Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2024, 09:11
Static task
static1
Behavioral task
behavioral1
Sample
91aecf27eb71a8a1d43d4c48224c0fd5e37cd91cbca9d67912016f80439df38bN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
91aecf27eb71a8a1d43d4c48224c0fd5e37cd91cbca9d67912016f80439df38bN.exe
Resource
win10v2004-20241007-en
General
-
Target
91aecf27eb71a8a1d43d4c48224c0fd5e37cd91cbca9d67912016f80439df38bN.exe
-
Size
201KB
-
MD5
c57ff205290ab61a5650f4ad680bf890
-
SHA1
3ba7b618c591f77bec808cc4ce76610f79e05da0
-
SHA256
91aecf27eb71a8a1d43d4c48224c0fd5e37cd91cbca9d67912016f80439df38b
-
SHA512
7e8429ba3fb09efe3791e4417f6a603e2e2b79b2a60e1439da4dcbed3e4cc4ff8c091decff548b7e80673b6c71c9b88f87d0d95049a01f810c34dcc324c26097
-
SSDEEP
3072:CaDpZ+xJi1hHw7U3zNwP6uRw8LL260748sgCCn/vSPWn3CwE56JdoSh7+AgeHXo5:CSvhHw7cfrTPNCwEYJdlQAgR13
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 12 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 91aecf27eb71a8a1d43d4c48224c0fd5e37cd91cbca9d67912016f80439df38bN.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpdtv32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpdtv32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpdtv32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpdtv32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpdtv32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpdtv32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpdtv32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpdtv32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpdtv32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpdtv32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpdtv32.exe -
Deletes itself 1 IoCs
pid Process 1880 wmpdtv32.exe -
Executes dropped EXE 24 IoCs
pid Process 4676 wmpdtv32.exe 1880 wmpdtv32.exe 2280 wmpdtv32.exe 2808 wmpdtv32.exe 3576 wmpdtv32.exe 4852 wmpdtv32.exe 4768 wmpdtv32.exe 1616 wmpdtv32.exe 1076 wmpdtv32.exe 4744 wmpdtv32.exe 1472 wmpdtv32.exe 3248 wmpdtv32.exe 4384 wmpdtv32.exe 4336 wmpdtv32.exe 4760 wmpdtv32.exe 1008 wmpdtv32.exe 3980 wmpdtv32.exe 3004 wmpdtv32.exe 4604 wmpdtv32.exe 2860 wmpdtv32.exe 2464 wmpdtv32.exe 5052 wmpdtv32.exe 1128 wmpdtv32.exe 620 wmpdtv32.exe -
Maps connected drives based on registry 3 TTPs 26 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 91aecf27eb71a8a1d43d4c48224c0fd5e37cd91cbca9d67912016f80439df38bN.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 91aecf27eb71a8a1d43d4c48224c0fd5e37cd91cbca9d67912016f80439df38bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtv32.exe -
Drops file in System32 directory 36 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe 91aecf27eb71a8a1d43d4c48224c0fd5e37cd91cbca9d67912016f80439df38bN.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe 91aecf27eb71a8a1d43d4c48224c0fd5e37cd91cbca9d67912016f80439df38bN.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ 91aecf27eb71a8a1d43d4c48224c0fd5e37cd91cbca9d67912016f80439df38bN.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe -
Suspicious use of SetThreadContext 13 IoCs
description pid Process procid_target PID 436 set thread context of 4556 436 91aecf27eb71a8a1d43d4c48224c0fd5e37cd91cbca9d67912016f80439df38bN.exe 82 PID 4676 set thread context of 1880 4676 wmpdtv32.exe 88 PID 2280 set thread context of 2808 2280 wmpdtv32.exe 93 PID 3576 set thread context of 4852 3576 wmpdtv32.exe 96 PID 4768 set thread context of 1616 4768 wmpdtv32.exe 99 PID 1076 set thread context of 4744 1076 wmpdtv32.exe 101 PID 1472 set thread context of 3248 1472 wmpdtv32.exe 103 PID 4384 set thread context of 4336 4384 wmpdtv32.exe 105 PID 4760 set thread context of 1008 4760 wmpdtv32.exe 107 PID 3980 set thread context of 3004 3980 wmpdtv32.exe 109 PID 4604 set thread context of 2860 4604 wmpdtv32.exe 111 PID 2464 set thread context of 5052 2464 wmpdtv32.exe 113 PID 1128 set thread context of 620 1128 wmpdtv32.exe 115 -
resource yara_rule behavioral2/memory/4556-0-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4556-2-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4556-4-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4556-3-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4556-31-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4556-41-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1880-46-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1880-48-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1880-53-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/2808-59-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/2808-61-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/2808-64-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4852-72-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1616-80-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4744-88-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/3248-96-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4336-105-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1008-113-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/3004-121-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/2860-129-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/5052-137-0x0000000000400000-0x000000000045A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 91aecf27eb71a8a1d43d4c48224c0fd5e37cd91cbca9d67912016f80439df38bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 91aecf27eb71a8a1d43d4c48224c0fd5e37cd91cbca9d67912016f80439df38bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe -
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 91aecf27eb71a8a1d43d4c48224c0fd5e37cd91cbca9d67912016f80439df38bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtv32.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 4556 91aecf27eb71a8a1d43d4c48224c0fd5e37cd91cbca9d67912016f80439df38bN.exe 4556 91aecf27eb71a8a1d43d4c48224c0fd5e37cd91cbca9d67912016f80439df38bN.exe 4556 91aecf27eb71a8a1d43d4c48224c0fd5e37cd91cbca9d67912016f80439df38bN.exe 4556 91aecf27eb71a8a1d43d4c48224c0fd5e37cd91cbca9d67912016f80439df38bN.exe 1880 wmpdtv32.exe 1880 wmpdtv32.exe 1880 wmpdtv32.exe 1880 wmpdtv32.exe 2808 wmpdtv32.exe 2808 wmpdtv32.exe 2808 wmpdtv32.exe 2808 wmpdtv32.exe 4852 wmpdtv32.exe 4852 wmpdtv32.exe 4852 wmpdtv32.exe 4852 wmpdtv32.exe 1616 wmpdtv32.exe 1616 wmpdtv32.exe 1616 wmpdtv32.exe 1616 wmpdtv32.exe 4744 wmpdtv32.exe 4744 wmpdtv32.exe 4744 wmpdtv32.exe 4744 wmpdtv32.exe 3248 wmpdtv32.exe 3248 wmpdtv32.exe 3248 wmpdtv32.exe 3248 wmpdtv32.exe 4336 wmpdtv32.exe 4336 wmpdtv32.exe 4336 wmpdtv32.exe 4336 wmpdtv32.exe 1008 wmpdtv32.exe 1008 wmpdtv32.exe 1008 wmpdtv32.exe 1008 wmpdtv32.exe 3004 wmpdtv32.exe 3004 wmpdtv32.exe 3004 wmpdtv32.exe 3004 wmpdtv32.exe 2860 wmpdtv32.exe 2860 wmpdtv32.exe 2860 wmpdtv32.exe 2860 wmpdtv32.exe 5052 wmpdtv32.exe 5052 wmpdtv32.exe 5052 wmpdtv32.exe 5052 wmpdtv32.exe 620 wmpdtv32.exe 620 wmpdtv32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 436 wrote to memory of 4556 436 91aecf27eb71a8a1d43d4c48224c0fd5e37cd91cbca9d67912016f80439df38bN.exe 82 PID 436 wrote to memory of 4556 436 91aecf27eb71a8a1d43d4c48224c0fd5e37cd91cbca9d67912016f80439df38bN.exe 82 PID 436 wrote to memory of 4556 436 91aecf27eb71a8a1d43d4c48224c0fd5e37cd91cbca9d67912016f80439df38bN.exe 82 PID 436 wrote to memory of 4556 436 91aecf27eb71a8a1d43d4c48224c0fd5e37cd91cbca9d67912016f80439df38bN.exe 82 PID 436 wrote to memory of 4556 436 91aecf27eb71a8a1d43d4c48224c0fd5e37cd91cbca9d67912016f80439df38bN.exe 82 PID 436 wrote to memory of 4556 436 91aecf27eb71a8a1d43d4c48224c0fd5e37cd91cbca9d67912016f80439df38bN.exe 82 PID 436 wrote to memory of 4556 436 91aecf27eb71a8a1d43d4c48224c0fd5e37cd91cbca9d67912016f80439df38bN.exe 82 PID 4556 wrote to memory of 4676 4556 91aecf27eb71a8a1d43d4c48224c0fd5e37cd91cbca9d67912016f80439df38bN.exe 87 PID 4556 wrote to memory of 4676 4556 91aecf27eb71a8a1d43d4c48224c0fd5e37cd91cbca9d67912016f80439df38bN.exe 87 PID 4556 wrote to memory of 4676 4556 91aecf27eb71a8a1d43d4c48224c0fd5e37cd91cbca9d67912016f80439df38bN.exe 87 PID 4676 wrote to memory of 1880 4676 wmpdtv32.exe 88 PID 4676 wrote to memory of 1880 4676 wmpdtv32.exe 88 PID 4676 wrote to memory of 1880 4676 wmpdtv32.exe 88 PID 4676 wrote to memory of 1880 4676 wmpdtv32.exe 88 PID 4676 wrote to memory of 1880 4676 wmpdtv32.exe 88 PID 4676 wrote to memory of 1880 4676 wmpdtv32.exe 88 PID 4676 wrote to memory of 1880 4676 wmpdtv32.exe 88 PID 1880 wrote to memory of 2280 1880 wmpdtv32.exe 92 PID 1880 wrote to memory of 2280 1880 wmpdtv32.exe 92 PID 1880 wrote to memory of 2280 1880 wmpdtv32.exe 92 PID 2280 wrote to memory of 2808 2280 wmpdtv32.exe 93 PID 2280 wrote to memory of 2808 2280 wmpdtv32.exe 93 PID 2280 wrote to memory of 2808 2280 wmpdtv32.exe 93 PID 2280 wrote to memory of 2808 2280 wmpdtv32.exe 93 PID 2280 wrote to memory of 2808 2280 wmpdtv32.exe 93 PID 2280 wrote to memory of 2808 2280 wmpdtv32.exe 93 PID 2280 wrote to memory of 2808 2280 wmpdtv32.exe 93 PID 2808 wrote to memory of 3576 2808 wmpdtv32.exe 94 PID 2808 wrote to memory of 3576 2808 wmpdtv32.exe 94 PID 2808 wrote to memory of 3576 2808 wmpdtv32.exe 94 PID 3576 wrote to memory of 4852 3576 wmpdtv32.exe 96 PID 3576 wrote to memory of 4852 3576 wmpdtv32.exe 96 PID 3576 wrote to memory of 4852 3576 wmpdtv32.exe 96 PID 3576 wrote to memory of 4852 3576 wmpdtv32.exe 96 PID 3576 wrote to memory of 4852 3576 wmpdtv32.exe 96 PID 3576 wrote to memory of 4852 3576 wmpdtv32.exe 96 PID 3576 wrote to memory of 4852 3576 wmpdtv32.exe 96 PID 4852 wrote to memory of 4768 4852 wmpdtv32.exe 98 PID 4852 wrote to memory of 4768 4852 wmpdtv32.exe 98 PID 4852 wrote to memory of 4768 4852 wmpdtv32.exe 98 PID 4768 wrote to memory of 1616 4768 wmpdtv32.exe 99 PID 4768 wrote to memory of 1616 4768 wmpdtv32.exe 99 PID 4768 wrote to memory of 1616 4768 wmpdtv32.exe 99 PID 4768 wrote to memory of 1616 4768 wmpdtv32.exe 99 PID 4768 wrote to memory of 1616 4768 wmpdtv32.exe 99 PID 4768 wrote to memory of 1616 4768 wmpdtv32.exe 99 PID 4768 wrote to memory of 1616 4768 wmpdtv32.exe 99 PID 1616 wrote to memory of 1076 1616 wmpdtv32.exe 100 PID 1616 wrote to memory of 1076 1616 wmpdtv32.exe 100 PID 1616 wrote to memory of 1076 1616 wmpdtv32.exe 100 PID 1076 wrote to memory of 4744 1076 wmpdtv32.exe 101 PID 1076 wrote to memory of 4744 1076 wmpdtv32.exe 101 PID 1076 wrote to memory of 4744 1076 wmpdtv32.exe 101 PID 1076 wrote to memory of 4744 1076 wmpdtv32.exe 101 PID 1076 wrote to memory of 4744 1076 wmpdtv32.exe 101 PID 1076 wrote to memory of 4744 1076 wmpdtv32.exe 101 PID 1076 wrote to memory of 4744 1076 wmpdtv32.exe 101 PID 4744 wrote to memory of 1472 4744 wmpdtv32.exe 102 PID 4744 wrote to memory of 1472 4744 wmpdtv32.exe 102 PID 4744 wrote to memory of 1472 4744 wmpdtv32.exe 102 PID 1472 wrote to memory of 3248 1472 wmpdtv32.exe 103 PID 1472 wrote to memory of 3248 1472 wmpdtv32.exe 103 PID 1472 wrote to memory of 3248 1472 wmpdtv32.exe 103 PID 1472 wrote to memory of 3248 1472 wmpdtv32.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\91aecf27eb71a8a1d43d4c48224c0fd5e37cd91cbca9d67912016f80439df38bN.exe"C:\Users\Admin\AppData\Local\Temp\91aecf27eb71a8a1d43d4c48224c0fd5e37cd91cbca9d67912016f80439df38bN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Users\Admin\AppData\Local\Temp\91aecf27eb71a8a1d43d4c48224c0fd5e37cd91cbca9d67912016f80439df38bN.exe"C:\Users\Admin\AppData\Local\Temp\91aecf27eb71a8a1d43d4c48224c0fd5e37cd91cbca9d67912016f80439df38bN.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Users\Admin\AppData\Local\Temp\91AECF~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Users\Admin\AppData\Local\Temp\91AECF~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3248 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4384 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4336 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4760 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1008 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3980 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3004 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4604 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2860 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2464 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5052 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1128 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe26⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:620
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
201KB
MD5c57ff205290ab61a5650f4ad680bf890
SHA13ba7b618c591f77bec808cc4ce76610f79e05da0
SHA25691aecf27eb71a8a1d43d4c48224c0fd5e37cd91cbca9d67912016f80439df38b
SHA5127e8429ba3fb09efe3791e4417f6a603e2e2b79b2a60e1439da4dcbed3e4cc4ff8c091decff548b7e80673b6c71c9b88f87d0d95049a01f810c34dcc324c26097