Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/12/2024, 00:22
Static task
static1
Behavioral task
behavioral1
Sample
e3dafa71364239a94875c5fe45894755_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e3dafa71364239a94875c5fe45894755_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e3dafa71364239a94875c5fe45894755_JaffaCakes118.exe
-
Size
212KB
-
MD5
e3dafa71364239a94875c5fe45894755
-
SHA1
ea12c428ba6c95a12dc40748a05f594f574302a7
-
SHA256
e3b85326a9d69f0c015b880013befcef42b5a45b2d499a63adde66cb302228ea
-
SHA512
3acb0eb662eb6f209b878eebe740f1998e61308fe54dcb745acf8e4b6d56a5563401644f3673b7b0c1315cc9e2589b98182b472f540a88316bdbdcfd4b33fd11
-
SSDEEP
6144:CCsOq7p+EBANI+lXkLV290OLmm/zHUnpa:CNx++SI1LV1O6m/zUn8
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 11 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpxvd.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpxvd.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpxvd.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpxvd.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpxvd.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpxvd.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpxvd.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpxvd.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpxvd.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpxvd.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation e3dafa71364239a94875c5fe45894755_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2020 wmpxvd.exe -
Executes dropped EXE 21 IoCs
pid Process 4744 wmpxvd.exe 2020 wmpxvd.exe 3436 wmpxvd.exe 8 wmpxvd.exe 3148 wmpxvd.exe 1956 wmpxvd.exe 2980 wmpxvd.exe 1256 wmpxvd.exe 2600 wmpxvd.exe 4200 wmpxvd.exe 4108 wmpxvd.exe 452 wmpxvd.exe 4660 wmpxvd.exe 3156 wmpxvd.exe 2348 wmpxvd.exe 1808 wmpxvd.exe 3924 wmpxvd.exe 3776 wmpxvd.exe 4924 wmpxvd.exe 396 wmpxvd.exe 1016 wmpxvd.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wmpxvd.exe wmpxvd.exe File created C:\Windows\SysWOW64\wmpxvd.exe wmpxvd.exe File created C:\Windows\SysWOW64\wmpxvd.exe wmpxvd.exe File created C:\Windows\SysWOW64\wmpxvd.exe wmpxvd.exe File opened for modification C:\Windows\SysWOW64\wmpxvd.exe wmpxvd.exe File opened for modification C:\Windows\SysWOW64\wmpxvd.exe wmpxvd.exe File created C:\Windows\SysWOW64\wmpxvd.exe wmpxvd.exe File opened for modification C:\Windows\SysWOW64\wmpxvd.exe wmpxvd.exe File opened for modification C:\Windows\SysWOW64\wmpxvd.exe wmpxvd.exe File created C:\Windows\SysWOW64\wmpxvd.exe e3dafa71364239a94875c5fe45894755_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wmpxvd.exe wmpxvd.exe File opened for modification C:\Windows\SysWOW64\wmpxvd.exe wmpxvd.exe File created C:\Windows\SysWOW64\wmpxvd.exe wmpxvd.exe File opened for modification C:\Windows\SysWOW64\wmpxvd.exe wmpxvd.exe File created C:\Windows\SysWOW64\wmpxvd.exe wmpxvd.exe File opened for modification C:\Windows\SysWOW64\wmpxvd.exe wmpxvd.exe File opened for modification C:\Windows\SysWOW64\wmpxvd.exe e3dafa71364239a94875c5fe45894755_JaffaCakes118.exe File created C:\Windows\SysWOW64\wmpxvd.exe wmpxvd.exe File created C:\Windows\SysWOW64\wmpxvd.exe wmpxvd.exe File created C:\Windows\SysWOW64\wmpxvd.exe wmpxvd.exe File created C:\Windows\SysWOW64\wmpxvd.exe wmpxvd.exe File opened for modification C:\Windows\SysWOW64\wmpxvd.exe wmpxvd.exe -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 5000 set thread context of 2868 5000 e3dafa71364239a94875c5fe45894755_JaffaCakes118.exe 84 PID 4744 set thread context of 2020 4744 wmpxvd.exe 91 PID 3436 set thread context of 8 3436 wmpxvd.exe 95 PID 3148 set thread context of 1956 3148 wmpxvd.exe 97 PID 2980 set thread context of 1256 2980 wmpxvd.exe 99 PID 2600 set thread context of 4200 2600 wmpxvd.exe 101 PID 4108 set thread context of 452 4108 wmpxvd.exe 103 PID 4660 set thread context of 3156 4660 wmpxvd.exe 105 PID 2348 set thread context of 1808 2348 wmpxvd.exe 107 PID 3924 set thread context of 3776 3924 wmpxvd.exe 109 PID 4924 set thread context of 396 4924 wmpxvd.exe 111 -
resource yara_rule behavioral2/memory/2868-0-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/2868-2-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/2868-1-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/2868-5-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/2868-8-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/2868-7-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/2868-6-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/2868-42-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/2020-51-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/2020-52-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/2020-55-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/2020-53-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/2020-57-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/8-64-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/8-66-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/8-65-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/8-69-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/1956-82-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/1256-90-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/1256-95-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4200-105-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4200-108-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/452-123-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/3156-130-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/3156-137-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/1808-150-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/3776-163-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/396-176-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/1396-183-0x0000000000400000-0x000000000046C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e3dafa71364239a94875c5fe45894755_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e3dafa71364239a94875c5fe45894755_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpxvd.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxvd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ e3dafa71364239a94875c5fe45894755_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxvd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxvd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxvd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxvd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxvd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxvd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxvd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxvd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpxvd.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2868 e3dafa71364239a94875c5fe45894755_JaffaCakes118.exe 2868 e3dafa71364239a94875c5fe45894755_JaffaCakes118.exe 2020 wmpxvd.exe 2020 wmpxvd.exe 8 wmpxvd.exe 8 wmpxvd.exe 1956 wmpxvd.exe 1956 wmpxvd.exe 1256 wmpxvd.exe 1256 wmpxvd.exe 4200 wmpxvd.exe 4200 wmpxvd.exe 452 wmpxvd.exe 452 wmpxvd.exe 3156 wmpxvd.exe 3156 wmpxvd.exe 1808 wmpxvd.exe 1808 wmpxvd.exe 3776 wmpxvd.exe 3776 wmpxvd.exe 396 wmpxvd.exe 396 wmpxvd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5000 wrote to memory of 2868 5000 e3dafa71364239a94875c5fe45894755_JaffaCakes118.exe 84 PID 5000 wrote to memory of 2868 5000 e3dafa71364239a94875c5fe45894755_JaffaCakes118.exe 84 PID 5000 wrote to memory of 2868 5000 e3dafa71364239a94875c5fe45894755_JaffaCakes118.exe 84 PID 5000 wrote to memory of 2868 5000 e3dafa71364239a94875c5fe45894755_JaffaCakes118.exe 84 PID 5000 wrote to memory of 2868 5000 e3dafa71364239a94875c5fe45894755_JaffaCakes118.exe 84 PID 5000 wrote to memory of 2868 5000 e3dafa71364239a94875c5fe45894755_JaffaCakes118.exe 84 PID 5000 wrote to memory of 2868 5000 e3dafa71364239a94875c5fe45894755_JaffaCakes118.exe 84 PID 5000 wrote to memory of 2868 5000 e3dafa71364239a94875c5fe45894755_JaffaCakes118.exe 84 PID 2868 wrote to memory of 4744 2868 e3dafa71364239a94875c5fe45894755_JaffaCakes118.exe 90 PID 2868 wrote to memory of 4744 2868 e3dafa71364239a94875c5fe45894755_JaffaCakes118.exe 90 PID 2868 wrote to memory of 4744 2868 e3dafa71364239a94875c5fe45894755_JaffaCakes118.exe 90 PID 4744 wrote to memory of 2020 4744 wmpxvd.exe 91 PID 4744 wrote to memory of 2020 4744 wmpxvd.exe 91 PID 4744 wrote to memory of 2020 4744 wmpxvd.exe 91 PID 4744 wrote to memory of 2020 4744 wmpxvd.exe 91 PID 4744 wrote to memory of 2020 4744 wmpxvd.exe 91 PID 4744 wrote to memory of 2020 4744 wmpxvd.exe 91 PID 4744 wrote to memory of 2020 4744 wmpxvd.exe 91 PID 4744 wrote to memory of 2020 4744 wmpxvd.exe 91 PID 2020 wrote to memory of 3436 2020 wmpxvd.exe 92 PID 2020 wrote to memory of 3436 2020 wmpxvd.exe 92 PID 2020 wrote to memory of 3436 2020 wmpxvd.exe 92 PID 3436 wrote to memory of 8 3436 wmpxvd.exe 95 PID 3436 wrote to memory of 8 3436 wmpxvd.exe 95 PID 3436 wrote to memory of 8 3436 wmpxvd.exe 95 PID 3436 wrote to memory of 8 3436 wmpxvd.exe 95 PID 3436 wrote to memory of 8 3436 wmpxvd.exe 95 PID 3436 wrote to memory of 8 3436 wmpxvd.exe 95 PID 3436 wrote to memory of 8 3436 wmpxvd.exe 95 PID 3436 wrote to memory of 8 3436 wmpxvd.exe 95 PID 8 wrote to memory of 3148 8 wmpxvd.exe 96 PID 8 wrote to memory of 3148 8 wmpxvd.exe 96 PID 8 wrote to memory of 3148 8 wmpxvd.exe 96 PID 3148 wrote to memory of 1956 3148 wmpxvd.exe 97 PID 3148 wrote to memory of 1956 3148 wmpxvd.exe 97 PID 3148 wrote to memory of 1956 3148 wmpxvd.exe 97 PID 3148 wrote to memory of 1956 3148 wmpxvd.exe 97 PID 3148 wrote to memory of 1956 3148 wmpxvd.exe 97 PID 3148 wrote to memory of 1956 3148 wmpxvd.exe 97 PID 3148 wrote to memory of 1956 3148 wmpxvd.exe 97 PID 3148 wrote to memory of 1956 3148 wmpxvd.exe 97 PID 1956 wrote to memory of 2980 1956 wmpxvd.exe 98 PID 1956 wrote to memory of 2980 1956 wmpxvd.exe 98 PID 1956 wrote to memory of 2980 1956 wmpxvd.exe 98 PID 2980 wrote to memory of 1256 2980 wmpxvd.exe 99 PID 2980 wrote to memory of 1256 2980 wmpxvd.exe 99 PID 2980 wrote to memory of 1256 2980 wmpxvd.exe 99 PID 2980 wrote to memory of 1256 2980 wmpxvd.exe 99 PID 2980 wrote to memory of 1256 2980 wmpxvd.exe 99 PID 2980 wrote to memory of 1256 2980 wmpxvd.exe 99 PID 2980 wrote to memory of 1256 2980 wmpxvd.exe 99 PID 2980 wrote to memory of 1256 2980 wmpxvd.exe 99 PID 1256 wrote to memory of 2600 1256 wmpxvd.exe 100 PID 1256 wrote to memory of 2600 1256 wmpxvd.exe 100 PID 1256 wrote to memory of 2600 1256 wmpxvd.exe 100 PID 2600 wrote to memory of 4200 2600 wmpxvd.exe 101 PID 2600 wrote to memory of 4200 2600 wmpxvd.exe 101 PID 2600 wrote to memory of 4200 2600 wmpxvd.exe 101 PID 2600 wrote to memory of 4200 2600 wmpxvd.exe 101 PID 2600 wrote to memory of 4200 2600 wmpxvd.exe 101 PID 2600 wrote to memory of 4200 2600 wmpxvd.exe 101 PID 2600 wrote to memory of 4200 2600 wmpxvd.exe 101 PID 2600 wrote to memory of 4200 2600 wmpxvd.exe 101 PID 4200 wrote to memory of 4108 4200 wmpxvd.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3dafa71364239a94875c5fe45894755_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e3dafa71364239a94875c5fe45894755_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\e3dafa71364239a94875c5fe45894755_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e3dafa71364239a94875c5fe45894755_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\wmpxvd.exe"C:\Windows\system32\wmpxvd.exe" C:\Users\Admin\AppData\Local\Temp\E3DAFA~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\wmpxvd.exe"C:\Windows\system32\wmpxvd.exe" C:\Users\Admin\AppData\Local\Temp\E3DAFA~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\wmpxvd.exe"C:\Windows\system32\wmpxvd.exe" C:\Windows\SysWOW64\wmpxvd.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\SysWOW64\wmpxvd.exe"C:\Windows\system32\wmpxvd.exe" C:\Windows\SysWOW64\wmpxvd.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Windows\SysWOW64\wmpxvd.exe"C:\Windows\system32\wmpxvd.exe" C:\Windows\SysWOW64\wmpxvd.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\SysWOW64\wmpxvd.exe"C:\Windows\system32\wmpxvd.exe" C:\Windows\SysWOW64\wmpxvd.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\wmpxvd.exe"C:\Windows\system32\wmpxvd.exe" C:\Windows\SysWOW64\wmpxvd.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\wmpxvd.exe"C:\Windows\system32\wmpxvd.exe" C:\Windows\SysWOW64\wmpxvd.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\wmpxvd.exe"C:\Windows\system32\wmpxvd.exe" C:\Windows\SysWOW64\wmpxvd.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\wmpxvd.exe"C:\Windows\system32\wmpxvd.exe" C:\Windows\SysWOW64\wmpxvd.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Windows\SysWOW64\wmpxvd.exe"C:\Windows\system32\wmpxvd.exe" C:\Windows\SysWOW64\wmpxvd.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4108 -
C:\Windows\SysWOW64\wmpxvd.exe"C:\Windows\system32\wmpxvd.exe" C:\Windows\SysWOW64\wmpxvd.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:452 -
C:\Windows\SysWOW64\wmpxvd.exe"C:\Windows\system32\wmpxvd.exe" C:\Windows\SysWOW64\wmpxvd.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4660 -
C:\Windows\SysWOW64\wmpxvd.exe"C:\Windows\system32\wmpxvd.exe" C:\Windows\SysWOW64\wmpxvd.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3156 -
C:\Windows\SysWOW64\wmpxvd.exe"C:\Windows\system32\wmpxvd.exe" C:\Windows\SysWOW64\wmpxvd.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2348 -
C:\Windows\SysWOW64\wmpxvd.exe"C:\Windows\system32\wmpxvd.exe" C:\Windows\SysWOW64\wmpxvd.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1808 -
C:\Windows\SysWOW64\wmpxvd.exe"C:\Windows\system32\wmpxvd.exe" C:\Windows\SysWOW64\wmpxvd.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3924 -
C:\Windows\SysWOW64\wmpxvd.exe"C:\Windows\system32\wmpxvd.exe" C:\Windows\SysWOW64\wmpxvd.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3776 -
C:\Windows\SysWOW64\wmpxvd.exe"C:\Windows\system32\wmpxvd.exe" C:\Windows\SysWOW64\wmpxvd.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4924 -
C:\Windows\SysWOW64\wmpxvd.exe"C:\Windows\system32\wmpxvd.exe" C:\Windows\SysWOW64\wmpxvd.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:396 -
C:\Windows\SysWOW64\wmpxvd.exe"C:\Windows\system32\wmpxvd.exe" C:\Windows\SysWOW64\wmpxvd.exe23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1016
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD5e3dafa71364239a94875c5fe45894755
SHA1ea12c428ba6c95a12dc40748a05f594f574302a7
SHA256e3b85326a9d69f0c015b880013befcef42b5a45b2d499a63adde66cb302228ea
SHA5123acb0eb662eb6f209b878eebe740f1998e61308fe54dcb745acf8e4b6d56a5563401644f3673b7b0c1315cc9e2589b98182b472f540a88316bdbdcfd4b33fd11