Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 09:43
Static task
static1
Behavioral task
behavioral1
Sample
e5c9ea041891730c229c112e9e441066_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e5c9ea041891730c229c112e9e441066_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e5c9ea041891730c229c112e9e441066_JaffaCakes118.exe
-
Size
164KB
-
MD5
e5c9ea041891730c229c112e9e441066
-
SHA1
745cb8a2284ca39568db52d0b354dd16f9654e26
-
SHA256
e3818e3a6ca3f46b323fec5a22f957eccc2c27b7fbf9e9f29b5fc6f71cb15354
-
SHA512
a924e7ad283bcc39727435c0e96ea05da2d8686c3e8a8b69a8f0c950b92d5e7a3ff9d654c8f4ffa7d972611e2cd0a6d2d0adc561ee826dc7c5a03583d01e0547
-
SSDEEP
3072:Tm0knhie5l77PI7SlI/wobxA/LI06f/vmoxs7kqrUzgjKcUo5F:t8DfobgLI06vmoxsnUXcUa
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 44 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation e5c9ea041891730c229c112e9e441066_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wmptc1.exe -
Deletes itself 1 IoCs
pid Process 1588 wmptc1.exe -
Executes dropped EXE 64 IoCs
pid Process 4356 wmptc1.exe 1588 wmptc1.exe 3000 wmptc1.exe 4848 wmptc1.exe 3564 wmptc1.exe 1604 wmptc1.exe 1728 wmptc1.exe 2076 wmptc1.exe 3428 wmptc1.exe 3932 wmptc1.exe 900 wmptc1.exe 2344 wmptc1.exe 3376 wmptc1.exe 3244 wmptc1.exe 1092 wmptc1.exe 2668 wmptc1.exe 5092 wmptc1.exe 1740 wmptc1.exe 3648 wmptc1.exe 2888 wmptc1.exe 720 wmptc1.exe 1216 wmptc1.exe 4392 wmptc1.exe 4692 wmptc1.exe 404 wmptc1.exe 1332 wmptc1.exe 3076 wmptc1.exe 4584 wmptc1.exe 2988 wmptc1.exe 3304 wmptc1.exe 5112 wmptc1.exe 4256 wmptc1.exe 3576 wmptc1.exe 4232 wmptc1.exe 3524 wmptc1.exe 1668 wmptc1.exe 3016 wmptc1.exe 4192 wmptc1.exe 1848 wmptc1.exe 936 wmptc1.exe 4792 wmptc1.exe 1128 wmptc1.exe 3660 wmptc1.exe 4600 wmptc1.exe 3284 wmptc1.exe 472 wmptc1.exe 1952 wmptc1.exe 3040 wmptc1.exe 2392 wmptc1.exe 3024 wmptc1.exe 5088 wmptc1.exe 744 wmptc1.exe 3956 wmptc1.exe 2560 wmptc1.exe 3852 wmptc1.exe 1888 wmptc1.exe 2556 wmptc1.exe 3200 wmptc1.exe 4772 wmptc1.exe 2672 wmptc1.exe 4908 wmptc1.exe 1948 wmptc1.exe 5056 wmptc1.exe 3524 wmptc1.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum e5c9ea041891730c229c112e9e441066_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptc1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmptc1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmptc1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmptc1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptc1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptc1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmptc1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptc1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptc1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmptc1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmptc1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmptc1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptc1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmptc1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmptc1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmptc1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptc1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmptc1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmptc1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptc1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptc1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptc1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptc1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptc1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 e5c9ea041891730c229c112e9e441066_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmptc1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptc1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptc1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptc1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmptc1.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File opened for modification C:\Windows\SysWOW64\ wmptc1.exe File created C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File created C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File opened for modification C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File created C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File opened for modification C:\Windows\SysWOW64\ wmptc1.exe File created C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File opened for modification C:\Windows\SysWOW64\ wmptc1.exe File opened for modification C:\Windows\SysWOW64\wmptc1.exe e5c9ea041891730c229c112e9e441066_JaffaCakes118.exe File created C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File opened for modification C:\Windows\SysWOW64\ wmptc1.exe File opened for modification C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File created C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File opened for modification C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File opened for modification C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File created C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File opened for modification C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File opened for modification C:\Windows\SysWOW64\ wmptc1.exe File created C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File created C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File created C:\Windows\SysWOW64\wmptc1.exe e5c9ea041891730c229c112e9e441066_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ wmptc1.exe File created C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File created C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File created C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File created C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File opened for modification C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File created C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File opened for modification C:\Windows\SysWOW64\ wmptc1.exe File created C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File opened for modification C:\Windows\SysWOW64\ wmptc1.exe File opened for modification C:\Windows\SysWOW64\ wmptc1.exe File opened for modification C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File opened for modification C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File opened for modification C:\Windows\SysWOW64\ wmptc1.exe File opened for modification C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File opened for modification C:\Windows\SysWOW64\ wmptc1.exe File opened for modification C:\Windows\SysWOW64\ wmptc1.exe File opened for modification C:\Windows\SysWOW64\ wmptc1.exe File opened for modification C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File created C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File opened for modification C:\Windows\SysWOW64\ wmptc1.exe File opened for modification C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File created C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File created C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File created C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File opened for modification C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File opened for modification C:\Windows\SysWOW64\ wmptc1.exe File created C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File opened for modification C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File opened for modification C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File created C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File opened for modification C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File opened for modification C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File created C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File created C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File opened for modification C:\Windows\SysWOW64\ wmptc1.exe File created C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File opened for modification C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File opened for modification C:\Windows\SysWOW64\ wmptc1.exe File opened for modification C:\Windows\SysWOW64\ wmptc1.exe File opened for modification C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe File created C:\Windows\SysWOW64\wmptc1.exe wmptc1.exe -
Suspicious use of SetThreadContext 45 IoCs
description pid Process procid_target PID 4536 set thread context of 4932 4536 e5c9ea041891730c229c112e9e441066_JaffaCakes118.exe 82 PID 4356 set thread context of 1588 4356 wmptc1.exe 84 PID 3000 set thread context of 4848 3000 wmptc1.exe 86 PID 3564 set thread context of 1604 3564 wmptc1.exe 92 PID 1728 set thread context of 2076 1728 wmptc1.exe 95 PID 3428 set thread context of 3932 3428 wmptc1.exe 99 PID 900 set thread context of 2344 900 wmptc1.exe 101 PID 3376 set thread context of 3244 3376 wmptc1.exe 103 PID 1092 set thread context of 2668 1092 wmptc1.exe 105 PID 5092 set thread context of 1740 5092 wmptc1.exe 108 PID 3648 set thread context of 2888 3648 wmptc1.exe 111 PID 720 set thread context of 1216 720 wmptc1.exe 113 PID 4392 set thread context of 4692 4392 wmptc1.exe 115 PID 404 set thread context of 1332 404 wmptc1.exe 117 PID 3076 set thread context of 4584 3076 wmptc1.exe 119 PID 2988 set thread context of 3304 2988 wmptc1.exe 121 PID 5112 set thread context of 4256 5112 wmptc1.exe 123 PID 3576 set thread context of 4232 3576 wmptc1.exe 125 PID 3524 set thread context of 1668 3524 wmptc1.exe 127 PID 3016 set thread context of 4192 3016 wmptc1.exe 129 PID 1848 set thread context of 936 1848 wmptc1.exe 131 PID 4792 set thread context of 1128 4792 wmptc1.exe 133 PID 3660 set thread context of 4600 3660 wmptc1.exe 135 PID 3284 set thread context of 472 3284 wmptc1.exe 137 PID 1952 set thread context of 3040 1952 wmptc1.exe 139 PID 2392 set thread context of 3024 2392 wmptc1.exe 141 PID 5088 set thread context of 744 5088 wmptc1.exe 143 PID 3956 set thread context of 2560 3956 wmptc1.exe 145 PID 3852 set thread context of 1888 3852 wmptc1.exe 147 PID 2556 set thread context of 3200 2556 wmptc1.exe 149 PID 4772 set thread context of 2672 4772 wmptc1.exe 151 PID 4908 set thread context of 1948 4908 wmptc1.exe 153 PID 5056 set thread context of 3524 5056 wmptc1.exe 155 PID 2144 set thread context of 5104 2144 wmptc1.exe 157 PID 2588 set thread context of 2600 2588 wmptc1.exe 159 PID 4668 set thread context of 4536 4668 wmptc1.exe 161 PID 3672 set thread context of 4084 3672 wmptc1.exe 163 PID 1504 set thread context of 3708 1504 wmptc1.exe 165 PID 4480 set thread context of 3432 4480 wmptc1.exe 167 PID 4244 set thread context of 4276 4244 wmptc1.exe 169 PID 396 set thread context of 5108 396 wmptc1.exe 171 PID 532 set thread context of 352 532 wmptc1.exe 173 PID 4864 set thread context of 4448 4864 wmptc1.exe 175 PID 3212 set thread context of 872 3212 wmptc1.exe 177 PID 2404 set thread context of 5020 2404 wmptc1.exe 179 -
resource yara_rule behavioral2/memory/4932-2-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/4932-4-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/4932-5-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/4932-6-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/4932-69-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/1588-77-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/1588-76-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/1588-75-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/1588-78-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/4848-86-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/4848-87-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/4848-88-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/4848-92-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/1604-98-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/1604-99-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/1604-100-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/1604-101-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/2076-113-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/3932-120-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/3932-121-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/3932-122-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/3932-123-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/2344-134-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/3244-145-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/2668-153-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/2668-155-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/2668-154-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/2668-157-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/1740-170-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/2888-182-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/1216-194-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/4692-206-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/1332-215-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/1332-219-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/4584-231-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/3304-244-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/4256-250-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/4256-256-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/4232-268-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/1668-275-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/1668-281-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/4192-293-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/936-302-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/936-306-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/1128-318-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/4600-329-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/472-339-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/3040-349-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/3024-359-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/744-369-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/2560-379-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/1888-387-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/1888-390-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/3200-400-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/2672-410-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/1948-420-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/3524-430-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/5104-440-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/2600-448-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/2600-451-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/4536-461-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/4084-471-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/3708-481-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/3432-491-0x0000000000400000-0x000000000045B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5c9ea041891730c229c112e9e441066_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmptc1.exe -
Modifies registry class 44 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ e5c9ea041891730c229c112e9e441066_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmptc1.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4932 e5c9ea041891730c229c112e9e441066_JaffaCakes118.exe 4932 e5c9ea041891730c229c112e9e441066_JaffaCakes118.exe 1588 wmptc1.exe 1588 wmptc1.exe 4848 wmptc1.exe 4848 wmptc1.exe 1604 wmptc1.exe 1604 wmptc1.exe 2076 wmptc1.exe 2076 wmptc1.exe 3932 wmptc1.exe 3932 wmptc1.exe 2344 wmptc1.exe 2344 wmptc1.exe 3244 wmptc1.exe 3244 wmptc1.exe 2668 wmptc1.exe 2668 wmptc1.exe 1740 wmptc1.exe 1740 wmptc1.exe 2888 wmptc1.exe 2888 wmptc1.exe 1216 wmptc1.exe 1216 wmptc1.exe 4692 wmptc1.exe 4692 wmptc1.exe 1332 wmptc1.exe 1332 wmptc1.exe 4584 wmptc1.exe 4584 wmptc1.exe 3304 wmptc1.exe 3304 wmptc1.exe 4256 wmptc1.exe 4256 wmptc1.exe 4232 wmptc1.exe 4232 wmptc1.exe 1668 wmptc1.exe 1668 wmptc1.exe 4192 wmptc1.exe 4192 wmptc1.exe 936 wmptc1.exe 936 wmptc1.exe 1128 wmptc1.exe 1128 wmptc1.exe 4600 wmptc1.exe 4600 wmptc1.exe 472 wmptc1.exe 472 wmptc1.exe 3040 wmptc1.exe 3040 wmptc1.exe 3024 wmptc1.exe 3024 wmptc1.exe 744 wmptc1.exe 744 wmptc1.exe 2560 wmptc1.exe 2560 wmptc1.exe 1888 wmptc1.exe 1888 wmptc1.exe 3200 wmptc1.exe 3200 wmptc1.exe 2672 wmptc1.exe 2672 wmptc1.exe 1948 wmptc1.exe 1948 wmptc1.exe -
Suspicious use of SetWindowsHookEx 45 IoCs
pid Process 4536 e5c9ea041891730c229c112e9e441066_JaffaCakes118.exe 4356 wmptc1.exe 3000 wmptc1.exe 3564 wmptc1.exe 1728 wmptc1.exe 3428 wmptc1.exe 900 wmptc1.exe 3376 wmptc1.exe 1092 wmptc1.exe 5092 wmptc1.exe 3648 wmptc1.exe 720 wmptc1.exe 4392 wmptc1.exe 404 wmptc1.exe 3076 wmptc1.exe 2988 wmptc1.exe 5112 wmptc1.exe 3576 wmptc1.exe 3524 wmptc1.exe 3016 wmptc1.exe 1848 wmptc1.exe 4792 wmptc1.exe 3660 wmptc1.exe 3284 wmptc1.exe 1952 wmptc1.exe 2392 wmptc1.exe 5088 wmptc1.exe 3956 wmptc1.exe 3852 wmptc1.exe 2556 wmptc1.exe 4772 wmptc1.exe 4908 wmptc1.exe 5056 wmptc1.exe 2144 wmptc1.exe 2588 wmptc1.exe 4668 wmptc1.exe 3672 wmptc1.exe 1504 wmptc1.exe 4480 wmptc1.exe 4244 wmptc1.exe 396 wmptc1.exe 532 wmptc1.exe 4864 wmptc1.exe 3212 wmptc1.exe 2404 wmptc1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4536 wrote to memory of 4932 4536 e5c9ea041891730c229c112e9e441066_JaffaCakes118.exe 82 PID 4536 wrote to memory of 4932 4536 e5c9ea041891730c229c112e9e441066_JaffaCakes118.exe 82 PID 4536 wrote to memory of 4932 4536 e5c9ea041891730c229c112e9e441066_JaffaCakes118.exe 82 PID 4536 wrote to memory of 4932 4536 e5c9ea041891730c229c112e9e441066_JaffaCakes118.exe 82 PID 4536 wrote to memory of 4932 4536 e5c9ea041891730c229c112e9e441066_JaffaCakes118.exe 82 PID 4536 wrote to memory of 4932 4536 e5c9ea041891730c229c112e9e441066_JaffaCakes118.exe 82 PID 4536 wrote to memory of 4932 4536 e5c9ea041891730c229c112e9e441066_JaffaCakes118.exe 82 PID 4536 wrote to memory of 4932 4536 e5c9ea041891730c229c112e9e441066_JaffaCakes118.exe 82 PID 4932 wrote to memory of 4356 4932 e5c9ea041891730c229c112e9e441066_JaffaCakes118.exe 83 PID 4932 wrote to memory of 4356 4932 e5c9ea041891730c229c112e9e441066_JaffaCakes118.exe 83 PID 4932 wrote to memory of 4356 4932 e5c9ea041891730c229c112e9e441066_JaffaCakes118.exe 83 PID 4356 wrote to memory of 1588 4356 wmptc1.exe 84 PID 4356 wrote to memory of 1588 4356 wmptc1.exe 84 PID 4356 wrote to memory of 1588 4356 wmptc1.exe 84 PID 4356 wrote to memory of 1588 4356 wmptc1.exe 84 PID 4356 wrote to memory of 1588 4356 wmptc1.exe 84 PID 4356 wrote to memory of 1588 4356 wmptc1.exe 84 PID 4356 wrote to memory of 1588 4356 wmptc1.exe 84 PID 4356 wrote to memory of 1588 4356 wmptc1.exe 84 PID 1588 wrote to memory of 3000 1588 wmptc1.exe 85 PID 1588 wrote to memory of 3000 1588 wmptc1.exe 85 PID 1588 wrote to memory of 3000 1588 wmptc1.exe 85 PID 3000 wrote to memory of 4848 3000 wmptc1.exe 86 PID 3000 wrote to memory of 4848 3000 wmptc1.exe 86 PID 3000 wrote to memory of 4848 3000 wmptc1.exe 86 PID 3000 wrote to memory of 4848 3000 wmptc1.exe 86 PID 3000 wrote to memory of 4848 3000 wmptc1.exe 86 PID 3000 wrote to memory of 4848 3000 wmptc1.exe 86 PID 3000 wrote to memory of 4848 3000 wmptc1.exe 86 PID 3000 wrote to memory of 4848 3000 wmptc1.exe 86 PID 4848 wrote to memory of 3564 4848 wmptc1.exe 91 PID 4848 wrote to memory of 3564 4848 wmptc1.exe 91 PID 4848 wrote to memory of 3564 4848 wmptc1.exe 91 PID 3564 wrote to memory of 1604 3564 wmptc1.exe 92 PID 3564 wrote to memory of 1604 3564 wmptc1.exe 92 PID 3564 wrote to memory of 1604 3564 wmptc1.exe 92 PID 3564 wrote to memory of 1604 3564 wmptc1.exe 92 PID 3564 wrote to memory of 1604 3564 wmptc1.exe 92 PID 3564 wrote to memory of 1604 3564 wmptc1.exe 92 PID 3564 wrote to memory of 1604 3564 wmptc1.exe 92 PID 3564 wrote to memory of 1604 3564 wmptc1.exe 92 PID 1604 wrote to memory of 1728 1604 wmptc1.exe 94 PID 1604 wrote to memory of 1728 1604 wmptc1.exe 94 PID 1604 wrote to memory of 1728 1604 wmptc1.exe 94 PID 1728 wrote to memory of 2076 1728 wmptc1.exe 95 PID 1728 wrote to memory of 2076 1728 wmptc1.exe 95 PID 1728 wrote to memory of 2076 1728 wmptc1.exe 95 PID 1728 wrote to memory of 2076 1728 wmptc1.exe 95 PID 1728 wrote to memory of 2076 1728 wmptc1.exe 95 PID 1728 wrote to memory of 2076 1728 wmptc1.exe 95 PID 1728 wrote to memory of 2076 1728 wmptc1.exe 95 PID 1728 wrote to memory of 2076 1728 wmptc1.exe 95 PID 2076 wrote to memory of 3428 2076 wmptc1.exe 98 PID 2076 wrote to memory of 3428 2076 wmptc1.exe 98 PID 2076 wrote to memory of 3428 2076 wmptc1.exe 98 PID 3428 wrote to memory of 3932 3428 wmptc1.exe 99 PID 3428 wrote to memory of 3932 3428 wmptc1.exe 99 PID 3428 wrote to memory of 3932 3428 wmptc1.exe 99 PID 3428 wrote to memory of 3932 3428 wmptc1.exe 99 PID 3428 wrote to memory of 3932 3428 wmptc1.exe 99 PID 3428 wrote to memory of 3932 3428 wmptc1.exe 99 PID 3428 wrote to memory of 3932 3428 wmptc1.exe 99 PID 3428 wrote to memory of 3932 3428 wmptc1.exe 99 PID 3932 wrote to memory of 900 3932 wmptc1.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5c9ea041891730c229c112e9e441066_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e5c9ea041891730c229c112e9e441066_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\e5c9ea041891730c229c112e9e441066_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e5c9ea041891730c229c112e9e441066_JaffaCakes118.exe2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Users\Admin\AppData\Local\Temp\E5C9EA~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Users\Admin\AppData\Local\Temp\E5C9EA~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:900 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2344 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3376 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3244 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1092 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2668 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:5092 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1740 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3648 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2888 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:720 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1216 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4392 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4692 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:404 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1332 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3076 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4584 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2988 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe32⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3304 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5112 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe34⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4256 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3576 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe36⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4232 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3524 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe38⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1668 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3016 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe40⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4192 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1848 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe42⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:936 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4792 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe44⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1128 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3660 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe46⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4600 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3284 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe48⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:472 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1952 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe50⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3040 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2392 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe52⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3024 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5088 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe54⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:744 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3956 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe56⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2560 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3852 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe58⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1888 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2556 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe60⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3200 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4772 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe62⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2672 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4908 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe64⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1948 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5056 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe66⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3524 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe67⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2144 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe68⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:5104 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe69⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2588 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe70⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2600 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe71⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4668 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe72⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:4536 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe73⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3672 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe74⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4084 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe75⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1504 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe76⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:3708 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe77⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4480 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe78⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:3432 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe79⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4244 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe80⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4276 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe81⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:396 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe82⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5108 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe83⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:532 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe84⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:352 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe85⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4864 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe86⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4448 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe87⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3212 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe88⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:872 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\system32\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe89⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2404 -
C:\Windows\SysWOW64\wmptc1.exe"C:\Windows\SysWOW64\wmptc1.exe" C:\Windows\SysWOW64\wmptc1.exe90⤵PID:5020
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164KB
MD5e5c9ea041891730c229c112e9e441066
SHA1745cb8a2284ca39568db52d0b354dd16f9654e26
SHA256e3818e3a6ca3f46b323fec5a22f957eccc2c27b7fbf9e9f29b5fc6f71cb15354
SHA512a924e7ad283bcc39727435c0e96ea05da2d8686c3e8a8b69a8f0c950b92d5e7a3ff9d654c8f4ffa7d972611e2cd0a6d2d0adc561ee826dc7c5a03583d01e0547