Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2024 00:18
Static task
static1
Behavioral task
behavioral1
Sample
bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe
-
Size
149KB
-
MD5
bfed004f981bc216bdd584e9202c8b6e
-
SHA1
d241adfba8f01e1326bfc1dda33da842bba4636c
-
SHA256
6da9079d6bcc6e40fceb8513b32235b2ff6b462a32739c02fbe7844665cff1f5
-
SHA512
f71fc3517e0af8619350a8479a77334a1d849e9ad4e3eb41765e15394d78280f54de9f6e6be629cf7a620fb03275837faf17925890a8a62f87db074e60efd05b
-
SSDEEP
3072:ZbDCt2UkNPQq4JkYzTjTkgxVaIEvw882gR3RrJ04EhoQBs:1/U+PskMCIEvbYB+4EeQBs
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 31 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation wmipsvtr.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation wmipsvtr.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation wmipsvtr.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation wmipsvtr.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation wmipsvtr.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation wmipsvtr.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation wmipsvtr.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation wmipsvtr.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation wmipsvtr.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation wmipsvtr.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation wmipsvtr.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation wmipsvtr.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation wmipsvtr.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation wmipsvtr.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation wmipsvtr.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation wmipsvtr.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation wmipsvtr.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation wmipsvtr.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation wmipsvtr.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation wmipsvtr.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation wmipsvtr.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation wmipsvtr.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation wmipsvtr.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation wmipsvtr.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation wmipsvtr.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation wmipsvtr.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation wmipsvtr.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation wmipsvtr.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation wmipsvtr.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation wmipsvtr.exe -
Deletes itself 1 IoCs
pid Process 2300 wmipsvtr.exe -
Executes dropped EXE 62 IoCs
pid Process 4496 wmipsvtr.exe 2300 wmipsvtr.exe 3672 wmipsvtr.exe 4236 wmipsvtr.exe 1804 wmipsvtr.exe 3544 wmipsvtr.exe 4432 wmipsvtr.exe 748 wmipsvtr.exe 1764 wmipsvtr.exe 4788 wmipsvtr.exe 5064 wmipsvtr.exe 2012 wmipsvtr.exe 4624 wmipsvtr.exe 3612 wmipsvtr.exe 4388 wmipsvtr.exe 3056 wmipsvtr.exe 3620 wmipsvtr.exe 1908 wmipsvtr.exe 1096 wmipsvtr.exe 1416 wmipsvtr.exe 3560 wmipsvtr.exe 4660 wmipsvtr.exe 3088 wmipsvtr.exe 264 wmipsvtr.exe 2536 wmipsvtr.exe 2872 wmipsvtr.exe 4244 wmipsvtr.exe 3748 wmipsvtr.exe 1380 wmipsvtr.exe 2852 wmipsvtr.exe 2592 wmipsvtr.exe 2548 wmipsvtr.exe 2068 wmipsvtr.exe 1888 wmipsvtr.exe 1136 wmipsvtr.exe 3076 wmipsvtr.exe 3604 wmipsvtr.exe 1052 wmipsvtr.exe 1132 wmipsvtr.exe 1972 wmipsvtr.exe 3412 wmipsvtr.exe 4116 wmipsvtr.exe 4852 wmipsvtr.exe 2448 wmipsvtr.exe 2500 wmipsvtr.exe 3660 wmipsvtr.exe 2256 wmipsvtr.exe 2132 wmipsvtr.exe 4812 wmipsvtr.exe 936 wmipsvtr.exe 1220 wmipsvtr.exe 4296 wmipsvtr.exe 4468 wmipsvtr.exe 4012 wmipsvtr.exe 4864 wmipsvtr.exe 3176 wmipsvtr.exe 1496 wmipsvtr.exe 1700 wmipsvtr.exe 1808 wmipsvtr.exe 4572 wmipsvtr.exe 2988 wmipsvtr.exe 4948 wmipsvtr.exe -
Maps connected drives based on registry 3 TTPs 62 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsvtr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsvtr.exe -
Drops file in System32 directory 62 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File opened for modification C:\Windows\SysWOW64\wmipsvtr.exe bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe File created C:\Windows\SysWOW64\wmipsvtr.exe wmipsvtr.exe -
Suspicious use of SetThreadContext 32 IoCs
description pid Process procid_target PID 2608 set thread context of 3256 2608 bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe 84 PID 4496 set thread context of 2300 4496 wmipsvtr.exe 86 PID 3672 set thread context of 4236 3672 wmipsvtr.exe 93 PID 1804 set thread context of 3544 1804 wmipsvtr.exe 97 PID 4432 set thread context of 748 4432 wmipsvtr.exe 103 PID 1764 set thread context of 4788 1764 wmipsvtr.exe 105 PID 5064 set thread context of 2012 5064 wmipsvtr.exe 107 PID 4624 set thread context of 3612 4624 wmipsvtr.exe 111 PID 4388 set thread context of 3056 4388 wmipsvtr.exe 114 PID 3620 set thread context of 1908 3620 wmipsvtr.exe 116 PID 1096 set thread context of 1416 1096 wmipsvtr.exe 118 PID 3560 set thread context of 4660 3560 wmipsvtr.exe 120 PID 3088 set thread context of 264 3088 wmipsvtr.exe 122 PID 2536 set thread context of 2872 2536 wmipsvtr.exe 125 PID 4244 set thread context of 3748 4244 wmipsvtr.exe 127 PID 1380 set thread context of 2852 1380 wmipsvtr.exe 129 PID 2592 set thread context of 2548 2592 wmipsvtr.exe 131 PID 2068 set thread context of 1888 2068 wmipsvtr.exe 133 PID 1136 set thread context of 3076 1136 wmipsvtr.exe 135 PID 3604 set thread context of 1052 3604 wmipsvtr.exe 137 PID 1132 set thread context of 1972 1132 wmipsvtr.exe 139 PID 3412 set thread context of 4116 3412 wmipsvtr.exe 141 PID 4852 set thread context of 2448 4852 wmipsvtr.exe 143 PID 2500 set thread context of 3660 2500 wmipsvtr.exe 145 PID 2256 set thread context of 2132 2256 wmipsvtr.exe 147 PID 4812 set thread context of 936 4812 wmipsvtr.exe 149 PID 1220 set thread context of 4296 1220 wmipsvtr.exe 151 PID 4468 set thread context of 4012 4468 wmipsvtr.exe 153 PID 4864 set thread context of 3176 4864 wmipsvtr.exe 155 PID 1496 set thread context of 1700 1496 wmipsvtr.exe 157 PID 1808 set thread context of 4572 1808 wmipsvtr.exe 159 PID 2988 set thread context of 4948 2988 wmipsvtr.exe 161 -
resource yara_rule behavioral2/memory/3256-0-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/3256-2-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/3256-3-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/3256-4-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/3256-38-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/2300-43-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/2300-45-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/2300-44-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/2300-46-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/4236-54-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/3544-61-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/748-67-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/4788-75-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/2012-79-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/2012-80-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/2012-82-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/3612-89-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/3056-96-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/1908-103-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/1416-110-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/4660-117-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/264-126-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/2872-134-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/3748-143-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/2852-151-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/2548-160-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/1888-168-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/3076-177-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/1052-185-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/1972-194-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/4116-202-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/2448-210-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/3660-217-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/2132-223-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/936-229-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/4296-235-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/4012-241-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/3176-247-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/1700-253-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/4572-259-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 63 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsvtr.exe -
Modifies registry class 31 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsvtr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsvtr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsvtr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsvtr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsvtr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsvtr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsvtr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsvtr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsvtr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsvtr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsvtr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsvtr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsvtr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsvtr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsvtr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsvtr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsvtr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsvtr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsvtr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsvtr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsvtr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsvtr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsvtr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsvtr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsvtr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsvtr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsvtr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsvtr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsvtr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmipsvtr.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 3256 bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe 3256 bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe 2300 wmipsvtr.exe 2300 wmipsvtr.exe 4236 wmipsvtr.exe 4236 wmipsvtr.exe 3544 wmipsvtr.exe 3544 wmipsvtr.exe 748 wmipsvtr.exe 748 wmipsvtr.exe 4788 wmipsvtr.exe 4788 wmipsvtr.exe 2012 wmipsvtr.exe 2012 wmipsvtr.exe 3612 wmipsvtr.exe 3612 wmipsvtr.exe 3056 wmipsvtr.exe 3056 wmipsvtr.exe 1908 wmipsvtr.exe 1908 wmipsvtr.exe 1416 wmipsvtr.exe 1416 wmipsvtr.exe 4660 wmipsvtr.exe 4660 wmipsvtr.exe 264 wmipsvtr.exe 264 wmipsvtr.exe 2872 wmipsvtr.exe 2872 wmipsvtr.exe 3748 wmipsvtr.exe 3748 wmipsvtr.exe 2852 wmipsvtr.exe 2852 wmipsvtr.exe 2548 wmipsvtr.exe 2548 wmipsvtr.exe 1888 wmipsvtr.exe 1888 wmipsvtr.exe 3076 wmipsvtr.exe 3076 wmipsvtr.exe 1052 wmipsvtr.exe 1052 wmipsvtr.exe 1972 wmipsvtr.exe 1972 wmipsvtr.exe 4116 wmipsvtr.exe 4116 wmipsvtr.exe 2448 wmipsvtr.exe 2448 wmipsvtr.exe 3660 wmipsvtr.exe 3660 wmipsvtr.exe 2132 wmipsvtr.exe 2132 wmipsvtr.exe 936 wmipsvtr.exe 936 wmipsvtr.exe 4296 wmipsvtr.exe 4296 wmipsvtr.exe 4012 wmipsvtr.exe 4012 wmipsvtr.exe 3176 wmipsvtr.exe 3176 wmipsvtr.exe 1700 wmipsvtr.exe 1700 wmipsvtr.exe 4572 wmipsvtr.exe 4572 wmipsvtr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2608 wrote to memory of 3256 2608 bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe 84 PID 2608 wrote to memory of 3256 2608 bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe 84 PID 2608 wrote to memory of 3256 2608 bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe 84 PID 2608 wrote to memory of 3256 2608 bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe 84 PID 2608 wrote to memory of 3256 2608 bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe 84 PID 2608 wrote to memory of 3256 2608 bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe 84 PID 2608 wrote to memory of 3256 2608 bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe 84 PID 3256 wrote to memory of 4496 3256 bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe 85 PID 3256 wrote to memory of 4496 3256 bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe 85 PID 3256 wrote to memory of 4496 3256 bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe 85 PID 4496 wrote to memory of 2300 4496 wmipsvtr.exe 86 PID 4496 wrote to memory of 2300 4496 wmipsvtr.exe 86 PID 4496 wrote to memory of 2300 4496 wmipsvtr.exe 86 PID 4496 wrote to memory of 2300 4496 wmipsvtr.exe 86 PID 4496 wrote to memory of 2300 4496 wmipsvtr.exe 86 PID 4496 wrote to memory of 2300 4496 wmipsvtr.exe 86 PID 4496 wrote to memory of 2300 4496 wmipsvtr.exe 86 PID 2300 wrote to memory of 3672 2300 wmipsvtr.exe 89 PID 2300 wrote to memory of 3672 2300 wmipsvtr.exe 89 PID 2300 wrote to memory of 3672 2300 wmipsvtr.exe 89 PID 3672 wrote to memory of 4236 3672 wmipsvtr.exe 93 PID 3672 wrote to memory of 4236 3672 wmipsvtr.exe 93 PID 3672 wrote to memory of 4236 3672 wmipsvtr.exe 93 PID 3672 wrote to memory of 4236 3672 wmipsvtr.exe 93 PID 3672 wrote to memory of 4236 3672 wmipsvtr.exe 93 PID 3672 wrote to memory of 4236 3672 wmipsvtr.exe 93 PID 3672 wrote to memory of 4236 3672 wmipsvtr.exe 93 PID 4236 wrote to memory of 1804 4236 wmipsvtr.exe 96 PID 4236 wrote to memory of 1804 4236 wmipsvtr.exe 96 PID 4236 wrote to memory of 1804 4236 wmipsvtr.exe 96 PID 1804 wrote to memory of 3544 1804 wmipsvtr.exe 97 PID 1804 wrote to memory of 3544 1804 wmipsvtr.exe 97 PID 1804 wrote to memory of 3544 1804 wmipsvtr.exe 97 PID 1804 wrote to memory of 3544 1804 wmipsvtr.exe 97 PID 1804 wrote to memory of 3544 1804 wmipsvtr.exe 97 PID 1804 wrote to memory of 3544 1804 wmipsvtr.exe 97 PID 1804 wrote to memory of 3544 1804 wmipsvtr.exe 97 PID 3544 wrote to memory of 4432 3544 wmipsvtr.exe 102 PID 3544 wrote to memory of 4432 3544 wmipsvtr.exe 102 PID 3544 wrote to memory of 4432 3544 wmipsvtr.exe 102 PID 4432 wrote to memory of 748 4432 wmipsvtr.exe 103 PID 4432 wrote to memory of 748 4432 wmipsvtr.exe 103 PID 4432 wrote to memory of 748 4432 wmipsvtr.exe 103 PID 4432 wrote to memory of 748 4432 wmipsvtr.exe 103 PID 4432 wrote to memory of 748 4432 wmipsvtr.exe 103 PID 4432 wrote to memory of 748 4432 wmipsvtr.exe 103 PID 4432 wrote to memory of 748 4432 wmipsvtr.exe 103 PID 748 wrote to memory of 1764 748 wmipsvtr.exe 104 PID 748 wrote to memory of 1764 748 wmipsvtr.exe 104 PID 748 wrote to memory of 1764 748 wmipsvtr.exe 104 PID 1764 wrote to memory of 4788 1764 wmipsvtr.exe 105 PID 1764 wrote to memory of 4788 1764 wmipsvtr.exe 105 PID 1764 wrote to memory of 4788 1764 wmipsvtr.exe 105 PID 1764 wrote to memory of 4788 1764 wmipsvtr.exe 105 PID 1764 wrote to memory of 4788 1764 wmipsvtr.exe 105 PID 1764 wrote to memory of 4788 1764 wmipsvtr.exe 105 PID 1764 wrote to memory of 4788 1764 wmipsvtr.exe 105 PID 4788 wrote to memory of 5064 4788 wmipsvtr.exe 106 PID 4788 wrote to memory of 5064 4788 wmipsvtr.exe 106 PID 4788 wrote to memory of 5064 4788 wmipsvtr.exe 106 PID 5064 wrote to memory of 2012 5064 wmipsvtr.exe 107 PID 5064 wrote to memory of 2012 5064 wmipsvtr.exe 107 PID 5064 wrote to memory of 2012 5064 wmipsvtr.exe 107 PID 5064 wrote to memory of 2012 5064 wmipsvtr.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Users\Admin\AppData\Local\Temp\BFED00~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Users\Admin\AppData\Local\Temp\BFED00~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2012 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4624 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3612 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4388 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3056 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3620 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1908 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1096 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1416 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3560 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4660 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3088 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:264 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2536 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2872 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4244 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3748 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1380 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe32⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2852 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2592 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe34⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2548 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2068 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe36⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1888 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1136 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe38⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3076 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3604 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe40⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1052 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1132 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe42⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1972 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3412 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe44⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4116 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4852 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe46⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2448 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2500 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe48⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3660 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2256 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe50⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2132 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4812 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe52⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:936 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1220 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe54⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4296 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4468 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe56⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4012 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4864 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe58⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3176 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1496 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe60⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1700 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1808 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe62⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4572 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\system32\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2988 -
C:\Windows\SysWOW64\wmipsvtr.exe"C:\Windows\SysWOW64\wmipsvtr.exe" C:\Windows\SysWOW64\wmipsvtr.exe64⤵
- Executes dropped EXE
PID:4948
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
149KB
MD5bfed004f981bc216bdd584e9202c8b6e
SHA1d241adfba8f01e1326bfc1dda33da842bba4636c
SHA2566da9079d6bcc6e40fceb8513b32235b2ff6b462a32739c02fbe7844665cff1f5
SHA512f71fc3517e0af8619350a8479a77334a1d849e9ad4e3eb41765e15394d78280f54de9f6e6be629cf7a620fb03275837faf17925890a8a62f87db074e60efd05b