Analysis
-
max time kernel
148s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-12-2024 00:18
Static task
static1
Behavioral task
behavioral1
Sample
bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe
-
Size
149KB
-
MD5
bfed004f981bc216bdd584e9202c8b6e
-
SHA1
d241adfba8f01e1326bfc1dda33da842bba4636c
-
SHA256
6da9079d6bcc6e40fceb8513b32235b2ff6b462a32739c02fbe7844665cff1f5
-
SHA512
f71fc3517e0af8619350a8479a77334a1d849e9ad4e3eb41765e15394d78280f54de9f6e6be629cf7a620fb03275837faf17925890a8a62f87db074e60efd05b
-
SSDEEP
3072:ZbDCt2UkNPQq4JkYzTjTkgxVaIEvw882gR3RrJ04EhoQBs:1/U+PskMCIEvbYB+4EeQBs
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2108 wmipsvtr.exe -
Executes dropped EXE 64 IoCs
pid Process 2084 wmipsvtr.exe 2108 wmipsvtr.exe 2560 wmipsvtr.exe 2752 wmipsvtr.exe 2992 wmipsvtr.exe 1280 wmipsvtr.exe 2464 wmipsvtr.exe 1744 wmipsvtr.exe 2444 wmipsvtr.exe 1592 wmipsvtr.exe 668 wmipsvtr.exe 2632 wmipsvtr.exe 1648 wmipsvtr.exe 1944 wmipsvtr.exe 1728 wmipsvtr.exe 2496 wmipsvtr.exe 1540 wmipsvtr.exe 1056 wmipsvtr.exe 2408 wmipsvtr.exe 992 wmipsvtr.exe 2484 wmipsvtr.exe 1784 wmipsvtr.exe 1996 wmipsvtr.exe 2684 wmipsvtr.exe 2700 wmipsvtr.exe 2648 wmipsvtr.exe 2656 wmipsvtr.exe 2204 wmipsvtr.exe 1028 wmipsvtr.exe 1720 wmipsvtr.exe 2016 wmipsvtr.exe 1404 wmipsvtr.exe 2872 wmipsvtr.exe 2888 wmipsvtr.exe 1152 wmipsvtr.exe 1140 wmipsvtr.exe 756 wmipsvtr.exe 828 wmipsvtr.exe 2180 wmipsvtr.exe 568 wmipsvtr.exe 2980 wmipsvtr.exe 1752 wmipsvtr.exe 1780 wmipsvtr.exe 1392 wmipsvtr.exe 2900 wmipsvtr.exe 2720 wmipsvtr.exe 2020 wmipsvtr.exe 2768 wmipsvtr.exe 1924 wmipsvtr.exe 1584 wmipsvtr.exe 2300 wmipsvtr.exe 2656 wmipsvtr.exe 2012 wmipsvtr.exe 1084 wmipsvtr.exe 1400 wmipsvtr.exe 1496 wmipsvtr.exe 2444 wmipsvtr.exe 316 wmipsvtr.exe 2392 wmipsvtr.exe 1408 wmipsvtr.exe 444 wmipsvtr.exe 1340 wmipsvtr.exe 1016 wmipsvtr.exe 1728 wmipsvtr.exe -
Loads dropped DLL 64 IoCs
pid Process 1928 bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe 1928 bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe 2084 wmipsvtr.exe 2108 wmipsvtr.exe 2108 wmipsvtr.exe 2752 wmipsvtr.exe 2752 wmipsvtr.exe 1280 wmipsvtr.exe 1280 wmipsvtr.exe 1744 wmipsvtr.exe 1744 wmipsvtr.exe 1592 wmipsvtr.exe 1592 wmipsvtr.exe 2632 wmipsvtr.exe 2632 wmipsvtr.exe 1944 wmipsvtr.exe 1944 wmipsvtr.exe 2496 wmipsvtr.exe 2496 wmipsvtr.exe 1056 wmipsvtr.exe 1056 wmipsvtr.exe 992 wmipsvtr.exe 992 wmipsvtr.exe 1784 wmipsvtr.exe 1784 wmipsvtr.exe 2684 wmipsvtr.exe 2684 wmipsvtr.exe 2648 wmipsvtr.exe 2648 wmipsvtr.exe 2204 wmipsvtr.exe 2204 wmipsvtr.exe 1720 wmipsvtr.exe 1720 wmipsvtr.exe 1404 wmipsvtr.exe 1404 wmipsvtr.exe 2888 wmipsvtr.exe 2888 wmipsvtr.exe 1140 wmipsvtr.exe 1140 wmipsvtr.exe 828 wmipsvtr.exe 828 wmipsvtr.exe 568 wmipsvtr.exe 568 wmipsvtr.exe 1752 wmipsvtr.exe 1752 wmipsvtr.exe 1392 wmipsvtr.exe 1392 wmipsvtr.exe 2720 wmipsvtr.exe 2720 wmipsvtr.exe 2768 wmipsvtr.exe 2768 wmipsvtr.exe 1584 wmipsvtr.exe 1584 wmipsvtr.exe 2656 wmipsvtr.exe 2656 wmipsvtr.exe 1084 wmipsvtr.exe 1084 wmipsvtr.exe 1496 wmipsvtr.exe 1496 wmipsvtr.exe 316 wmipsvtr.exe 316 wmipsvtr.exe 1408 wmipsvtr.exe 1408 wmipsvtr.exe 1340 wmipsvtr.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe -
Suspicious use of SetThreadContext 33 IoCs
description pid Process procid_target PID 1392 set thread context of 1928 1392 bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe 31 PID 2084 set thread context of 2108 2084 wmipsvtr.exe 33 PID 2560 set thread context of 2752 2560 wmipsvtr.exe 35 PID 2992 set thread context of 1280 2992 wmipsvtr.exe 37 PID 2464 set thread context of 1744 2464 wmipsvtr.exe 39 PID 2444 set thread context of 1592 2444 wmipsvtr.exe 41 PID 668 set thread context of 2632 668 wmipsvtr.exe 43 PID 1648 set thread context of 1944 1648 wmipsvtr.exe 45 PID 1728 set thread context of 2496 1728 wmipsvtr.exe 47 PID 1540 set thread context of 1056 1540 wmipsvtr.exe 49 PID 2408 set thread context of 992 2408 wmipsvtr.exe 51 PID 2484 set thread context of 1784 2484 wmipsvtr.exe 53 PID 1996 set thread context of 2684 1996 wmipsvtr.exe 55 PID 2700 set thread context of 2648 2700 wmipsvtr.exe 57 PID 2656 set thread context of 2204 2656 wmipsvtr.exe 59 PID 1028 set thread context of 1720 1028 wmipsvtr.exe 61 PID 2016 set thread context of 1404 2016 wmipsvtr.exe 63 PID 2872 set thread context of 2888 2872 wmipsvtr.exe 65 PID 1152 set thread context of 1140 1152 wmipsvtr.exe 67 PID 756 set thread context of 828 756 wmipsvtr.exe 69 PID 2180 set thread context of 568 2180 wmipsvtr.exe 71 PID 2980 set thread context of 1752 2980 wmipsvtr.exe 74 PID 1780 set thread context of 1392 1780 wmipsvtr.exe 76 PID 2900 set thread context of 2720 2900 wmipsvtr.exe 78 PID 2020 set thread context of 2768 2020 wmipsvtr.exe 80 PID 1924 set thread context of 1584 1924 wmipsvtr.exe 82 PID 2300 set thread context of 2656 2300 wmipsvtr.exe 84 PID 2012 set thread context of 1084 2012 wmipsvtr.exe 86 PID 1400 set thread context of 1496 1400 wmipsvtr.exe 88 PID 2444 set thread context of 316 2444 wmipsvtr.exe 90 PID 2392 set thread context of 1408 2392 wmipsvtr.exe 92 PID 444 set thread context of 1340 444 wmipsvtr.exe 94 PID 1016 set thread context of 1728 1016 wmipsvtr.exe 96 -
resource yara_rule behavioral1/memory/1928-2-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1928-9-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1928-8-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1928-7-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1928-4-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1928-3-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1928-6-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1928-22-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2108-35-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2108-34-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2108-33-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2108-32-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2108-41-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2752-52-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2752-58-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1280-69-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1280-76-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1744-87-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1744-93-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1592-104-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1592-109-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2632-121-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2632-127-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1944-138-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1944-144-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2496-156-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2496-162-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1056-173-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1056-180-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/992-191-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/992-197-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1784-208-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1784-215-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2684-226-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2684-232-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2648-243-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2648-249-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2204-259-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2204-262-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1720-271-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1720-275-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1404-284-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1404-288-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2888-297-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2888-301-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1140-311-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1140-314-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/828-324-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/828-327-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/568-337-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/568-340-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1752-352-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1392-364-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2720-376-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2768-388-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1584-400-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2656-412-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1084-424-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1496-432-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1496-437-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/316-449-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1408-457-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1408-462-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1340-474-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 1928 bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe 2108 wmipsvtr.exe 2752 wmipsvtr.exe 1280 wmipsvtr.exe 1744 wmipsvtr.exe 1592 wmipsvtr.exe 2632 wmipsvtr.exe 1944 wmipsvtr.exe 2496 wmipsvtr.exe 1056 wmipsvtr.exe 992 wmipsvtr.exe 1784 wmipsvtr.exe 2684 wmipsvtr.exe 2648 wmipsvtr.exe 2204 wmipsvtr.exe 1720 wmipsvtr.exe 1404 wmipsvtr.exe 2888 wmipsvtr.exe 1140 wmipsvtr.exe 828 wmipsvtr.exe 568 wmipsvtr.exe 1752 wmipsvtr.exe 1392 wmipsvtr.exe 2720 wmipsvtr.exe 2768 wmipsvtr.exe 1584 wmipsvtr.exe 2656 wmipsvtr.exe 1084 wmipsvtr.exe 1496 wmipsvtr.exe 316 wmipsvtr.exe 1408 wmipsvtr.exe 1340 wmipsvtr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1392 wrote to memory of 1928 1392 bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe 31 PID 1392 wrote to memory of 1928 1392 bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe 31 PID 1392 wrote to memory of 1928 1392 bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe 31 PID 1392 wrote to memory of 1928 1392 bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe 31 PID 1392 wrote to memory of 1928 1392 bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe 31 PID 1392 wrote to memory of 1928 1392 bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe 31 PID 1392 wrote to memory of 1928 1392 bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe 31 PID 1928 wrote to memory of 2084 1928 bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe 32 PID 1928 wrote to memory of 2084 1928 bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe 32 PID 1928 wrote to memory of 2084 1928 bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe 32 PID 1928 wrote to memory of 2084 1928 bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe 32 PID 2084 wrote to memory of 2108 2084 wmipsvtr.exe 33 PID 2084 wrote to memory of 2108 2084 wmipsvtr.exe 33 PID 2084 wrote to memory of 2108 2084 wmipsvtr.exe 33 PID 2084 wrote to memory of 2108 2084 wmipsvtr.exe 33 PID 2084 wrote to memory of 2108 2084 wmipsvtr.exe 33 PID 2084 wrote to memory of 2108 2084 wmipsvtr.exe 33 PID 2084 wrote to memory of 2108 2084 wmipsvtr.exe 33 PID 2108 wrote to memory of 2560 2108 wmipsvtr.exe 34 PID 2108 wrote to memory of 2560 2108 wmipsvtr.exe 34 PID 2108 wrote to memory of 2560 2108 wmipsvtr.exe 34 PID 2108 wrote to memory of 2560 2108 wmipsvtr.exe 34 PID 2560 wrote to memory of 2752 2560 wmipsvtr.exe 35 PID 2560 wrote to memory of 2752 2560 wmipsvtr.exe 35 PID 2560 wrote to memory of 2752 2560 wmipsvtr.exe 35 PID 2560 wrote to memory of 2752 2560 wmipsvtr.exe 35 PID 2560 wrote to memory of 2752 2560 wmipsvtr.exe 35 PID 2560 wrote to memory of 2752 2560 wmipsvtr.exe 35 PID 2560 wrote to memory of 2752 2560 wmipsvtr.exe 35 PID 2752 wrote to memory of 2992 2752 wmipsvtr.exe 36 PID 2752 wrote to memory of 2992 2752 wmipsvtr.exe 36 PID 2752 wrote to memory of 2992 2752 wmipsvtr.exe 36 PID 2752 wrote to memory of 2992 2752 wmipsvtr.exe 36 PID 2992 wrote to memory of 1280 2992 wmipsvtr.exe 37 PID 2992 wrote to memory of 1280 2992 wmipsvtr.exe 37 PID 2992 wrote to memory of 1280 2992 wmipsvtr.exe 37 PID 2992 wrote to memory of 1280 2992 wmipsvtr.exe 37 PID 2992 wrote to memory of 1280 2992 wmipsvtr.exe 37 PID 2992 wrote to memory of 1280 2992 wmipsvtr.exe 37 PID 2992 wrote to memory of 1280 2992 wmipsvtr.exe 37 PID 1280 wrote to memory of 2464 1280 wmipsvtr.exe 38 PID 1280 wrote to memory of 2464 1280 wmipsvtr.exe 38 PID 1280 wrote to memory of 2464 1280 wmipsvtr.exe 38 PID 1280 wrote to memory of 2464 1280 wmipsvtr.exe 38 PID 2464 wrote to memory of 1744 2464 wmipsvtr.exe 39 PID 2464 wrote to memory of 1744 2464 wmipsvtr.exe 39 PID 2464 wrote to memory of 1744 2464 wmipsvtr.exe 39 PID 2464 wrote to memory of 1744 2464 wmipsvtr.exe 39 PID 2464 wrote to memory of 1744 2464 wmipsvtr.exe 39 PID 2464 wrote to memory of 1744 2464 wmipsvtr.exe 39 PID 2464 wrote to memory of 1744 2464 wmipsvtr.exe 39 PID 1744 wrote to memory of 2444 1744 wmipsvtr.exe 40 PID 1744 wrote to memory of 2444 1744 wmipsvtr.exe 40 PID 1744 wrote to memory of 2444 1744 wmipsvtr.exe 40 PID 1744 wrote to memory of 2444 1744 wmipsvtr.exe 40 PID 2444 wrote to memory of 1592 2444 wmipsvtr.exe 41 PID 2444 wrote to memory of 1592 2444 wmipsvtr.exe 41 PID 2444 wrote to memory of 1592 2444 wmipsvtr.exe 41 PID 2444 wrote to memory of 1592 2444 wmipsvtr.exe 41 PID 2444 wrote to memory of 1592 2444 wmipsvtr.exe 41 PID 2444 wrote to memory of 1592 2444 wmipsvtr.exe 41 PID 2444 wrote to memory of 1592 2444 wmipsvtr.exe 41 PID 1592 wrote to memory of 668 1592 wmipsvtr.exe 42 PID 1592 wrote to memory of 668 1592 wmipsvtr.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Users\Admin\AppData\Local\Temp\BFED00~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Users\Admin\AppData\Local\Temp\BFED00~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:668 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2632 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1648 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1944 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1728 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2496 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1540 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1056 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2408 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:992 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2484 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1784 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1996 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2684 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2700 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2648 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2656 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2204 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1028 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1720 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2016 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe34⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1404 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2872 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe36⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2888 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1152 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe38⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1140 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:756 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe40⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:828 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2180 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe42⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:568 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2980 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe44⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1752 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1780 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe46⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1392 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2900 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe48⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2720 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2020 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe50⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2768 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1924 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe52⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1584 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2300 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe54⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2656 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2012 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe56⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1084 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1400 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe58⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1496 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2444 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe60⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:316 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2392 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe62⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1408 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:444 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe64⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1340 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1016 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe66⤵
- Executes dropped EXE
PID:1728
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
149KB
MD5bfed004f981bc216bdd584e9202c8b6e
SHA1d241adfba8f01e1326bfc1dda33da842bba4636c
SHA2566da9079d6bcc6e40fceb8513b32235b2ff6b462a32739c02fbe7844665cff1f5
SHA512f71fc3517e0af8619350a8479a77334a1d849e9ad4e3eb41765e15394d78280f54de9f6e6be629cf7a620fb03275837faf17925890a8a62f87db074e60efd05b