Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
09-12-2024 21:48
Static task
static1
Behavioral task
behavioral1
Sample
dbb207f2e80c2dfed39597a40539bd9b_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
dbb207f2e80c2dfed39597a40539bd9b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
dbb207f2e80c2dfed39597a40539bd9b_JaffaCakes118.exe
-
Size
140KB
-
MD5
dbb207f2e80c2dfed39597a40539bd9b
-
SHA1
1409ec7f6a72e167c2353a5800cf1d47eceef7d0
-
SHA256
c5b4a36ebdb894e55eb1a0ce991ea8e4e72d86d0945977b892831d7d96d358e9
-
SHA512
a50aa1af17fc47b8fef2100207c20a3ad65e689430b76b8f4646c7021306d7c86d86a24307a999b66f252a954a912addd676375d0d778393e063a5fce77ed310
-
SSDEEP
3072:sYKGtWxuFs4Hx+vQBPjP6JAhHaD3y6PEEVAkPNJX7fqg1:aG8x67xDBPL6J2HaDbJ71
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2036 wnpxv2.exe -
Executes dropped EXE 50 IoCs
pid Process 1420 wnpxv2.exe 2036 wnpxv2.exe 2700 wnpxv2.exe 2688 wnpxv2.exe 2504 wnpxv2.exe 2232 wnpxv2.exe 1376 wnpxv2.exe 2840 wnpxv2.exe 1904 wnpxv2.exe 468 wnpxv2.exe 1260 wnpxv2.exe 2108 wnpxv2.exe 552 wnpxv2.exe 696 wnpxv2.exe 1136 wnpxv2.exe 660 wnpxv2.exe 1616 wnpxv2.exe 984 wnpxv2.exe 884 wnpxv2.exe 336 wnpxv2.exe 2944 wnpxv2.exe 1888 wnpxv2.exe 2564 wnpxv2.exe 2560 wnpxv2.exe 2928 wnpxv2.exe 2660 wnpxv2.exe 2436 wnpxv2.exe 1492 wnpxv2.exe 2996 wnpxv2.exe 1780 wnpxv2.exe 1940 wnpxv2.exe 1904 wnpxv2.exe 2200 wnpxv2.exe 1260 wnpxv2.exe 748 wnpxv2.exe 552 wnpxv2.exe 1208 wnpxv2.exe 692 wnpxv2.exe 2280 wnpxv2.exe 296 wnpxv2.exe 884 wnpxv2.exe 1708 wnpxv2.exe 2388 wnpxv2.exe 1984 wnpxv2.exe 1420 wnpxv2.exe 2400 wnpxv2.exe 2808 wnpxv2.exe 1092 wnpxv2.exe 1936 wnpxv2.exe 2788 wnpxv2.exe -
Loads dropped DLL 26 IoCs
pid Process 2340 dbb207f2e80c2dfed39597a40539bd9b_JaffaCakes118.exe 1420 wnpxv2.exe 2036 wnpxv2.exe 2688 wnpxv2.exe 2232 wnpxv2.exe 2840 wnpxv2.exe 468 wnpxv2.exe 2108 wnpxv2.exe 696 wnpxv2.exe 660 wnpxv2.exe 984 wnpxv2.exe 336 wnpxv2.exe 1888 wnpxv2.exe 2560 wnpxv2.exe 2660 wnpxv2.exe 1492 wnpxv2.exe 1780 wnpxv2.exe 1904 wnpxv2.exe 1260 wnpxv2.exe 552 wnpxv2.exe 692 wnpxv2.exe 296 wnpxv2.exe 1708 wnpxv2.exe 1984 wnpxv2.exe 2400 wnpxv2.exe 1092 wnpxv2.exe -
Maps connected drives based on registry 3 TTPs 52 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxv2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxv2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum dbb207f2e80c2dfed39597a40539bd9b_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 dbb207f2e80c2dfed39597a40539bd9b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxv2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxv2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxv2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxv2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxv2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxv2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxv2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxv2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxv2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxv2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxv2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxv2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxv2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxv2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxv2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxv2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxv2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxv2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxv2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxv2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxv2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxv2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnpxv2.exe -
Drops file in System32 directory 50 IoCs
description ioc Process File created C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File opened for modification C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File opened for modification C:\Windows\SysWOW64\wnpxv2.exe dbb207f2e80c2dfed39597a40539bd9b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File opened for modification C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File opened for modification C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File opened for modification C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File opened for modification C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File opened for modification C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File created C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File created C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File created C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File created C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File created C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File opened for modification C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File created C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File opened for modification C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File opened for modification C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File created C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File created C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File created C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File opened for modification C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File created C:\Windows\SysWOW64\wnpxv2.exe dbb207f2e80c2dfed39597a40539bd9b_JaffaCakes118.exe File created C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File created C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File created C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File opened for modification C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File opened for modification C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File opened for modification C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File opened for modification C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File opened for modification C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File created C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File opened for modification C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File created C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File created C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File opened for modification C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File created C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File created C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File opened for modification C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File opened for modification C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File created C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File created C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File opened for modification C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File created C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File opened for modification C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File created C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File created C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File opened for modification C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File created C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe File opened for modification C:\Windows\SysWOW64\wnpxv2.exe wnpxv2.exe -
Suspicious use of SetThreadContext 26 IoCs
description pid Process procid_target PID 2592 set thread context of 2340 2592 dbb207f2e80c2dfed39597a40539bd9b_JaffaCakes118.exe 30 PID 1420 set thread context of 2036 1420 wnpxv2.exe 32 PID 2700 set thread context of 2688 2700 wnpxv2.exe 35 PID 2504 set thread context of 2232 2504 wnpxv2.exe 37 PID 1376 set thread context of 2840 1376 wnpxv2.exe 39 PID 1904 set thread context of 468 1904 wnpxv2.exe 41 PID 1260 set thread context of 2108 1260 wnpxv2.exe 43 PID 552 set thread context of 696 552 wnpxv2.exe 45 PID 1136 set thread context of 660 1136 wnpxv2.exe 47 PID 1616 set thread context of 984 1616 wnpxv2.exe 49 PID 884 set thread context of 336 884 wnpxv2.exe 51 PID 2944 set thread context of 1888 2944 wnpxv2.exe 53 PID 2564 set thread context of 2560 2564 wnpxv2.exe 55 PID 2928 set thread context of 2660 2928 wnpxv2.exe 57 PID 2436 set thread context of 1492 2436 wnpxv2.exe 59 PID 2996 set thread context of 1780 2996 wnpxv2.exe 61 PID 1940 set thread context of 1904 1940 wnpxv2.exe 63 PID 2200 set thread context of 1260 2200 wnpxv2.exe 65 PID 748 set thread context of 552 748 wnpxv2.exe 67 PID 1208 set thread context of 692 1208 wnpxv2.exe 69 PID 2280 set thread context of 296 2280 wnpxv2.exe 71 PID 884 set thread context of 1708 884 wnpxv2.exe 73 PID 2388 set thread context of 1984 2388 wnpxv2.exe 75 PID 1420 set thread context of 2400 1420 wnpxv2.exe 77 PID 2808 set thread context of 1092 2808 wnpxv2.exe 79 PID 1936 set thread context of 2788 1936 wnpxv2.exe 81 -
resource yara_rule behavioral1/memory/2340-4-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2340-7-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2340-6-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2340-3-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2340-2-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2340-8-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2340-9-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2340-19-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2036-31-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2036-30-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2036-32-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2036-37-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2688-47-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2688-48-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2688-46-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2688-53-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2232-63-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2232-70-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2840-79-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2840-87-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/468-97-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/468-96-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/468-102-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2108-112-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2108-119-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/696-129-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/696-135-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/660-151-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/984-166-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/336-182-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1888-197-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2560-213-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2660-228-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1492-243-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1780-259-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1904-274-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1260-288-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/552-297-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/552-301-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/692-310-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/692-314-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/296-326-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1708-338-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1984-346-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1984-351-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2400-363-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1092-375-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2788-384-0x0000000000400000-0x000000000046C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 51 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbb207f2e80c2dfed39597a40539bd9b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbb207f2e80c2dfed39597a40539bd9b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpxv2.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 2340 dbb207f2e80c2dfed39597a40539bd9b_JaffaCakes118.exe 2036 wnpxv2.exe 2688 wnpxv2.exe 2232 wnpxv2.exe 2840 wnpxv2.exe 468 wnpxv2.exe 2108 wnpxv2.exe 696 wnpxv2.exe 660 wnpxv2.exe 984 wnpxv2.exe 336 wnpxv2.exe 1888 wnpxv2.exe 2560 wnpxv2.exe 2660 wnpxv2.exe 1492 wnpxv2.exe 1780 wnpxv2.exe 1904 wnpxv2.exe 1260 wnpxv2.exe 552 wnpxv2.exe 692 wnpxv2.exe 296 wnpxv2.exe 1708 wnpxv2.exe 1984 wnpxv2.exe 2400 wnpxv2.exe 1092 wnpxv2.exe 2788 wnpxv2.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2592 wrote to memory of 2340 2592 dbb207f2e80c2dfed39597a40539bd9b_JaffaCakes118.exe 30 PID 2592 wrote to memory of 2340 2592 dbb207f2e80c2dfed39597a40539bd9b_JaffaCakes118.exe 30 PID 2592 wrote to memory of 2340 2592 dbb207f2e80c2dfed39597a40539bd9b_JaffaCakes118.exe 30 PID 2592 wrote to memory of 2340 2592 dbb207f2e80c2dfed39597a40539bd9b_JaffaCakes118.exe 30 PID 2592 wrote to memory of 2340 2592 dbb207f2e80c2dfed39597a40539bd9b_JaffaCakes118.exe 30 PID 2592 wrote to memory of 2340 2592 dbb207f2e80c2dfed39597a40539bd9b_JaffaCakes118.exe 30 PID 2592 wrote to memory of 2340 2592 dbb207f2e80c2dfed39597a40539bd9b_JaffaCakes118.exe 30 PID 2340 wrote to memory of 1420 2340 dbb207f2e80c2dfed39597a40539bd9b_JaffaCakes118.exe 31 PID 2340 wrote to memory of 1420 2340 dbb207f2e80c2dfed39597a40539bd9b_JaffaCakes118.exe 31 PID 2340 wrote to memory of 1420 2340 dbb207f2e80c2dfed39597a40539bd9b_JaffaCakes118.exe 31 PID 2340 wrote to memory of 1420 2340 dbb207f2e80c2dfed39597a40539bd9b_JaffaCakes118.exe 31 PID 1420 wrote to memory of 2036 1420 wnpxv2.exe 32 PID 1420 wrote to memory of 2036 1420 wnpxv2.exe 32 PID 1420 wrote to memory of 2036 1420 wnpxv2.exe 32 PID 1420 wrote to memory of 2036 1420 wnpxv2.exe 32 PID 1420 wrote to memory of 2036 1420 wnpxv2.exe 32 PID 1420 wrote to memory of 2036 1420 wnpxv2.exe 32 PID 1420 wrote to memory of 2036 1420 wnpxv2.exe 32 PID 2036 wrote to memory of 2700 2036 wnpxv2.exe 34 PID 2036 wrote to memory of 2700 2036 wnpxv2.exe 34 PID 2036 wrote to memory of 2700 2036 wnpxv2.exe 34 PID 2036 wrote to memory of 2700 2036 wnpxv2.exe 34 PID 2700 wrote to memory of 2688 2700 wnpxv2.exe 35 PID 2700 wrote to memory of 2688 2700 wnpxv2.exe 35 PID 2700 wrote to memory of 2688 2700 wnpxv2.exe 35 PID 2700 wrote to memory of 2688 2700 wnpxv2.exe 35 PID 2700 wrote to memory of 2688 2700 wnpxv2.exe 35 PID 2700 wrote to memory of 2688 2700 wnpxv2.exe 35 PID 2700 wrote to memory of 2688 2700 wnpxv2.exe 35 PID 2688 wrote to memory of 2504 2688 wnpxv2.exe 36 PID 2688 wrote to memory of 2504 2688 wnpxv2.exe 36 PID 2688 wrote to memory of 2504 2688 wnpxv2.exe 36 PID 2688 wrote to memory of 2504 2688 wnpxv2.exe 36 PID 2504 wrote to memory of 2232 2504 wnpxv2.exe 37 PID 2504 wrote to memory of 2232 2504 wnpxv2.exe 37 PID 2504 wrote to memory of 2232 2504 wnpxv2.exe 37 PID 2504 wrote to memory of 2232 2504 wnpxv2.exe 37 PID 2504 wrote to memory of 2232 2504 wnpxv2.exe 37 PID 2504 wrote to memory of 2232 2504 wnpxv2.exe 37 PID 2504 wrote to memory of 2232 2504 wnpxv2.exe 37 PID 2232 wrote to memory of 1376 2232 wnpxv2.exe 38 PID 2232 wrote to memory of 1376 2232 wnpxv2.exe 38 PID 2232 wrote to memory of 1376 2232 wnpxv2.exe 38 PID 2232 wrote to memory of 1376 2232 wnpxv2.exe 38 PID 1376 wrote to memory of 2840 1376 wnpxv2.exe 39 PID 1376 wrote to memory of 2840 1376 wnpxv2.exe 39 PID 1376 wrote to memory of 2840 1376 wnpxv2.exe 39 PID 1376 wrote to memory of 2840 1376 wnpxv2.exe 39 PID 1376 wrote to memory of 2840 1376 wnpxv2.exe 39 PID 1376 wrote to memory of 2840 1376 wnpxv2.exe 39 PID 1376 wrote to memory of 2840 1376 wnpxv2.exe 39 PID 2840 wrote to memory of 1904 2840 wnpxv2.exe 40 PID 2840 wrote to memory of 1904 2840 wnpxv2.exe 40 PID 2840 wrote to memory of 1904 2840 wnpxv2.exe 40 PID 2840 wrote to memory of 1904 2840 wnpxv2.exe 40 PID 1904 wrote to memory of 468 1904 wnpxv2.exe 41 PID 1904 wrote to memory of 468 1904 wnpxv2.exe 41 PID 1904 wrote to memory of 468 1904 wnpxv2.exe 41 PID 1904 wrote to memory of 468 1904 wnpxv2.exe 41 PID 1904 wrote to memory of 468 1904 wnpxv2.exe 41 PID 1904 wrote to memory of 468 1904 wnpxv2.exe 41 PID 1904 wrote to memory of 468 1904 wnpxv2.exe 41 PID 468 wrote to memory of 1260 468 wnpxv2.exe 42 PID 468 wrote to memory of 1260 468 wnpxv2.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\dbb207f2e80c2dfed39597a40539bd9b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dbb207f2e80c2dfed39597a40539bd9b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\dbb207f2e80c2dfed39597a40539bd9b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dbb207f2e80c2dfed39597a40539bd9b_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Users\Admin\AppData\Local\Temp\DBB207~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Users\Admin\AppData\Local\Temp\DBB207~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1260 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2108 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:552 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:696 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1136 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:660 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1616 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:984 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:884 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:336 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2944 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1888 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2564 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2560 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2928 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2660 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2436 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1492 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2996 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1780 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1940 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe34⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1904 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2200 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe36⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1260 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:748 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe38⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:552 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1208 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe40⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:692 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2280 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe42⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:296 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:884 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe44⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1708 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2388 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe46⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1984 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1420 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe48⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2400 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2808 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe50⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1092 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1936 -
C:\Windows\SysWOW64\wnpxv2.exe"C:\Windows\system32\wnpxv2.exe" C:\Windows\SysWOW64\wnpxv2.exe52⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:2788
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD5dbb207f2e80c2dfed39597a40539bd9b
SHA11409ec7f6a72e167c2353a5800cf1d47eceef7d0
SHA256c5b4a36ebdb894e55eb1a0ce991ea8e4e72d86d0945977b892831d7d96d358e9
SHA512a50aa1af17fc47b8fef2100207c20a3ad65e689430b76b8f4646c7021306d7c86d86a24307a999b66f252a954a912addd676375d0d778393e063a5fce77ed310