote to memory of 1996 272 wnpjt3.exe 44 PID 272 wrote to memory of 1996 272 wnpjt3.exe 44 PID 272 wrote to memory of 1996 272 wnpjt3.exe 44 PID 272 wrote to memory of 1996 272 wnpjt3.exe 44 PID 1996 wrote to memory of 1284 1996 wnpjt3.exe 46 PID 1996 wrote to memory of 1284 1996 wnpjt3.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\be0eca65895cda00be3570fbf9f71e3d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\be0eca65895cda00be3570fbf9f71e3d_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\be0eca65895cda00be3570fbf9f71e3d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\be0eca65895cda00be3570fbf9f71e3d_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Users\Admin\AppData\Local\Temp\BE0ECA~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Users\Admin\AppData\Local\Temp\BE0ECA~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:272 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1284 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2420 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1780 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3032 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1328 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2828 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2332 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2652 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2708 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1784 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2684 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1756 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1372 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1400 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1584 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2792 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1000 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1648 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2860 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1792 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2820 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe34⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3044 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2012 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe36⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1800 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1776 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe38⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2440 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1676 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe40⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2464 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:272 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe42⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1484 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:552 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe44⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:588 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:676 -
C:\Windows\SysWOW64\wnpjt3.exe"C:\Windows\system32\wnpjt3.exe" C:\Windows\SysWOW64\wnpjt3.exe46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2548
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5be0eca65895cda00be3570fbf9f71e3d
SHA1e6cdf794ccedd55f7355b632936ff84de7adf889
SHA256e94750aa11e7e0946ecd9548d806f4a2dda84ecb75b895c2d9f84b77395ca0f7
SHA512e8e86fb5f8469776fc005ee0bae4de2ce83492f0a2cf5c6a7ee2d376f3fd977cf8b972719872737b242cef6e909449fa890688f29236abba307aaa1f3f597bcc