Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 21:03
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f909a05f4b9b32a01ac10ecb62a63422.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_f909a05f4b9b32a01ac10ecb62a63422.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_f909a05f4b9b32a01ac10ecb62a63422.exe
-
Size
152KB
-
MD5
f909a05f4b9b32a01ac10ecb62a63422
-
SHA1
96ff947c5e09de2675c0401bd046de720b84c8cb
-
SHA256
20fdf8c4eeb11d27e19e97d0380f6c12e0173cab58a1defcef4f780e25c7edfa
-
SHA512
f4cd95a7abf2edd20f1daf37844175bda8703d5d7fd011c0c99c65802f381e01d4fa3220a079faba8283463af299cf5e1f5e1e0c832879943a8d097c8024f222
-
SSDEEP
3072:dJVA/xtq3NR+GdgUhXZn5Za/rrGI4Dni68Lz+DB1f:bCW3NR+fUlZ/uHpX+DBR
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 16 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpdlp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpdlp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation JaffaCakes118_f909a05f4b9b32a01ac10ecb62a63422.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpdlp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpdlp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpdlp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpdlp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpdlp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpdlp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpdlp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpdlp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpdlp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpdlp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpdlp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpdlp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmpdlp32.exe -
Deletes itself 1 IoCs
pid Process 4288 wmpdlp32.exe -
Executes dropped EXE 32 IoCs
pid Process 1132 wmpdlp32.exe 4288 wmpdlp32.exe 3184 wmpdlp32.exe 1404 wmpdlp32.exe 3308 wmpdlp32.exe 1428 wmpdlp32.exe 400 wmpdlp32.exe 4060 wmpdlp32.exe 4800 wmpdlp32.exe 2144 wmpdlp32.exe 2732 wmpdlp32.exe 228 wmpdlp32.exe 4596 wmpdlp32.exe 1528 wmpdlp32.exe 3336 wmpdlp32.exe 4228 wmpdlp32.exe 2964 wmpdlp32.exe 3112 wmpdlp32.exe 5060 wmpdlp32.exe 2400 wmpdlp32.exe 3556 wmpdlp32.exe 2324 wmpdlp32.exe 3408 wmpdlp32.exe 4984 wmpdlp32.exe 3428 wmpdlp32.exe 4980 wmpdlp32.exe 2568 wmpdlp32.exe 3316 wmpdlp32.exe 2180 wmpdlp32.exe 4032 wmpdlp32.exe 2024 wmpdlp32.exe 836 wmpdlp32.exe -
Maps connected drives based on registry 3 TTPs 34 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdlp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdlp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdlp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum JaffaCakes118_f909a05f4b9b32a01ac10ecb62a63422.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdlp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 JaffaCakes118_f909a05f4b9b32a01ac10ecb62a63422.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdlp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdlp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdlp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdlp32.exe -
Drops file in System32 directory 48 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File created C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlp32.exe File created C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File created C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlp32.exe File created C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File created C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\wmpdlp32.exe JaffaCakes118_f909a05f4b9b32a01ac10ecb62a63422.exe File created C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File created C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File created C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\ JaffaCakes118_f909a05f4b9b32a01ac10ecb62a63422.exe File created C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlp32.exe File created C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File created C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File created C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File created C:\Windows\SysWOW64\wmpdlp32.exe JaffaCakes118_f909a05f4b9b32a01ac10ecb62a63422.exe File created C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File created C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\ wmpdlp32.exe File created C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe File opened for modification C:\Windows\SysWOW64\wmpdlp32.exe wmpdlp32.exe -
Suspicious use of SetThreadContext 17 IoCs
description pid Process procid_target PID 592 set thread context of 4196 592 JaffaCakes118_f909a05f4b9b32a01ac10ecb62a63422.exe 82 PID 1132 set thread context of 4288 1132 wmpdlp32.exe 84 PID 3184 set thread context of 1404 3184 wmpdlp32.exe 93 PID 3308 set thread context of 1428 3308 wmpdlp32.exe 95 PID 400 set thread context of 4060 400 wmpdlp32.exe 99 PID 4800 set thread context of 2144 4800 wmpdlp32.exe 101 PID 2732 set thread context of 228 2732 wmpdlp32.exe 103 PID 4596 set thread context of 1528 4596 wmpdlp32.exe 105 PID 3336 set thread context of 4228 3336 wmpdlp32.exe 107 PID 2964 set thread context of 3112 2964 wmpdlp32.exe 109 PID 5060 set thread context of 2400 5060 wmpdlp32.exe 111 PID 3556 set thread context of 2324 3556 wmpdlp32.exe 113 PID 3408 set thread context of 4984 3408 wmpdlp32.exe 115 PID 3428 set thread context of 4980 3428 wmpdlp32.exe 117 PID 2568 set thread context of 3316 2568 wmpdlp32.exe 119 PID 2180 set thread context of 4032 2180 wmpdlp32.exe 121 PID 2024 set thread context of 836 2024 wmpdlp32.exe 123 -
resource yara_rule behavioral2/memory/4196-0-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/4196-2-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/4196-3-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/4196-4-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/4196-31-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/4288-44-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/4196-45-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/4288-47-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/4288-54-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/1404-59-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/1404-62-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/1428-67-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/1428-70-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/4060-75-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/4060-78-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2144-83-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2144-86-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/228-92-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/228-95-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/1528-102-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/4228-107-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/4228-110-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/3112-115-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/3112-118-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2400-123-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2400-126-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2324-131-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2324-136-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/4984-140-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/4984-145-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/4980-149-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/4980-154-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/3316-158-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/3316-163-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/4032-168-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/4032-173-0x0000000000400000-0x0000000000456000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 33 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_f909a05f4b9b32a01ac10ecb62a63422.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_f909a05f4b9b32a01ac10ecb62a63422.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdlp32.exe -
Modifies registry class 16 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdlp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdlp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdlp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdlp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdlp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdlp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdlp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdlp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdlp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdlp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdlp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdlp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ JaffaCakes118_f909a05f4b9b32a01ac10ecb62a63422.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdlp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdlp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdlp32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4196 JaffaCakes118_f909a05f4b9b32a01ac10ecb62a63422.exe 4196 JaffaCakes118_f909a05f4b9b32a01ac10ecb62a63422.exe 4196 JaffaCakes118_f909a05f4b9b32a01ac10ecb62a63422.exe 4196 JaffaCakes118_f909a05f4b9b32a01ac10ecb62a63422.exe 4288 wmpdlp32.exe 4288 wmpdlp32.exe 4288 wmpdlp32.exe 4288 wmpdlp32.exe 1404 wmpdlp32.exe 1404 wmpdlp32.exe 1404 wmpdlp32.exe 1404 wmpdlp32.exe 1428 wmpdlp32.exe 1428 wmpdlp32.exe 1428 wmpdlp32.exe 1428 wmpdlp32.exe 4060 wmpdlp32.exe 4060 wmpdlp32.exe 4060 wmpdlp32.exe 4060 wmpdlp32.exe 2144 wmpdlp32.exe 2144 wmpdlp32.exe 2144 wmpdlp32.exe 2144 wmpdlp32.exe 228 wmpdlp32.exe 228 wmpdlp32.exe 228 wmpdlp32.exe 228 wmpdlp32.exe 1528 wmpdlp32.exe 1528 wmpdlp32.exe 1528 wmpdlp32.exe 1528 wmpdlp32.exe 4228 wmpdlp32.exe 4228 wmpdlp32.exe 4228 wmpdlp32.exe 4228 wmpdlp32.exe 3112 wmpdlp32.exe 3112 wmpdlp32.exe 3112 wmpdlp32.exe 3112 wmpdlp32.exe 2400 wmpdlp32.exe 2400 wmpdlp32.exe 2400 wmpdlp32.exe 2400 wmpdlp32.exe 2324 wmpdlp32.exe 2324 wmpdlp32.exe 2324 wmpdlp32.exe 2324 wmpdlp32.exe 4984 wmpdlp32.exe 4984 wmpdlp32.exe 4984 wmpdlp32.exe 4984 wmpdlp32.exe 4980 wmpdlp32.exe 4980 wmpdlp32.exe 4980 wmpdlp32.exe 4980 wmpdlp32.exe 3316 wmpdlp32.exe 3316 wmpdlp32.exe 3316 wmpdlp32.exe 3316 wmpdlp32.exe 4032 wmpdlp32.exe 4032 wmpdlp32.exe 4032 wmpdlp32.exe 4032 wmpdlp32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 592 wrote to memory of 4196 592 JaffaCakes118_f909a05f4b9b32a01ac10ecb62a63422.exe 82 PID 592 wrote to memory of 4196 592 JaffaCakes118_f909a05f4b9b32a01ac10ecb62a63422.exe 82 PID 592 wrote to memory of 4196 592 JaffaCakes118_f909a05f4b9b32a01ac10ecb62a63422.exe 82 PID 592 wrote to memory of 4196 592 JaffaCakes118_f909a05f4b9b32a01ac10ecb62a63422.exe 82 PID 592 wrote to memory of 4196 592 JaffaCakes118_f909a05f4b9b32a01ac10ecb62a63422.exe 82 PID 592 wrote to memory of 4196 592 JaffaCakes118_f909a05f4b9b32a01ac10ecb62a63422.exe 82 PID 592 wrote to memory of 4196 592 JaffaCakes118_f909a05f4b9b32a01ac10ecb62a63422.exe 82 PID 4196 wrote to memory of 1132 4196 JaffaCakes118_f909a05f4b9b32a01ac10ecb62a63422.exe 83 PID 4196 wrote to memory of 1132 4196 JaffaCakes118_f909a05f4b9b32a01ac10ecb62a63422.exe 83 PID 4196 wrote to memory of 1132 4196 JaffaCakes118_f909a05f4b9b32a01ac10ecb62a63422.exe 83 PID 1132 wrote to memory of 4288 1132 wmpdlp32.exe 84 PID 1132 wrote to memory of 4288 1132 wmpdlp32.exe 84 PID 1132 wrote to memory of 4288 1132 wmpdlp32.exe 84 PID 1132 wrote to memory of 4288 1132 wmpdlp32.exe 84 PID 1132 wrote to memory of 4288 1132 wmpdlp32.exe 84 PID 1132 wrote to memory of 4288 1132 wmpdlp32.exe 84 PID 1132 wrote to memory of 4288 1132 wmpdlp32.exe 84 PID 4288 wrote to memory of 3184 4288 wmpdlp32.exe 92 PID 4288 wrote to memory of 3184 4288 wmpdlp32.exe 92 PID 4288 wrote to memory of 3184 4288 wmpdlp32.exe 92 PID 3184 wrote to memory of 1404 3184 wmpdlp32.exe 93 PID 3184 wrote to memory of 1404 3184 wmpdlp32.exe 93 PID 3184 wrote to memory of 1404 3184 wmpdlp32.exe 93 PID 3184 wrote to memory of 1404 3184 wmpdlp32.exe 93 PID 3184 wrote to memory of 1404 3184 wmpdlp32.exe 93 PID 3184 wrote to memory of 1404 3184 wmpdlp32.exe 93 PID 3184 wrote to memory of 1404 3184 wmpdlp32.exe 93 PID 1404 wrote to memory of 3308 1404 wmpdlp32.exe 94 PID 1404 wrote to memory of 3308 1404 wmpdlp32.exe 94 PID 1404 wrote to memory of 3308 1404 wmpdlp32.exe 94 PID 3308 wrote to memory of 1428 3308 wmpdlp32.exe 95 PID 3308 wrote to memory of 1428 3308 wmpdlp32.exe 95 PID 3308 wrote to memory of 1428 3308 wmpdlp32.exe 95 PID 3308 wrote to memory of 1428 3308 wmpdlp32.exe 95 PID 3308 wrote to memory of 1428 3308 wmpdlp32.exe 95 PID 3308 wrote to memory of 1428 3308 wmpdlp32.exe 95 PID 3308 wrote to memory of 1428 3308 wmpdlp32.exe 95 PID 1428 wrote to memory of 400 1428 wmpdlp32.exe 98 PID 1428 wrote to memory of 400 1428 wmpdlp32.exe 98 PID 1428 wrote to memory of 400 1428 wmpdlp32.exe 98 PID 400 wrote to memory of 4060 400 wmpdlp32.exe 99 PID 400 wrote to memory of 4060 400 wmpdlp32.exe 99 PID 400 wrote to memory of 4060 400 wmpdlp32.exe 99 PID 400 wrote to memory of 4060 400 wmpdlp32.exe 99 PID 400 wrote to memory of 4060 400 wmpdlp32.exe 99 PID 400 wrote to memory of 4060 400 wmpdlp32.exe 99 PID 400 wrote to memory of 4060 400 wmpdlp32.exe 99 PID 4060 wrote to memory of 4800 4060 wmpdlp32.exe 100 PID 4060 wrote to memory of 4800 4060 wmpdlp32.exe 100 PID 4060 wrote to memory of 4800 4060 wmpdlp32.exe 100 PID 4800 wrote to memory of 2144 4800 wmpdlp32.exe 101 PID 4800 wrote to memory of 2144 4800 wmpdlp32.exe 101 PID 4800 wrote to memory of 2144 4800 wmpdlp32.exe 101 PID 4800 wrote to memory of 2144 4800 wmpdlp32.exe 101 PID 4800 wrote to memory of 2144 4800 wmpdlp32.exe 101 PID 4800 wrote to memory of 2144 4800 wmpdlp32.exe 101 PID 4800 wrote to memory of 2144 4800 wmpdlp32.exe 101 PID 2144 wrote to memory of 2732 2144 wmpdlp32.exe 102 PID 2144 wrote to memory of 2732 2144 wmpdlp32.exe 102 PID 2144 wrote to memory of 2732 2144 wmpdlp32.exe 102 PID 2732 wrote to memory of 228 2732 wmpdlp32.exe 103 PID 2732 wrote to memory of 228 2732 wmpdlp32.exe 103 PID 2732 wrote to memory of 228 2732 wmpdlp32.exe 103 PID 2732 wrote to memory of 228 2732 wmpdlp32.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f909a05f4b9b32a01ac10ecb62a63422.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f909a05f4b9b32a01ac10ecb62a63422.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f909a05f4b9b32a01ac10ecb62a63422.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f909a05f4b9b32a01ac10ecb62a63422.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:228 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4596 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1528 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3336 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4228 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2964 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3112 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5060 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2400 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3556 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2324 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3408 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4984 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3428 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4980 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2568 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3316 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2180 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe32⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4032 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2024 -
C:\Windows\SysWOW64\wmpdlp32.exe"C:\Windows\system32\wmpdlp32.exe" C:\Windows\SysWOW64\wmpdlp32.exe34⤵
- Executes dropped EXE
- Maps connected drives based on registry
PID:836
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152KB
MD5f909a05f4b9b32a01ac10ecb62a63422
SHA196ff947c5e09de2675c0401bd046de720b84c8cb
SHA25620fdf8c4eeb11d27e19e97d0380f6c12e0173cab58a1defcef4f780e25c7edfa
SHA512f4cd95a7abf2edd20f1daf37844175bda8703d5d7fd011c0c99c65802f381e01d4fa3220a079faba8283463af299cf5e1f5e1e0c832879943a8d097c8024f222