Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 18:17
Static task
static1
Behavioral task
behavioral1
Sample
c8dd59bf73522b33879f3cce5f828e57_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c8dd59bf73522b33879f3cce5f828e57_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
c8dd59bf73522b33879f3cce5f828e57_JaffaCakes118.exe
-
Size
148KB
-
MD5
c8dd59bf73522b33879f3cce5f828e57
-
SHA1
8c222824892af3e65d5f1592b184cefd381edb0b
-
SHA256
eda35a3e0bfcc40a8bf7346284b7abc4e32c0bd5f9132c92a41255923e1c794b
-
SHA512
c08e9d79b2b8c85f6adb0d83303c1b14ca47b3ba40c2a0545e919e5d4085e26bc91a413e36bc84ea7b38c5591047237b4a2598b89dda57b61d3edd2eebbdd8ee
-
SSDEEP
3072:e9zPtsX9MmgRfE33SufwpxhcRPFZK7pIC23TbZ31M1CGt0soMz:HXSlRfEnTMxhzpx2jvM/MU
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2736 wnpdx3.exe -
Executes dropped EXE 50 IoCs
pid Process 2908 wnpdx3.exe 2736 wnpdx3.exe 2676 wnpdx3.exe 2924 wnpdx3.exe 2128 wnpdx3.exe 1032 wnpdx3.exe 1036 wnpdx3.exe 492 wnpdx3.exe 1300 wnpdx3.exe 476 wnpdx3.exe 576 wnpdx3.exe 1828 wnpdx3.exe 1548 wnpdx3.exe 2132 wnpdx3.exe 1568 wnpdx3.exe 1584 wnpdx3.exe 2544 wnpdx3.exe 2404 wnpdx3.exe 888 wnpdx3.exe 2072 wnpdx3.exe 2200 wnpdx3.exe 2832 wnpdx3.exe 2720 wnpdx3.exe 2000 wnpdx3.exe 2328 wnpdx3.exe 2276 wnpdx3.exe 1680 wnpdx3.exe 2848 wnpdx3.exe 1328 wnpdx3.exe 1476 wnpdx3.exe 532 wnpdx3.exe 3052 wnpdx3.exe 3060 wnpdx3.exe 2008 wnpdx3.exe 2044 wnpdx3.exe 1756 wnpdx3.exe 956 wnpdx3.exe 1540 wnpdx3.exe 1952 wnpdx3.exe 1712 wnpdx3.exe 2080 wnpdx3.exe 2376 wnpdx3.exe 2936 wnpdx3.exe 2224 wnpdx3.exe 2752 wnpdx3.exe 2824 wnpdx3.exe 2780 wnpdx3.exe 2632 wnpdx3.exe 2768 wnpdx3.exe 2344 wnpdx3.exe -
Loads dropped DLL 51 IoCs
pid Process 2784 c8dd59bf73522b33879f3cce5f828e57_JaffaCakes118.exe 2784 c8dd59bf73522b33879f3cce5f828e57_JaffaCakes118.exe 2908 wnpdx3.exe 2736 wnpdx3.exe 2736 wnpdx3.exe 2924 wnpdx3.exe 2924 wnpdx3.exe 1032 wnpdx3.exe 1032 wnpdx3.exe 492 wnpdx3.exe 492 wnpdx3.exe 476 wnpdx3.exe 476 wnpdx3.exe 1828 wnpdx3.exe 1828 wnpdx3.exe 2132 wnpdx3.exe 2132 wnpdx3.exe 1584 wnpdx3.exe 1584 wnpdx3.exe 2404 wnpdx3.exe 2404 wnpdx3.exe 2072 wnpdx3.exe 2072 wnpdx3.exe 2832 wnpdx3.exe 2832 wnpdx3.exe 2000 wnpdx3.exe 2000 wnpdx3.exe 2276 wnpdx3.exe 2276 wnpdx3.exe 2848 wnpdx3.exe 2848 wnpdx3.exe 1476 wnpdx3.exe 1476 wnpdx3.exe 3052 wnpdx3.exe 3052 wnpdx3.exe 2008 wnpdx3.exe 2008 wnpdx3.exe 1756 wnpdx3.exe 1756 wnpdx3.exe 1540 wnpdx3.exe 1540 wnpdx3.exe 1712 wnpdx3.exe 1712 wnpdx3.exe 2376 wnpdx3.exe 2376 wnpdx3.exe 2224 wnpdx3.exe 2224 wnpdx3.exe 2824 wnpdx3.exe 2824 wnpdx3.exe 2632 wnpdx3.exe 2632 wnpdx3.exe -
Maps connected drives based on registry 3 TTPs 52 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum c8dd59bf73522b33879f3cce5f828e57_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 c8dd59bf73522b33879f3cce5f828e57_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpdx3.exe -
Drops file in System32 directory 50 IoCs
description ioc Process File created C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File opened for modification C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File opened for modification C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File opened for modification C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File created C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File opened for modification C:\Windows\SysWOW64\wnpdx3.exe c8dd59bf73522b33879f3cce5f828e57_JaffaCakes118.exe File created C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File created C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File opened for modification C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File created C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File created C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File opened for modification C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File opened for modification C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File opened for modification C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File opened for modification C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File opened for modification C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File opened for modification C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File created C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File created C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File created C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File created C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File opened for modification C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File created C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File opened for modification C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File created C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File created C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File opened for modification C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File opened for modification C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File created C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File created C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File opened for modification C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File created C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File opened for modification C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File opened for modification C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File created C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File created C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File opened for modification C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File created C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File opened for modification C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File created C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File opened for modification C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File created C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File created C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File created C:\Windows\SysWOW64\wnpdx3.exe c8dd59bf73522b33879f3cce5f828e57_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File opened for modification C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File opened for modification C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File opened for modification C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File created C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe File created C:\Windows\SysWOW64\wnpdx3.exe wnpdx3.exe -
Suspicious use of SetThreadContext 26 IoCs
description pid Process procid_target PID 2256 set thread context of 2784 2256 c8dd59bf73522b33879f3cce5f828e57_JaffaCakes118.exe 30 PID 2908 set thread context of 2736 2908 wnpdx3.exe 32 PID 2676 set thread context of 2924 2676 wnpdx3.exe 34 PID 2128 set thread context of 1032 2128 wnpdx3.exe 36 PID 1036 set thread context of 492 1036 wnpdx3.exe 39 PID 1300 set thread context of 476 1300 wnpdx3.exe 41 PID 576 set thread context of 1828 576 wnpdx3.exe 43 PID 1548 set thread context of 2132 1548 wnpdx3.exe 45 PID 1568 set thread context of 1584 1568 wnpdx3.exe 47 PID 2544 set thread context of 2404 2544 wnpdx3.exe 49 PID 888 set thread context of 2072 888 wnpdx3.exe 51 PID 2200 set thread context of 2832 2200 wnpdx3.exe 53 PID 2720 set thread context of 2000 2720 wnpdx3.exe 55 PID 2328 set thread context of 2276 2328 wnpdx3.exe 57 PID 1680 set thread context of 2848 1680 wnpdx3.exe 59 PID 1328 set thread context of 1476 1328 wnpdx3.exe 61 PID 532 set thread context of 3052 532 wnpdx3.exe 63 PID 3060 set thread context of 2008 3060 wnpdx3.exe 65 PID 2044 set thread context of 1756 2044 wnpdx3.exe 67 PID 956 set thread context of 1540 956 wnpdx3.exe 69 PID 1952 set thread context of 1712 1952 wnpdx3.exe 71 PID 2080 set thread context of 2376 2080 wnpdx3.exe 73 PID 2936 set thread context of 2224 2936 wnpdx3.exe 75 PID 2752 set thread context of 2824 2752 wnpdx3.exe 77 PID 2780 set thread context of 2632 2780 wnpdx3.exe 79 PID 2768 set thread context of 2344 2768 wnpdx3.exe 81 -
resource yara_rule behavioral1/memory/2784-4-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2784-3-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2784-9-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2784-8-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2784-7-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2784-2-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2784-22-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2736-35-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2736-34-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2736-33-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2736-40-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2924-52-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2924-59-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1032-70-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1032-69-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1032-68-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1032-76-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/492-92-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/476-109-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1828-118-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1828-126-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2132-143-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1584-159-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2404-175-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2072-191-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2832-208-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2000-223-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2276-238-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2848-250-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1476-262-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/3052-274-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2008-286-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1756-298-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1540-310-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1712-322-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2376-334-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2224-346-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2824-358-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2632-370-0x0000000000400000-0x0000000000458000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 51 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8dd59bf73522b33879f3cce5f828e57_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8dd59bf73522b33879f3cce5f828e57_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpdx3.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 2784 c8dd59bf73522b33879f3cce5f828e57_JaffaCakes118.exe 2736 wnpdx3.exe 2924 wnpdx3.exe 1032 wnpdx3.exe 492 wnpdx3.exe 476 wnpdx3.exe 1828 wnpdx3.exe 2132 wnpdx3.exe 1584 wnpdx3.exe 2404 wnpdx3.exe 2072 wnpdx3.exe 2832 wnpdx3.exe 2000 wnpdx3.exe 2276 wnpdx3.exe 2848 wnpdx3.exe 1476 wnpdx3.exe 3052 wnpdx3.exe 2008 wnpdx3.exe 1756 wnpdx3.exe 1540 wnpdx3.exe 1712 wnpdx3.exe 2376 wnpdx3.exe 2224 wnpdx3.exe 2824 wnpdx3.exe 2632 wnpdx3.exe 2344 wnpdx3.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2784 2256 c8dd59bf73522b33879f3cce5f828e57_JaffaCakes118.exe 30 PID 2256 wrote to memory of 2784 2256 c8dd59bf73522b33879f3cce5f828e57_JaffaCakes118.exe 30 PID 2256 wrote to memory of 2784 2256 c8dd59bf73522b33879f3cce5f828e57_JaffaCakes118.exe 30 PID 2256 wrote to memory of 2784 2256 c8dd59bf73522b33879f3cce5f828e57_JaffaCakes118.exe 30 PID 2256 wrote to memory of 2784 2256 c8dd59bf73522b33879f3cce5f828e57_JaffaCakes118.exe 30 PID 2256 wrote to memory of 2784 2256 c8dd59bf73522b33879f3cce5f828e57_JaffaCakes118.exe 30 PID 2256 wrote to memory of 2784 2256 c8dd59bf73522b33879f3cce5f828e57_JaffaCakes118.exe 30 PID 2784 wrote to memory of 2908 2784 c8dd59bf73522b33879f3cce5f828e57_JaffaCakes118.exe 31 PID 2784 wrote to memory of 2908 2784 c8dd59bf73522b33879f3cce5f828e57_JaffaCakes118.exe 31 PID 2784 wrote to memory of 2908 2784 c8dd59bf73522b33879f3cce5f828e57_JaffaCakes118.exe 31 PID 2784 wrote to memory of 2908 2784 c8dd59bf73522b33879f3cce5f828e57_JaffaCakes118.exe 31 PID 2908 wrote to memory of 2736 2908 wnpdx3.exe 32 PID 2908 wrote to memory of 2736 2908 wnpdx3.exe 32 PID 2908 wrote to memory of 2736 2908 wnpdx3.exe 32 PID 2908 wrote to memory of 2736 2908 wnpdx3.exe 32 PID 2908 wrote to memory of 2736 2908 wnpdx3.exe 32 PID 2908 wrote to memory of 2736 2908 wnpdx3.exe 32 PID 2908 wrote to memory of 2736 2908 wnpdx3.exe 32 PID 2736 wrote to memory of 2676 2736 wnpdx3.exe 33 PID 2736 wrote to memory of 2676 2736 wnpdx3.exe 33 PID 2736 wrote to memory of 2676 2736 wnpdx3.exe 33 PID 2736 wrote to memory of 2676 2736 wnpdx3.exe 33 PID 2676 wrote to memory of 2924 2676 wnpdx3.exe 34 PID 2676 wrote to memory of 2924 2676 wnpdx3.exe 34 PID 2676 wrote to memory of 2924 2676 wnpdx3.exe 34 PID 2676 wrote to memory of 2924 2676 wnpdx3.exe 34 PID 2676 wrote to memory of 2924 2676 wnpdx3.exe 34 PID 2676 wrote to memory of 2924 2676 wnpdx3.exe 34 PID 2676 wrote to memory of 2924 2676 wnpdx3.exe 34 PID 2924 wrote to memory of 2128 2924 wnpdx3.exe 35 PID 2924 wrote to memory of 2128 2924 wnpdx3.exe 35 PID 2924 wrote to memory of 2128 2924 wnpdx3.exe 35 PID 2924 wrote to memory of 2128 2924 wnpdx3.exe 35 PID 2128 wrote to memory of 1032 2128 wnpdx3.exe 36 PID 2128 wrote to memory of 1032 2128 wnpdx3.exe 36 PID 2128 wrote to memory of 1032 2128 wnpdx3.exe 36 PID 2128 wrote to memory of 1032 2128 wnpdx3.exe 36 PID 2128 wrote to memory of 1032 2128 wnpdx3.exe 36 PID 2128 wrote to memory of 1032 2128 wnpdx3.exe 36 PID 2128 wrote to memory of 1032 2128 wnpdx3.exe 36 PID 1032 wrote to memory of 1036 1032 wnpdx3.exe 38 PID 1032 wrote to memory of 1036 1032 wnpdx3.exe 38 PID 1032 wrote to memory of 1036 1032 wnpdx3.exe 38 PID 1032 wrote to memory of 1036 1032 wnpdx3.exe 38 PID 1036 wrote to memory of 492 1036 wnpdx3.exe 39 PID 1036 wrote to memory of 492 1036 wnpdx3.exe 39 PID 1036 wrote to memory of 492 1036 wnpdx3.exe 39 PID 1036 wrote to memory of 492 1036 wnpdx3.exe 39 PID 1036 wrote to memory of 492 1036 wnpdx3.exe 39 PID 1036 wrote to memory of 492 1036 wnpdx3.exe 39 PID 1036 wrote to memory of 492 1036 wnpdx3.exe 39 PID 492 wrote to memory of 1300 492 wnpdx3.exe 40 PID 492 wrote to memory of 1300 492 wnpdx3.exe 40 PID 492 wrote to memory of 1300 492 wnpdx3.exe 40 PID 492 wrote to memory of 1300 492 wnpdx3.exe 40 PID 1300 wrote to memory of 476 1300 wnpdx3.exe 41 PID 1300 wrote to memory of 476 1300 wnpdx3.exe 41 PID 1300 wrote to memory of 476 1300 wnpdx3.exe 41 PID 1300 wrote to memory of 476 1300 wnpdx3.exe 41 PID 1300 wrote to memory of 476 1300 wnpdx3.exe 41 PID 1300 wrote to memory of 476 1300 wnpdx3.exe 41 PID 1300 wrote to memory of 476 1300 wnpdx3.exe 41 PID 476 wrote to memory of 576 476 wnpdx3.exe 42 PID 476 wrote to memory of 576 476 wnpdx3.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8dd59bf73522b33879f3cce5f828e57_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c8dd59bf73522b33879f3cce5f828e57_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\c8dd59bf73522b33879f3cce5f828e57_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c8dd59bf73522b33879f3cce5f828e57_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Users\Admin\AppData\Local\Temp\C8DD59~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Users\Admin\AppData\Local\Temp\C8DD59~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:492 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:476 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:576 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1828 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1548 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2132 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1568 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1584 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2544 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2404 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:888 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2072 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2200 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2832 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2720 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2000 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2328 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2276 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1680 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2848 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1328 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1476 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:532 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe34⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3052 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3060 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe36⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2008 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2044 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe38⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1756 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:956 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe40⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1540 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1952 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe42⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1712 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2080 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe44⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2376 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2936 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe46⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2224 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2752 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe48⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2824 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2780 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe50⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2632 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2768 -
C:\Windows\SysWOW64\wnpdx3.exe"C:\Windows\system32\wnpdx3.exe" C:\Windows\SysWOW64\wnpdx3.exe52⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:2344
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD5c8dd59bf73522b33879f3cce5f828e57
SHA18c222824892af3e65d5f1592b184cefd381edb0b
SHA256eda35a3e0bfcc40a8bf7346284b7abc4e32c0bd5f9132c92a41255923e1c794b
SHA512c08e9d79b2b8c85f6adb0d83303c1b14ca47b3ba40c2a0545e919e5d4085e26bc91a413e36bc84ea7b38c5591047237b4a2598b89dda57b61d3edd2eebbdd8ee