Analysis
-
max time kernel
117s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2024, 14:17
Static task
static1
Behavioral task
behavioral1
Sample
dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b.exe
Resource
win10v2004-20241007-en
General
-
Target
dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b.exe
-
Size
201KB
-
MD5
bf8a7b506a5f26093e63a800fef9e100
-
SHA1
d0b12fc85d0ec865ca36c51e5b78de5622f3f8fc
-
SHA256
dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b
-
SHA512
7e2fa195d328c62351bca4b13bc7fcade72b57693fea499d21d4829eb184e1d6febe269eea3c3aa64259095abbf33371177ac9be3ce5229985cba57be2c472dd
-
SSDEEP
3072:CaDpZ+xJi1hHw7U3zNwP6uRw8LL260748sgCCn/vSPWn3CwE56JdoSh7+AgeHXoj:CSvhHw7cfrTPNCwEYJdlQAgR1N
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 12 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wmpdtv32.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wmpdtv32.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wmpdtv32.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wmpdtv32.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wmpdtv32.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wmpdtv32.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wmpdtv32.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wmpdtv32.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wmpdtv32.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wmpdtv32.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wmpdtv32.exe -
Deletes itself 1 IoCs
pid Process 980 wmpdtv32.exe -
Executes dropped EXE 24 IoCs
pid Process 2972 wmpdtv32.exe 980 wmpdtv32.exe 4916 wmpdtv32.exe 4828 wmpdtv32.exe 4216 wmpdtv32.exe 916 wmpdtv32.exe 736 wmpdtv32.exe 3248 wmpdtv32.exe 876 wmpdtv32.exe 3148 wmpdtv32.exe 1612 wmpdtv32.exe 4568 wmpdtv32.exe 4332 wmpdtv32.exe 4832 wmpdtv32.exe 868 wmpdtv32.exe 4444 wmpdtv32.exe 668 wmpdtv32.exe 2424 wmpdtv32.exe 1692 wmpdtv32.exe 3312 wmpdtv32.exe 2540 wmpdtv32.exe 2680 wmpdtv32.exe 1144 wmpdtv32.exe 2536 wmpdtv32.exe -
Maps connected drives based on registry 3 TTPs 26 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtv32.exe -
Drops file in System32 directory 36 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtv32.exe File created C:\Windows\SysWOW64\wmpdtv32.exe wmpdtv32.exe -
Suspicious use of SetThreadContext 13 IoCs
description pid Process procid_target PID 1772 set thread context of 3808 1772 dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b.exe 82 PID 2972 set thread context of 980 2972 wmpdtv32.exe 86 PID 4916 set thread context of 4828 4916 wmpdtv32.exe 93 PID 4216 set thread context of 916 4216 wmpdtv32.exe 96 PID 736 set thread context of 3248 736 wmpdtv32.exe 99 PID 876 set thread context of 3148 876 wmpdtv32.exe 101 PID 1612 set thread context of 4568 1612 wmpdtv32.exe 103 PID 4332 set thread context of 4832 4332 wmpdtv32.exe 105 PID 868 set thread context of 4444 868 wmpdtv32.exe 107 PID 668 set thread context of 2424 668 wmpdtv32.exe 109 PID 1692 set thread context of 3312 1692 wmpdtv32.exe 111 PID 2540 set thread context of 2680 2540 wmpdtv32.exe 113 PID 1144 set thread context of 2536 1144 wmpdtv32.exe 115 -
resource yara_rule behavioral2/memory/3808-0-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/3808-2-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/3808-4-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/3808-3-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/3808-31-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/3808-41-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/980-45-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/980-46-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/980-47-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/980-48-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/980-51-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4828-57-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4828-59-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4828-63-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/916-71-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/3248-79-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/3148-88-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4568-94-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4832-101-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4444-110-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/2424-118-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/3312-126-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/2680-135-0x0000000000400000-0x000000000045A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtv32.exe -
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtv32.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 3808 dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b.exe 3808 dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b.exe 3808 dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b.exe 3808 dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b.exe 980 wmpdtv32.exe 980 wmpdtv32.exe 980 wmpdtv32.exe 980 wmpdtv32.exe 4828 wmpdtv32.exe 4828 wmpdtv32.exe 4828 wmpdtv32.exe 4828 wmpdtv32.exe 916 wmpdtv32.exe 916 wmpdtv32.exe 916 wmpdtv32.exe 916 wmpdtv32.exe 3248 wmpdtv32.exe 3248 wmpdtv32.exe 3248 wmpdtv32.exe 3248 wmpdtv32.exe 3148 wmpdtv32.exe 3148 wmpdtv32.exe 3148 wmpdtv32.exe 3148 wmpdtv32.exe 4568 wmpdtv32.exe 4568 wmpdtv32.exe 4568 wmpdtv32.exe 4568 wmpdtv32.exe 4832 wmpdtv32.exe 4832 wmpdtv32.exe 4832 wmpdtv32.exe 4832 wmpdtv32.exe 4444 wmpdtv32.exe 4444 wmpdtv32.exe 4444 wmpdtv32.exe 4444 wmpdtv32.exe 2424 wmpdtv32.exe 2424 wmpdtv32.exe 2424 wmpdtv32.exe 2424 wmpdtv32.exe 3312 wmpdtv32.exe 3312 wmpdtv32.exe 3312 wmpdtv32.exe 3312 wmpdtv32.exe 2680 wmpdtv32.exe 2680 wmpdtv32.exe 2680 wmpdtv32.exe 2680 wmpdtv32.exe 2536 wmpdtv32.exe 2536 wmpdtv32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1772 wrote to memory of 3808 1772 dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b.exe 82 PID 1772 wrote to memory of 3808 1772 dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b.exe 82 PID 1772 wrote to memory of 3808 1772 dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b.exe 82 PID 1772 wrote to memory of 3808 1772 dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b.exe 82 PID 1772 wrote to memory of 3808 1772 dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b.exe 82 PID 1772 wrote to memory of 3808 1772 dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b.exe 82 PID 1772 wrote to memory of 3808 1772 dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b.exe 82 PID 3808 wrote to memory of 2972 3808 dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b.exe 85 PID 3808 wrote to memory of 2972 3808 dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b.exe 85 PID 3808 wrote to memory of 2972 3808 dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b.exe 85 PID 2972 wrote to memory of 980 2972 wmpdtv32.exe 86 PID 2972 wrote to memory of 980 2972 wmpdtv32.exe 86 PID 2972 wrote to memory of 980 2972 wmpdtv32.exe 86 PID 2972 wrote to memory of 980 2972 wmpdtv32.exe 86 PID 2972 wrote to memory of 980 2972 wmpdtv32.exe 86 PID 2972 wrote to memory of 980 2972 wmpdtv32.exe 86 PID 2972 wrote to memory of 980 2972 wmpdtv32.exe 86 PID 980 wrote to memory of 4916 980 wmpdtv32.exe 92 PID 980 wrote to memory of 4916 980 wmpdtv32.exe 92 PID 980 wrote to memory of 4916 980 wmpdtv32.exe 92 PID 4916 wrote to memory of 4828 4916 wmpdtv32.exe 93 PID 4916 wrote to memory of 4828 4916 wmpdtv32.exe 93 PID 4916 wrote to memory of 4828 4916 wmpdtv32.exe 93 PID 4916 wrote to memory of 4828 4916 wmpdtv32.exe 93 PID 4916 wrote to memory of 4828 4916 wmpdtv32.exe 93 PID 4916 wrote to memory of 4828 4916 wmpdtv32.exe 93 PID 4916 wrote to memory of 4828 4916 wmpdtv32.exe 93 PID 4828 wrote to memory of 4216 4828 wmpdtv32.exe 95 PID 4828 wrote to memory of 4216 4828 wmpdtv32.exe 95 PID 4828 wrote to memory of 4216 4828 wmpdtv32.exe 95 PID 4216 wrote to memory of 916 4216 wmpdtv32.exe 96 PID 4216 wrote to memory of 916 4216 wmpdtv32.exe 96 PID 4216 wrote to memory of 916 4216 wmpdtv32.exe 96 PID 4216 wrote to memory of 916 4216 wmpdtv32.exe 96 PID 4216 wrote to memory of 916 4216 wmpdtv32.exe 96 PID 4216 wrote to memory of 916 4216 wmpdtv32.exe 96 PID 4216 wrote to memory of 916 4216 wmpdtv32.exe 96 PID 916 wrote to memory of 736 916 wmpdtv32.exe 98 PID 916 wrote to memory of 736 916 wmpdtv32.exe 98 PID 916 wrote to memory of 736 916 wmpdtv32.exe 98 PID 736 wrote to memory of 3248 736 wmpdtv32.exe 99 PID 736 wrote to memory of 3248 736 wmpdtv32.exe 99 PID 736 wrote to memory of 3248 736 wmpdtv32.exe 99 PID 736 wrote to memory of 3248 736 wmpdtv32.exe 99 PID 736 wrote to memory of 3248 736 wmpdtv32.exe 99 PID 736 wrote to memory of 3248 736 wmpdtv32.exe 99 PID 736 wrote to memory of 3248 736 wmpdtv32.exe 99 PID 3248 wrote to memory of 876 3248 wmpdtv32.exe 100 PID 3248 wrote to memory of 876 3248 wmpdtv32.exe 100 PID 3248 wrote to memory of 876 3248 wmpdtv32.exe 100 PID 876 wrote to memory of 3148 876 wmpdtv32.exe 101 PID 876 wrote to memory of 3148 876 wmpdtv32.exe 101 PID 876 wrote to memory of 3148 876 wmpdtv32.exe 101 PID 876 wrote to memory of 3148 876 wmpdtv32.exe 101 PID 876 wrote to memory of 3148 876 wmpdtv32.exe 101 PID 876 wrote to memory of 3148 876 wmpdtv32.exe 101 PID 876 wrote to memory of 3148 876 wmpdtv32.exe 101 PID 3148 wrote to memory of 1612 3148 wmpdtv32.exe 102 PID 3148 wrote to memory of 1612 3148 wmpdtv32.exe 102 PID 3148 wrote to memory of 1612 3148 wmpdtv32.exe 102 PID 1612 wrote to memory of 4568 1612 wmpdtv32.exe 103 PID 1612 wrote to memory of 4568 1612 wmpdtv32.exe 103 PID 1612 wrote to memory of 4568 1612 wmpdtv32.exe 103 PID 1612 wrote to memory of 4568 1612 wmpdtv32.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b.exe"C:\Users\Admin\AppData\Local\Temp\dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b.exe"C:\Users\Admin\AppData\Local\Temp\dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Users\Admin\AppData\Local\Temp\DCCC24~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Users\Admin\AppData\Local\Temp\DCCC24~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4568 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4332 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4832 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:868 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4444 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:668 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2424 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1692 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3312 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2540 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2680 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1144 -
C:\Windows\SysWOW64\wmpdtv32.exe"C:\Windows\system32\wmpdtv32.exe" C:\Windows\SysWOW64\wmpdtv32.exe26⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:2536
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
201KB
MD5bf8a7b506a5f26093e63a800fef9e100
SHA1d0b12fc85d0ec865ca36c51e5b78de5622f3f8fc
SHA256dccc246daf96529a5af74b918666bd0339e726266146b35f09d98259727d1f3b
SHA5127e2fa195d328c62351bca4b13bc7fcade72b57693fea499d21d4829eb184e1d6febe269eea3c3aa64259095abbf33371177ac9be3ce5229985cba57be2c472dd