Analysis
-
max time kernel
149s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
07-12-2024 09:26
Static task
static1
Behavioral task
behavioral1
Sample
d1b8900805471d9d106ccf8651bbf8ad_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d1b8900805471d9d106ccf8651bbf8ad_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
d1b8900805471d9d106ccf8651bbf8ad_JaffaCakes118.exe
-
Size
149KB
-
MD5
d1b8900805471d9d106ccf8651bbf8ad
-
SHA1
acf8b4c425d0db4e52c9833003dc29cc74a583bf
-
SHA256
f350e00e97d748de5e1595792cc07c99407627072cca7fe8bd978dd16239e3a9
-
SHA512
e22e89e897fb7f777b4636e8b14029a75a66e741e8dc8728fe43897719ec06711cc6a5ceef8b82ccae096b0b537381d18a2567fc59aabfeac0a8777bca73176a
-
SSDEEP
3072:9CVkpg1OuoltBjPtwkDPkp+0maXtu5yv70Lec7cL3SUZrK373o:9QsflDjtwQMVtuk70Le1S2ao
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2944 wmisrmgi.exe -
Executes dropped EXE 60 IoCs
pid Process 2192 wmisrmgi.exe 2944 wmisrmgi.exe 2788 wmisrmgi.exe 2652 wmisrmgi.exe 1428 wmisrmgi.exe 1144 wmisrmgi.exe 568 wmisrmgi.exe 2880 wmisrmgi.exe 1596 wmisrmgi.exe 2828 wmisrmgi.exe 588 wmisrmgi.exe 2204 wmisrmgi.exe 2608 wmisrmgi.exe 2120 wmisrmgi.exe 496 wmisrmgi.exe 696 wmisrmgi.exe 2248 wmisrmgi.exe 1712 wmisrmgi.exe 1952 wmisrmgi.exe 352 wmisrmgi.exe 2296 wmisrmgi.exe 484 wmisrmgi.exe 2948 wmisrmgi.exe 2760 wmisrmgi.exe 2856 wmisrmgi.exe 2716 wmisrmgi.exe 1428 wmisrmgi.exe 592 wmisrmgi.exe 1348 wmisrmgi.exe 1276 wmisrmgi.exe 2976 wmisrmgi.exe 1840 wmisrmgi.exe 1720 wmisrmgi.exe 348 wmisrmgi.exe 2196 wmisrmgi.exe 2032 wmisrmgi.exe 1044 wmisrmgi.exe 892 wmisrmgi.exe 1492 wmisrmgi.exe 2288 wmisrmgi.exe 1368 wmisrmgi.exe 1976 wmisrmgi.exe 2016 wmisrmgi.exe 1980 wmisrmgi.exe 2840 wmisrmgi.exe 2780 wmisrmgi.exe 2948 wmisrmgi.exe 2680 wmisrmgi.exe 2664 wmisrmgi.exe 2772 wmisrmgi.exe 2024 wmisrmgi.exe 2712 wmisrmgi.exe 2812 wmisrmgi.exe 1944 wmisrmgi.exe 568 wmisrmgi.exe 1932 wmisrmgi.exe 1848 wmisrmgi.exe 1728 wmisrmgi.exe 1648 wmisrmgi.exe 2356 wmisrmgi.exe -
Loads dropped DLL 61 IoCs
pid Process 2328 d1b8900805471d9d106ccf8651bbf8ad_JaffaCakes118.exe 2328 d1b8900805471d9d106ccf8651bbf8ad_JaffaCakes118.exe 2192 wmisrmgi.exe 2944 wmisrmgi.exe 2944 wmisrmgi.exe 2652 wmisrmgi.exe 2652 wmisrmgi.exe 1144 wmisrmgi.exe 1144 wmisrmgi.exe 2880 wmisrmgi.exe 2880 wmisrmgi.exe 2828 wmisrmgi.exe 2828 wmisrmgi.exe 2204 wmisrmgi.exe 2204 wmisrmgi.exe 2120 wmisrmgi.exe 2120 wmisrmgi.exe 696 wmisrmgi.exe 696 wmisrmgi.exe 1712 wmisrmgi.exe 1712 wmisrmgi.exe 352 wmisrmgi.exe 352 wmisrmgi.exe 484 wmisrmgi.exe 484 wmisrmgi.exe 2760 wmisrmgi.exe 2760 wmisrmgi.exe 2716 wmisrmgi.exe 2716 wmisrmgi.exe 592 wmisrmgi.exe 592 wmisrmgi.exe 1276 wmisrmgi.exe 1276 wmisrmgi.exe 1840 wmisrmgi.exe 1840 wmisrmgi.exe 348 wmisrmgi.exe 348 wmisrmgi.exe 2032 wmisrmgi.exe 2032 wmisrmgi.exe 892 wmisrmgi.exe 892 wmisrmgi.exe 2288 wmisrmgi.exe 2288 wmisrmgi.exe 1976 wmisrmgi.exe 1976 wmisrmgi.exe 1980 wmisrmgi.exe 1980 wmisrmgi.exe 2780 wmisrmgi.exe 2780 wmisrmgi.exe 2680 wmisrmgi.exe 2680 wmisrmgi.exe 2772 wmisrmgi.exe 2772 wmisrmgi.exe 2712 wmisrmgi.exe 2712 wmisrmgi.exe 1944 wmisrmgi.exe 1944 wmisrmgi.exe 1932 wmisrmgi.exe 1932 wmisrmgi.exe 1728 wmisrmgi.exe 1728 wmisrmgi.exe -
Maps connected drives based on registry 3 TTPs 62 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum d1b8900805471d9d106ccf8651bbf8ad_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmisrmgi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmisrmgi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmisrmgi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmisrmgi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmisrmgi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmisrmgi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmisrmgi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmisrmgi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmisrmgi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmisrmgi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmisrmgi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmisrmgi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmisrmgi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmisrmgi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmisrmgi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmisrmgi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmisrmgi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmisrmgi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmisrmgi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmisrmgi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmisrmgi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmisrmgi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmisrmgi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 d1b8900805471d9d106ccf8651bbf8ad_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmisrmgi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmisrmgi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmisrmgi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmisrmgi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmisrmgi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmisrmgi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmisrmgi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmisrmgi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmisrmgi.exe -
Drops file in System32 directory 60 IoCs
description ioc Process File created C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File created C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File created C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File created C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File created C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File opened for modification C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File created C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File created C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File opened for modification C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File created C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File created C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File created C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File opened for modification C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File created C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File created C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File created C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File created C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File opened for modification C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File created C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File opened for modification C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File opened for modification C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File created C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File opened for modification C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File created C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File opened for modification C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File opened for modification C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File created C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File opened for modification C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File opened for modification C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File created C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File opened for modification C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File created C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File opened for modification C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File opened for modification C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File opened for modification C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File created C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File opened for modification C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File opened for modification C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File opened for modification C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File opened for modification C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File opened for modification C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File opened for modification C:\Windows\SysWOW64\wmisrmgi.exe d1b8900805471d9d106ccf8651bbf8ad_JaffaCakes118.exe File created C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File opened for modification C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File created C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File created C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File opened for modification C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File created C:\Windows\SysWOW64\wmisrmgi.exe d1b8900805471d9d106ccf8651bbf8ad_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File created C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File opened for modification C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File opened for modification C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File created C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File created C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File opened for modification C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File opened for modification C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File opened for modification C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File opened for modification C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File created C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe File created C:\Windows\SysWOW64\wmisrmgi.exe wmisrmgi.exe -
Suspicious use of SetThreadContext 31 IoCs
description pid Process procid_target PID 2296 set thread context of 2328 2296 d1b8900805471d9d106ccf8651bbf8ad_JaffaCakes118.exe 30 PID 2192 set thread context of 2944 2192 wmisrmgi.exe 32 PID 2788 set thread context of 2652 2788 wmisrmgi.exe 34 PID 1428 set thread context of 1144 1428 wmisrmgi.exe 36 PID 568 set thread context of 2880 568 wmisrmgi.exe 38 PID 1596 set thread context of 2828 1596 wmisrmgi.exe 40 PID 588 set thread context of 2204 588 wmisrmgi.exe 42 PID 2608 set thread context of 2120 2608 wmisrmgi.exe 44 PID 496 set thread context of 696 496 wmisrmgi.exe 46 PID 2248 set thread context of 1712 2248 wmisrmgi.exe 48 PID 1952 set thread context of 352 1952 wmisrmgi.exe 50 PID 2296 set thread context of 484 2296 wmisrmgi.exe 52 PID 2948 set thread context of 2760 2948 wmisrmgi.exe 54 PID 2856 set thread context of 2716 2856 wmisrmgi.exe 56 PID 1428 set thread context of 592 1428 wmisrmgi.exe 58 PID 1348 set thread context of 1276 1348 wmisrmgi.exe 60 PID 2976 set thread context of 1840 2976 wmisrmgi.exe 62 PID 1720 set thread context of 348 1720 wmisrmgi.exe 64 PID 2196 set thread context of 2032 2196 wmisrmgi.exe 66 PID 1044 set thread context of 892 1044 wmisrmgi.exe 68 PID 1492 set thread context of 2288 1492 wmisrmgi.exe 70 PID 1368 set thread context of 1976 1368 wmisrmgi.exe 72 PID 2016 set thread context of 1980 2016 wmisrmgi.exe 74 PID 2840 set thread context of 2780 2840 wmisrmgi.exe 76 PID 2948 set thread context of 2680 2948 wmisrmgi.exe 78 PID 2664 set thread context of 2772 2664 wmisrmgi.exe 80 PID 2024 set thread context of 2712 2024 wmisrmgi.exe 82 PID 2812 set thread context of 1944 2812 wmisrmgi.exe 84 PID 568 set thread context of 1932 568 wmisrmgi.exe 86 PID 1848 set thread context of 1728 1848 wmisrmgi.exe 88 PID 1648 set thread context of 2356 1648 wmisrmgi.exe 90 -
resource yara_rule behavioral1/memory/2328-4-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2328-7-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2328-3-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2328-2-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2328-8-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2328-9-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2328-22-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2944-33-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2944-35-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2944-34-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2944-41-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2652-52-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2652-58-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1144-68-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1144-75-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2880-84-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2880-85-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2880-86-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2880-92-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2828-102-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2828-103-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2828-109-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2204-119-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2204-126-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2120-136-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2120-143-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/696-153-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/696-161-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1712-171-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1712-178-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/352-189-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/352-196-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/484-206-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/484-213-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2760-223-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2760-230-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2716-241-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2716-246-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/592-255-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/592-259-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1276-268-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1276-272-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1840-281-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1840-285-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/348-294-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/348-298-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2032-307-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2032-311-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/892-320-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/892-324-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2288-334-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2288-337-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1976-346-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1976-350-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1980-359-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1980-363-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2780-372-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2780-376-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2680-385-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2680-389-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2772-398-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2772-402-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2712-412-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2712-415-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 61 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d1b8900805471d9d106ccf8651bbf8ad_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d1b8900805471d9d106ccf8651bbf8ad_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrmgi.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2328 d1b8900805471d9d106ccf8651bbf8ad_JaffaCakes118.exe 2944 wmisrmgi.exe 2652 wmisrmgi.exe 1144 wmisrmgi.exe 2880 wmisrmgi.exe 2828 wmisrmgi.exe 2204 wmisrmgi.exe 2120 wmisrmgi.exe 696 wmisrmgi.exe 1712 wmisrmgi.exe 352 wmisrmgi.exe 484 wmisrmgi.exe 2760 wmisrmgi.exe 2716 wmisrmgi.exe 592 wmisrmgi.exe 1276 wmisrmgi.exe 1840 wmisrmgi.exe 348 wmisrmgi.exe 2032 wmisrmgi.exe 892 wmisrmgi.exe 2288 wmisrmgi.exe 1976 wmisrmgi.exe 1980 wmisrmgi.exe 2780 wmisrmgi.exe 2680 wmisrmgi.exe 2772 wmisrmgi.exe 2712 wmisrmgi.exe 1944 wmisrmgi.exe 1932 wmisrmgi.exe 1728 wmisrmgi.exe 2356 wmisrmgi.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2328 2296 d1b8900805471d9d106ccf8651bbf8ad_JaffaCakes118.exe 30 PID 2296 wrote to memory of 2328 2296 d1b8900805471d9d106ccf8651bbf8ad_JaffaCakes118.exe 30 PID 2296 wrote to memory of 2328 2296 d1b8900805471d9d106ccf8651bbf8ad_JaffaCakes118.exe 30 PID 2296 wrote to memory of 2328 2296 d1b8900805471d9d106ccf8651bbf8ad_JaffaCakes118.exe 30 PID 2296 wrote to memory of 2328 2296 d1b8900805471d9d106ccf8651bbf8ad_JaffaCakes118.exe 30 PID 2296 wrote to memory of 2328 2296 d1b8900805471d9d106ccf8651bbf8ad_JaffaCakes118.exe 30 PID 2296 wrote to memory of 2328 2296 d1b8900805471d9d106ccf8651bbf8ad_JaffaCakes118.exe 30 PID 2328 wrote to memory of 2192 2328 d1b8900805471d9d106ccf8651bbf8ad_JaffaCakes118.exe 31 PID 2328 wrote to memory of 2192 2328 d1b8900805471d9d106ccf8651bbf8ad_JaffaCakes118.exe 31 PID 2328 wrote to memory of 2192 2328 d1b8900805471d9d106ccf8651bbf8ad_JaffaCakes118.exe 31 PID 2328 wrote to memory of 2192 2328 d1b8900805471d9d106ccf8651bbf8ad_JaffaCakes118.exe 31 PID 2192 wrote to memory of 2944 2192 wmisrmgi.exe 32 PID 2192 wrote to memory of 2944 2192 wmisrmgi.exe 32 PID 2192 wrote to memory of 2944 2192 wmisrmgi.exe 32 PID 2192 wrote to memory of 2944 2192 wmisrmgi.exe 32 PID 2192 wrote to memory of 2944 2192 wmisrmgi.exe 32 PID 2192 wrote to memory of 2944 2192 wmisrmgi.exe 32 PID 2192 wrote to memory of 2944 2192 wmisrmgi.exe 32 PID 2944 wrote to memory of 2788 2944 wmisrmgi.exe 33 PID 2944 wrote to memory of 2788 2944 wmisrmgi.exe 33 PID 2944 wrote to memory of 2788 2944 wmisrmgi.exe 33 PID 2944 wrote to memory of 2788 2944 wmisrmgi.exe 33 PID 2788 wrote to memory of 2652 2788 wmisrmgi.exe 34 PID 2788 wrote to memory of 2652 2788 wmisrmgi.exe 34 PID 2788 wrote to memory of 2652 2788 wmisrmgi.exe 34 PID 2788 wrote to memory of 2652 2788 wmisrmgi.exe 34 PID 2788 wrote to memory of 2652 2788 wmisrmgi.exe 34 PID 2788 wrote to memory of 2652 2788 wmisrmgi.exe 34 PID 2788 wrote to memory of 2652 2788 wmisrmgi.exe 34 PID 2652 wrote to memory of 1428 2652 wmisrmgi.exe 35 PID 2652 wrote to memory of 1428 2652 wmisrmgi.exe 35 PID 2652 wrote to memory of 1428 2652 wmisrmgi.exe 35 PID 2652 wrote to memory of 1428 2652 wmisrmgi.exe 35 PID 1428 wrote to memory of 1144 1428 wmisrmgi.exe 36 PID 1428 wrote to memory of 1144 1428 wmisrmgi.exe 36 PID 1428 wrote to memory of 1144 1428 wmisrmgi.exe 36 PID 1428 wrote to memory of 1144 1428 wmisrmgi.exe 36 PID 1428 wrote to memory of 1144 1428 wmisrmgi.exe 36 PID 1428 wrote to memory of 1144 1428 wmisrmgi.exe 36 PID 1428 wrote to memory of 1144 1428 wmisrmgi.exe 36 PID 1144 wrote to memory of 568 1144 wmisrmgi.exe 37 PID 1144 wrote to memory of 568 1144 wmisrmgi.exe 37 PID 1144 wrote to memory of 568 1144 wmisrmgi.exe 37 PID 1144 wrote to memory of 568 1144 wmisrmgi.exe 37 PID 568 wrote to memory of 2880 568 wmisrmgi.exe 38 PID 568 wrote to memory of 2880 568 wmisrmgi.exe 38 PID 568 wrote to memory of 2880 568 wmisrmgi.exe 38 PID 568 wrote to memory of 2880 568 wmisrmgi.exe 38 PID 568 wrote to memory of 2880 568 wmisrmgi.exe 38 PID 568 wrote to memory of 2880 568 wmisrmgi.exe 38 PID 568 wrote to memory of 2880 568 wmisrmgi.exe 38 PID 2880 wrote to memory of 1596 2880 wmisrmgi.exe 39 PID 2880 wrote to memory of 1596 2880 wmisrmgi.exe 39 PID 2880 wrote to memory of 1596 2880 wmisrmgi.exe 39 PID 2880 wrote to memory of 1596 2880 wmisrmgi.exe 39 PID 1596 wrote to memory of 2828 1596 wmisrmgi.exe 40 PID 1596 wrote to memory of 2828 1596 wmisrmgi.exe 40 PID 1596 wrote to memory of 2828 1596 wmisrmgi.exe 40 PID 1596 wrote to memory of 2828 1596 wmisrmgi.exe 40 PID 1596 wrote to memory of 2828 1596 wmisrmgi.exe 40 PID 1596 wrote to memory of 2828 1596 wmisrmgi.exe 40 PID 1596 wrote to memory of 2828 1596 wmisrmgi.exe 40 PID 2828 wrote to memory of 588 2828 wmisrmgi.exe 41 PID 2828 wrote to memory of 588 2828 wmisrmgi.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1b8900805471d9d106ccf8651bbf8ad_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d1b8900805471d9d106ccf8651bbf8ad_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\d1b8900805471d9d106ccf8651bbf8ad_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d1b8900805471d9d106ccf8651bbf8ad_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\system32\wmisrmgi.exe" C:\Users\Admin\AppData\Local\Temp\D1B890~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\SysWOW64\wmisrmgi.exe" C:\Users\Admin\AppData\Local\Temp\D1B890~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\system32\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\SysWOW64\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\system32\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\SysWOW64\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\system32\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\SysWOW64\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\system32\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\SysWOW64\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\system32\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:588 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\SysWOW64\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2204 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\system32\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2608 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\SysWOW64\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2120 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\system32\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:496 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\SysWOW64\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:696 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\system32\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2248 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\SysWOW64\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1712 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\system32\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1952 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\SysWOW64\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:352 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\system32\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2296 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\SysWOW64\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:484 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\system32\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2948 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\SysWOW64\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2760 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\system32\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2856 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\SysWOW64\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2716 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\system32\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1428 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\SysWOW64\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:592 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\system32\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1348 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\SysWOW64\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1276 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\system32\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2976 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\SysWOW64\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe34⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1840 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\system32\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1720 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\SysWOW64\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe36⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:348 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\system32\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2196 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\SysWOW64\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe38⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2032 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\system32\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1044 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\SysWOW64\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe40⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:892 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\system32\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1492 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\SysWOW64\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe42⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2288 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\system32\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1368 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\SysWOW64\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe44⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1976 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\system32\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2016 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\SysWOW64\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe46⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1980 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\system32\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2840 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\SysWOW64\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe48⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2780 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\system32\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2948 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\SysWOW64\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe50⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2680 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\system32\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2664 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\SysWOW64\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe52⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2772 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\system32\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2024 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\SysWOW64\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe54⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2712 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\system32\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2812 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\SysWOW64\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe56⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1944 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\system32\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:568 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\SysWOW64\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe58⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1932 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\system32\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1848 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\SysWOW64\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe60⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1728 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\system32\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1648 -
C:\Windows\SysWOW64\wmisrmgi.exe"C:\Windows\SysWOW64\wmisrmgi.exe" C:\Windows\SysWOW64\wmisrmgi.exe62⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:2356
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
149KB
MD5d1b8900805471d9d106ccf8651bbf8ad
SHA1acf8b4c425d0db4e52c9833003dc29cc74a583bf
SHA256f350e00e97d748de5e1595792cc07c99407627072cca7fe8bd978dd16239e3a9
SHA512e22e89e897fb7f777b4636e8b14029a75a66e741e8dc8728fe43897719ec06711cc6a5ceef8b82ccae096b0b537381d18a2567fc59aabfeac0a8777bca73176a