Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/12/2024, 22:11
Static task
static1
Behavioral task
behavioral1
Sample
e371adb18df9145d3b5bbd448b81652e_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e371adb18df9145d3b5bbd448b81652e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e371adb18df9145d3b5bbd448b81652e_JaffaCakes118.exe
-
Size
218KB
-
MD5
e371adb18df9145d3b5bbd448b81652e
-
SHA1
aed7868ba4d7e24bdbad1ebc962a0e928dbf5b0c
-
SHA256
0a3c6293b62269a81da4019ad258365b7b5751ccd592e89c4031d031088ffc08
-
SHA512
77994a5b7f9939dbc3f777f0cbc8f36cc681bd2bbdfed889595e97a654a66db6e22a2ead233059b9434d75713876a83260555bd88dac312e7733859724db7c4a
-
SSDEEP
6144:WZQ7/xRY2m4UDnwbFOX53FtrlGnrHDEbQ0+DKVz8fI25XQIWSV://xRDm4UzCFOX53eI3+DKZ/tSV
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 18 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmplfv.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmplfv.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmplfv.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation e371adb18df9145d3b5bbd448b81652e_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmplfv.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmplfv.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmplfv.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmplfv.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmplfv.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmplfv.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmplfv.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmplfv.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmplfv.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmplfv.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmplfv.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmplfv.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmplfv.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation wmplfv.exe -
Deletes itself 1 IoCs
pid Process 1836 wmplfv.exe -
Executes dropped EXE 18 IoCs
pid Process 1836 wmplfv.exe 4244 wmplfv.exe 1224 wmplfv.exe 1384 wmplfv.exe 2100 wmplfv.exe 5028 wmplfv.exe 4556 wmplfv.exe 3556 wmplfv.exe 4500 wmplfv.exe 4516 wmplfv.exe 4784 wmplfv.exe 896 wmplfv.exe 3512 wmplfv.exe 3972 wmplfv.exe 3672 wmplfv.exe 1352 wmplfv.exe 4700 wmplfv.exe 4328 wmplfv.exe -
Maps connected drives based on registry 3 TTPs 38 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmplfv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 e371adb18df9145d3b5bbd448b81652e_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmplfv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmplfv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmplfv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmplfv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum e371adb18df9145d3b5bbd448b81652e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmplfv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmplfv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmplfv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmplfv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmplfv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmplfv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmplfv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmplfv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmplfv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmplfv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmplfv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmplfv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmplfv.exe -
Drops file in System32 directory 36 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File opened for modification C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File opened for modification C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File opened for modification C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File created C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File opened for modification C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File opened for modification C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File opened for modification C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File created C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File created C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File created C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File opened for modification C:\Windows\SysWOW64\wmplfv.exe e371adb18df9145d3b5bbd448b81652e_JaffaCakes118.exe File created C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File created C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File opened for modification C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File created C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File opened for modification C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File opened for modification C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File created C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File opened for modification C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File opened for modification C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File created C:\Windows\SysWOW64\wmplfv.exe e371adb18df9145d3b5bbd448b81652e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File opened for modification C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File created C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File opened for modification C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File created C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File created C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File created C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File created C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File opened for modification C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File created C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File opened for modification C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File created C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File created C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe File created C:\Windows\SysWOW64\wmplfv.exe wmplfv.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 19 IoCs
pid Process 244 e371adb18df9145d3b5bbd448b81652e_JaffaCakes118.exe 1836 wmplfv.exe 4244 wmplfv.exe 1224 wmplfv.exe 1384 wmplfv.exe 2100 wmplfv.exe 5028 wmplfv.exe 4556 wmplfv.exe 3556 wmplfv.exe 4500 wmplfv.exe 4516 wmplfv.exe 4784 wmplfv.exe 896 wmplfv.exe 3512 wmplfv.exe 3972 wmplfv.exe 3672 wmplfv.exe 1352 wmplfv.exe 4700 wmplfv.exe 4328 wmplfv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e371adb18df9145d3b5bbd448b81652e_JaffaCakes118.exe -
Modifies registry class 18 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmplfv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmplfv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmplfv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmplfv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmplfv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmplfv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmplfv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmplfv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmplfv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmplfv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmplfv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmplfv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmplfv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmplfv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmplfv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ e371adb18df9145d3b5bbd448b81652e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmplfv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmplfv.exe -
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 244 e371adb18df9145d3b5bbd448b81652e_JaffaCakes118.exe 244 e371adb18df9145d3b5bbd448b81652e_JaffaCakes118.exe 1836 wmplfv.exe 1836 wmplfv.exe 4244 wmplfv.exe 4244 wmplfv.exe 1224 wmplfv.exe 1224 wmplfv.exe 1384 wmplfv.exe 1384 wmplfv.exe 2100 wmplfv.exe 2100 wmplfv.exe 5028 wmplfv.exe 5028 wmplfv.exe 4556 wmplfv.exe 4556 wmplfv.exe 3556 wmplfv.exe 3556 wmplfv.exe 4500 wmplfv.exe 4500 wmplfv.exe 4516 wmplfv.exe 4516 wmplfv.exe 4784 wmplfv.exe 4784 wmplfv.exe 896 wmplfv.exe 896 wmplfv.exe 3512 wmplfv.exe 3512 wmplfv.exe 3972 wmplfv.exe 3972 wmplfv.exe 3672 wmplfv.exe 3672 wmplfv.exe 1352 wmplfv.exe 1352 wmplfv.exe 4700 wmplfv.exe 4700 wmplfv.exe 4328 wmplfv.exe 4328 wmplfv.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 244 wrote to memory of 1836 244 e371adb18df9145d3b5bbd448b81652e_JaffaCakes118.exe 83 PID 244 wrote to memory of 1836 244 e371adb18df9145d3b5bbd448b81652e_JaffaCakes118.exe 83 PID 244 wrote to memory of 1836 244 e371adb18df9145d3b5bbd448b81652e_JaffaCakes118.exe 83 PID 1836 wrote to memory of 4244 1836 wmplfv.exe 93 PID 1836 wrote to memory of 4244 1836 wmplfv.exe 93 PID 1836 wrote to memory of 4244 1836 wmplfv.exe 93 PID 4244 wrote to memory of 1224 4244 wmplfv.exe 98 PID 4244 wrote to memory of 1224 4244 wmplfv.exe 98 PID 4244 wrote to memory of 1224 4244 wmplfv.exe 98 PID 1224 wrote to memory of 1384 1224 wmplfv.exe 101 PID 1224 wrote to memory of 1384 1224 wmplfv.exe 101 PID 1224 wrote to memory of 1384 1224 wmplfv.exe 101 PID 1384 wrote to memory of 2100 1384 wmplfv.exe 103 PID 1384 wrote to memory of 2100 1384 wmplfv.exe 103 PID 1384 wrote to memory of 2100 1384 wmplfv.exe 103 PID 2100 wrote to memory of 5028 2100 wmplfv.exe 104 PID 2100 wrote to memory of 5028 2100 wmplfv.exe 104 PID 2100 wrote to memory of 5028 2100 wmplfv.exe 104 PID 5028 wrote to memory of 4556 5028 wmplfv.exe 105 PID 5028 wrote to memory of 4556 5028 wmplfv.exe 105 PID 5028 wrote to memory of 4556 5028 wmplfv.exe 105 PID 4556 wrote to memory of 3556 4556 wmplfv.exe 106 PID 4556 wrote to memory of 3556 4556 wmplfv.exe 106 PID 4556 wrote to memory of 3556 4556 wmplfv.exe 106 PID 3556 wrote to memory of 4500 3556 wmplfv.exe 107 PID 3556 wrote to memory of 4500 3556 wmplfv.exe 107 PID 3556 wrote to memory of 4500 3556 wmplfv.exe 107 PID 4500 wrote to memory of 4516 4500 wmplfv.exe 108 PID 4500 wrote to memory of 4516 4500 wmplfv.exe 108 PID 4500 wrote to memory of 4516 4500 wmplfv.exe 108 PID 4516 wrote to memory of 4784 4516 wmplfv.exe 109 PID 4516 wrote to memory of 4784 4516 wmplfv.exe 109 PID 4516 wrote to memory of 4784 4516 wmplfv.exe 109 PID 4784 wrote to memory of 896 4784 wmplfv.exe 110 PID 4784 wrote to memory of 896 4784 wmplfv.exe 110 PID 4784 wrote to memory of 896 4784 wmplfv.exe 110 PID 896 wrote to memory of 3512 896 wmplfv.exe 111 PID 896 wrote to memory of 3512 896 wmplfv.exe 111 PID 896 wrote to memory of 3512 896 wmplfv.exe 111 PID 3512 wrote to memory of 3972 3512 wmplfv.exe 112 PID 3512 wrote to memory of 3972 3512 wmplfv.exe 112 PID 3512 wrote to memory of 3972 3512 wmplfv.exe 112 PID 3972 wrote to memory of 3672 3972 wmplfv.exe 113 PID 3972 wrote to memory of 3672 3972 wmplfv.exe 113 PID 3972 wrote to memory of 3672 3972 wmplfv.exe 113 PID 3672 wrote to memory of 1352 3672 wmplfv.exe 114 PID 3672 wrote to memory of 1352 3672 wmplfv.exe 114 PID 3672 wrote to memory of 1352 3672 wmplfv.exe 114 PID 1352 wrote to memory of 4700 1352 wmplfv.exe 115 PID 1352 wrote to memory of 4700 1352 wmplfv.exe 115 PID 1352 wrote to memory of 4700 1352 wmplfv.exe 115 PID 4700 wrote to memory of 4328 4700 wmplfv.exe 116 PID 4700 wrote to memory of 4328 4700 wmplfv.exe 116 PID 4700 wrote to memory of 4328 4700 wmplfv.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\e371adb18df9145d3b5bbd448b81652e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e371adb18df9145d3b5bbd448b81652e_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:244 -
C:\Windows\SysWOW64\wmplfv.exe"C:\Windows\system32\wmplfv.exe" C:\Users\Admin\AppData\Local\Temp\E371AD~1.EXE2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\wmplfv.exe"C:\Windows\system32\wmplfv.exe" C:\Windows\SysWOW64\wmplfv.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\SysWOW64\wmplfv.exe"C:\Windows\system32\wmplfv.exe" C:\Windows\SysWOW64\wmplfv.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\wmplfv.exe"C:\Windows\system32\wmplfv.exe" C:\Windows\SysWOW64\wmplfv.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\wmplfv.exe"C:\Windows\system32\wmplfv.exe" C:\Windows\SysWOW64\wmplfv.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\wmplfv.exe"C:\Windows\system32\wmplfv.exe" C:\Windows\SysWOW64\wmplfv.exe7⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\SysWOW64\wmplfv.exe"C:\Windows\system32\wmplfv.exe" C:\Windows\SysWOW64\wmplfv.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\wmplfv.exe"C:\Windows\system32\wmplfv.exe" C:\Windows\SysWOW64\wmplfv.exe9⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Windows\SysWOW64\wmplfv.exe"C:\Windows\system32\wmplfv.exe" C:\Windows\SysWOW64\wmplfv.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\SysWOW64\wmplfv.exe"C:\Windows\system32\wmplfv.exe" C:\Windows\SysWOW64\wmplfv.exe11⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\SysWOW64\wmplfv.exe"C:\Windows\system32\wmplfv.exe" C:\Windows\SysWOW64\wmplfv.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\SysWOW64\wmplfv.exe"C:\Windows\system32\wmplfv.exe" C:\Windows\SysWOW64\wmplfv.exe13⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\SysWOW64\wmplfv.exe"C:\Windows\system32\wmplfv.exe" C:\Windows\SysWOW64\wmplfv.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\SysWOW64\wmplfv.exe"C:\Windows\system32\wmplfv.exe" C:\Windows\SysWOW64\wmplfv.exe15⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\SysWOW64\wmplfv.exe"C:\Windows\system32\wmplfv.exe" C:\Windows\SysWOW64\wmplfv.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Windows\SysWOW64\wmplfv.exe"C:\Windows\system32\wmplfv.exe" C:\Windows\SysWOW64\wmplfv.exe17⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\wmplfv.exe"C:\Windows\system32\wmplfv.exe" C:\Windows\SysWOW64\wmplfv.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\SysWOW64\wmplfv.exe"C:\Windows\system32\wmplfv.exe" C:\Windows\SysWOW64\wmplfv.exe19⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4328
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
218KB
MD5e371adb18df9145d3b5bbd448b81652e
SHA1aed7868ba4d7e24bdbad1ebc962a0e928dbf5b0c
SHA2560a3c6293b62269a81da4019ad258365b7b5751ccd592e89c4031d031088ffc08
SHA51277994a5b7f9939dbc3f777f0cbc8f36cc681bd2bbdfed889595e97a654a66db6e22a2ead233059b9434d75713876a83260555bd88dac312e7733859724db7c4a