Analysis
-
max time kernel
150s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 22:11
Static task
static1
Behavioral task
behavioral1
Sample
e371adb18df9145d3b5bbd448b81652e_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e371adb18df9145d3b5bbd448b81652e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e371adb18df9145d3b5bbd448b81652e_JaffaCakes118.exe
-
Size
218KB
-
MD5
e371adb18df9145d3b5bbd448b81652e
-
SHA1
aed7868ba4d7e24bdbad1ebc962a0e928dbf5b0c
-
SHA256
0a3c6293b62269a81da4019ad258365b7b5751ccd592e89c4031d031088ffc08
-
SHA512
77994a5b7f9939dbc3f777f0cbc8f36cc681bd2bbdfed889595e97a654a66db6e22a2ead233059b9434d75713876a83260555bd88dac312e7733859724db7c4a
-
SSDEEP
6144:WZQ7/xRY2m4UDnwbFOX53FtrlGnrHDEbQ0+DKVz8fI25XQIWSV://xRDm4UzCFOX53eI3+DKZ/tSV
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2744 wmplfv.exe -
Executes dropped EXE 18 IoCs
pid Process 2744 wmplfv.exe 2360 wmplfv.exe 324 wmplfv.exe 2428 wmplfv.exe 584 wmplfv.exe 1780 wmplfv.exe 3048 wmplfv.exe 2844 wmplfv.exe 2576 wmplfv.exe 1380 wmplfv.exe 1756 wmplfv.exe 1824 wmplfv.exe 2780 wmplfv.exe 2696 wmplfv.exe 2220 wmplfv.exe 1668 wmplfv.exe 1900 wmplfv.exe 1524 wmplfv.exe -
Loads dropped DLL 36 IoCs
pid Process 2596 e371adb18df9145d3b5bbd448b81652e_JaffaCakes118.exe 2596 e371adb18df9145d3b5bbd448b81652e_JaffaCakes118.exe 2744 wmplfv.exe 2744 wmplfv.exe 2360 wmplfv.exe 2360 wmplfv.exe 324 wmplfv.exe 324 wmplfv.exe 2428 wmplfv.exe 2428 wmplfv.exe 584 wmplfv.exe 584 wmplfv.exe 1780 wmplfv.exe 1780 wmplfv.exe 3048 wmplfv.exe 3048 wmplfv.exe 2844 wmplfv.exe 2844 wmplfv.exe 2576 wmplfv.exe 2576 wmplfv.exe 1380 wmplfv.exe 1380 wmplfv.exe 1756 wmplfv.exe 1756 wmplfv.exe 1824 wmplfv.exe 1824 wmplfv.exe 2780 wmplfv.exe 2780 wmplfv.exe 2696 wmplfv.exe 2696 wmplfv.exe 2220 wmplfv.exe 2220 wmplfv.exe 1668 wmplfv.exe 1668 wmplfv.exe 1900 wmplfv.exe 1900 wmplfv.exe -
Maps connected drives based on registry 3 TTPs 38 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmplfv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmplfv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmplfv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 e371adb18df9145d3b5bbd448b81652e_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmplfv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmplfv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmplfv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmplfv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmplfv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmplfv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmplfv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmplfv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmplfv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmplfv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmplfv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmplfv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum e371adb18df9145d3b5bbd448b81652e_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmplfv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmplfv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmplfv.exe -
Drops file in System32 directory 34 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File opened for modification C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File created C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File created C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File opened for modification C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File created C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File created C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File created C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File opened for modification C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File created C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File created C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File created C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File opened for modification C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File opened for modification C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File created C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File opened for modification C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File created C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File opened for modification C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File opened for modification C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File created C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File opened for modification C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File opened for modification C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File opened for modification C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File created C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File created C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File opened for modification C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File opened for modification C:\Windows\SysWOW64\wmplfv.exe e371adb18df9145d3b5bbd448b81652e_JaffaCakes118.exe File created C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File created C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File created C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File created C:\Windows\SysWOW64\wmplfv.exe e371adb18df9145d3b5bbd448b81652e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File opened for modification C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File opened for modification C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 18 IoCs
pid Process 2596 e371adb18df9145d3b5bbd448b81652e_JaffaCakes118.exe 2744 wmplfv.exe 2360 wmplfv.exe 324 wmplfv.exe 2428 wmplfv.exe 584 wmplfv.exe 3048 wmplfv.exe 2844 wmplfv.exe 2576 wmplfv.exe 1380 wmplfv.exe 1756 wmplfv.exe 1824 wmplfv.exe 2780 wmplfv.exe 2696 wmplfv.exe 2220 wmplfv.exe 1668 wmplfv.exe 1900 wmplfv.exe 1524 wmplfv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e371adb18df9145d3b5bbd448b81652e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplfv.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2596 e371adb18df9145d3b5bbd448b81652e_JaffaCakes118.exe 2744 wmplfv.exe 2360 wmplfv.exe 324 wmplfv.exe 2428 wmplfv.exe 584 wmplfv.exe 3048 wmplfv.exe 2844 wmplfv.exe 2576 wmplfv.exe 1380 wmplfv.exe 1756 wmplfv.exe 1824 wmplfv.exe 2780 wmplfv.exe 2696 wmplfv.exe 2220 wmplfv.exe 1668 wmplfv.exe 1900 wmplfv.exe 1524 wmplfv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2596 wrote to memory of 2744 2596 e371adb18df9145d3b5bbd448b81652e_JaffaCakes118.exe 29 PID 2596 wrote to memory of 2744 2596 e371adb18df9145d3b5bbd448b81652e_JaffaCakes118.exe 29 PID 2596 wrote to memory of 2744 2596 e371adb18df9145d3b5bbd448b81652e_JaffaCakes118.exe 29 PID 2596 wrote to memory of 2744 2596 e371adb18df9145d3b5bbd448b81652e_JaffaCakes118.exe 29 PID 2744 wrote to memory of 2360 2744 wmplfv.exe 30 PID 2744 wrote to memory of 2360 2744 wmplfv.exe 30 PID 2744 wrote to memory of 2360 2744 wmplfv.exe 30 PID 2744 wrote to memory of 2360 2744 wmplfv.exe 30 PID 2360 wrote to memory of 324 2360 wmplfv.exe 31 PID 2360 wrote to memory of 324 2360 wmplfv.exe 31 PID 2360 wrote to memory of 324 2360 wmplfv.exe 31 PID 2360 wrote to memory of 324 2360 wmplfv.exe 31 PID 324 wrote to memory of 2428 324 wmplfv.exe 32 PID 324 wrote to memory of 2428 324 wmplfv.exe 32 PID 324 wrote to memory of 2428 324 wmplfv.exe 32 PID 324 wrote to memory of 2428 324 wmplfv.exe 32 PID 2428 wrote to memory of 584 2428 wmplfv.exe 33 PID 2428 wrote to memory of 584 2428 wmplfv.exe 33 PID 2428 wrote to memory of 584 2428 wmplfv.exe 33 PID 2428 wrote to memory of 584 2428 wmplfv.exe 33 PID 584 wrote to memory of 1780 584 wmplfv.exe 34 PID 584 wrote to memory of 1780 584 wmplfv.exe 34 PID 584 wrote to memory of 1780 584 wmplfv.exe 34 PID 584 wrote to memory of 1780 584 wmplfv.exe 34 PID 3048 wrote to memory of 2844 3048 wmplfv.exe 36 PID 3048 wrote to memory of 2844 3048 wmplfv.exe 36 PID 3048 wrote to memory of 2844 3048 wmplfv.exe 36 PID 3048 wrote to memory of 2844 3048 wmplfv.exe 36 PID 2844 wrote to memory of 2576 2844 wmplfv.exe 37 PID 2844 wrote to memory of 2576 2844 wmplfv.exe 37 PID 2844 wrote to memory of 2576 2844 wmplfv.exe 37 PID 2844 wrote to memory of 2576 2844 wmplfv.exe 37 PID 2576 wrote to memory of 1380 2576 wmplfv.exe 38 PID 2576 wrote to memory of 1380 2576 wmplfv.exe 38 PID 2576 wrote to memory of 1380 2576 wmplfv.exe 38 PID 2576 wrote to memory of 1380 2576 wmplfv.exe 38 PID 1380 wrote to memory of 1756 1380 wmplfv.exe 39 PID 1380 wrote to memory of 1756 1380 wmplfv.exe 39 PID 1380 wrote to memory of 1756 1380 wmplfv.exe 39 PID 1380 wrote to memory of 1756 1380 wmplfv.exe 39 PID 1756 wrote to memory of 1824 1756 wmplfv.exe 40 PID 1756 wrote to memory of 1824 1756 wmplfv.exe 40 PID 1756 wrote to memory of 1824 1756 wmplfv.exe 40 PID 1756 wrote to memory of 1824 1756 wmplfv.exe 40 PID 1824 wrote to memory of 2780 1824 wmplfv.exe 41 PID 1824 wrote to memory of 2780 1824 wmplfv.exe 41 PID 1824 wrote to memory of 2780 1824 wmplfv.exe 41 PID 1824 wrote to memory of 2780 1824 wmplfv.exe 41 PID 2780 wrote to memory of 2696 2780 wmplfv.exe 42 PID 2780 wrote to memory of 2696 2780 wmplfv.exe 42 PID 2780 wrote to memory of 2696 2780 wmplfv.exe 42 PID 2780 wrote to memory of 2696 2780 wmplfv.exe 42 PID 2696 wrote to memory of 2220 2696 wmplfv.exe 43 PID 2696 wrote to memory of 2220 2696 wmplfv.exe 43 PID 2696 wrote to memory of 2220 2696 wmplfv.exe 43 PID 2696 wrote to memory of 2220 2696 wmplfv.exe 43 PID 2220 wrote to memory of 1668 2220 wmplfv.exe 44 PID 2220 wrote to memory of 1668 2220 wmplfv.exe 44 PID 2220 wrote to memory of 1668 2220 wmplfv.exe 44 PID 2220 wrote to memory of 1668 2220 wmplfv.exe 44 PID 1668 wrote to memory of 1900 1668 wmplfv.exe 45 PID 1668 wrote to memory of 1900 1668 wmplfv.exe 45 PID 1668 wrote to memory of 1900 1668 wmplfv.exe 45 PID 1668 wrote to memory of 1900 1668 wmplfv.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\e371adb18df9145d3b5bbd448b81652e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e371adb18df9145d3b5bbd448b81652e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\wmplfv.exe"C:\Windows\system32\wmplfv.exe" C:\Users\Admin\AppData\Local\Temp\E371AD~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\wmplfv.exe"C:\Windows\system32\wmplfv.exe" C:\Windows\SysWOW64\wmplfv.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\wmplfv.exe"C:\Windows\system32\wmplfv.exe" C:\Windows\SysWOW64\wmplfv.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Windows\SysWOW64\wmplfv.exe"C:\Windows\system32\wmplfv.exe" C:\Windows\SysWOW64\wmplfv.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\wmplfv.exe"C:\Windows\system32\wmplfv.exe" C:\Windows\SysWOW64\wmplfv.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Windows\SysWOW64\wmplfv.exe"C:\Windows\system32\wmplfv.exe" C:\Windows\SysWOW64\wmplfv.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1780 -
C:\Windows\SysWOW64\wmplfv.exe"C:\Windows\system32\wmplfv.exe" C:\Windows\SysWOW64\wmplfv.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\wmplfv.exe"C:\Windows\system32\wmplfv.exe" C:\Windows\SysWOW64\wmplfv.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\wmplfv.exe"C:\Windows\system32\wmplfv.exe" C:\Windows\SysWOW64\wmplfv.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\wmplfv.exe"C:\Windows\system32\wmplfv.exe" C:\Windows\SysWOW64\wmplfv.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\wmplfv.exe"C:\Windows\system32\wmplfv.exe" C:\Windows\SysWOW64\wmplfv.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\wmplfv.exe"C:\Windows\system32\wmplfv.exe" C:\Windows\SysWOW64\wmplfv.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\wmplfv.exe"C:\Windows\system32\wmplfv.exe" C:\Windows\SysWOW64\wmplfv.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\wmplfv.exe"C:\Windows\system32\wmplfv.exe" C:\Windows\SysWOW64\wmplfv.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\wmplfv.exe"C:\Windows\system32\wmplfv.exe" C:\Windows\SysWOW64\wmplfv.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\wmplfv.exe"C:\Windows\system32\wmplfv.exe" C:\Windows\SysWOW64\wmplfv.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\wmplfv.exe"C:\Windows\system32\wmplfv.exe" C:\Windows\SysWOW64\wmplfv.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1900 -
C:\Windows\SysWOW64\wmplfv.exe"C:\Windows\system32\wmplfv.exe" C:\Windows\SysWOW64\wmplfv.exe19⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1524
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
218KB
MD5e371adb18df9145d3b5bbd448b81652e
SHA1aed7868ba4d7e24bdbad1ebc962a0e928dbf5b0c
SHA2560a3c6293b62269a81da4019ad258365b7b5751ccd592e89c4031d031088ffc08
SHA51277994a5b7f9939dbc3f777f0cbc8f36cc681bd2bbdfed889595e97a654a66db6e22a2ead233059b9434d75713876a83260555bd88dac312e7733859724db7c4a