Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2025, 02:10
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b9365eee02d5771b68ff81312f660664.exe
Resource
win10v2004-20250410-en
General
-
Target
JaffaCakes118_b9365eee02d5771b68ff81312f660664.exe
-
Size
292KB
-
MD5
b9365eee02d5771b68ff81312f660664
-
SHA1
4dbfc852bb74d0c09822cd9480f48170b431e4f8
-
SHA256
63abf69ef5c6bf8173602b97939bfefe4967fa4b810872347134f1355e4aba16
-
SHA512
4c47d654b0db4f3fc7c4ba21df8ea240d15e7b2ad74432d37eb569e99a48605ab722c8acc5ddd9fd7a84d535d8ceaaa4a080c6d9f79df3239fb2a4bc041141be
-
SSDEEP
3072:imWMBqx6iXMYISKK05UVq09dY0OxMmgHnou+9JThe/RhE/Mrrq302fc6RrH:imW6FYEz5UVq09dYpxjgHaTzknGlFH
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 14 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2645532622-3298555945-705856666-1000\Control Panel\International\Geo\Nation wmpntv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2645532622-3298555945-705856666-1000\Control Panel\International\Geo\Nation wmpntv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2645532622-3298555945-705856666-1000\Control Panel\International\Geo\Nation wmpntv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2645532622-3298555945-705856666-1000\Control Panel\International\Geo\Nation wmpntv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2645532622-3298555945-705856666-1000\Control Panel\International\Geo\Nation wmpntv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2645532622-3298555945-705856666-1000\Control Panel\International\Geo\Nation wmpntv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2645532622-3298555945-705856666-1000\Control Panel\International\Geo\Nation wmpntv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2645532622-3298555945-705856666-1000\Control Panel\International\Geo\Nation wmpntv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2645532622-3298555945-705856666-1000\Control Panel\International\Geo\Nation wmpntv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2645532622-3298555945-705856666-1000\Control Panel\International\Geo\Nation wmpntv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2645532622-3298555945-705856666-1000\Control Panel\International\Geo\Nation JaffaCakes118_b9365eee02d5771b68ff81312f660664.exe Key value queried \REGISTRY\USER\S-1-5-21-2645532622-3298555945-705856666-1000\Control Panel\International\Geo\Nation wmpntv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2645532622-3298555945-705856666-1000\Control Panel\International\Geo\Nation wmpntv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2645532622-3298555945-705856666-1000\Control Panel\International\Geo\Nation wmpntv32.exe -
Deletes itself 1 IoCs
pid Process 4808 wmpntv32.exe -
Executes dropped EXE 28 IoCs
pid Process 4772 wmpntv32.exe 4808 wmpntv32.exe 5644 wmpntv32.exe 5684 wmpntv32.exe 4976 wmpntv32.exe 5488 wmpntv32.exe 6076 wmpntv32.exe 6056 wmpntv32.exe 1492 wmpntv32.exe 468 wmpntv32.exe 5456 wmpntv32.exe 2560 wmpntv32.exe 1704 wmpntv32.exe 956 wmpntv32.exe 2696 wmpntv32.exe 4940 wmpntv32.exe 3608 wmpntv32.exe 2940 wmpntv32.exe 5360 wmpntv32.exe 4412 wmpntv32.exe 3964 wmpntv32.exe 5124 wmpntv32.exe 3004 wmpntv32.exe 4668 wmpntv32.exe 5728 wmpntv32.exe 5580 wmpntv32.exe 1188 wmpntv32.exe 4972 wmpntv32.exe -
Maps connected drives based on registry 3 TTPs 30 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpntv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpntv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpntv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpntv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpntv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 JaffaCakes118_b9365eee02d5771b68ff81312f660664.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpntv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpntv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpntv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpntv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum JaffaCakes118_b9365eee02d5771b68ff81312f660664.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpntv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpntv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpntv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpntv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpntv32.exe -
Drops file in System32 directory 42 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ wmpntv32.exe File opened for modification C:\Windows\SysWOW64\ wmpntv32.exe File opened for modification C:\Windows\SysWOW64\ wmpntv32.exe File opened for modification C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File created C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File opened for modification C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File opened for modification C:\Windows\SysWOW64\ wmpntv32.exe File opened for modification C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File opened for modification C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File created C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File opened for modification C:\Windows\SysWOW64\ wmpntv32.exe File created C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File opened for modification C:\Windows\SysWOW64\ JaffaCakes118_b9365eee02d5771b68ff81312f660664.exe File created C:\Windows\SysWOW64\wmpntv32.exe JaffaCakes118_b9365eee02d5771b68ff81312f660664.exe File opened for modification C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File created C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File opened for modification C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File opened for modification C:\Windows\SysWOW64\ wmpntv32.exe File opened for modification C:\Windows\SysWOW64\ wmpntv32.exe File opened for modification C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File created C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File opened for modification C:\Windows\SysWOW64\ wmpntv32.exe File created C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File opened for modification C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File created C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File created C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File opened for modification C:\Windows\SysWOW64\ wmpntv32.exe File created C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File opened for modification C:\Windows\SysWOW64\ wmpntv32.exe File opened for modification C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File created C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File opened for modification C:\Windows\SysWOW64\ wmpntv32.exe File opened for modification C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File opened for modification C:\Windows\SysWOW64\wmpntv32.exe JaffaCakes118_b9365eee02d5771b68ff81312f660664.exe File opened for modification C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File opened for modification C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File created C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File opened for modification C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File created C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File created C:\Windows\SysWOW64\wmpntv32.exe wmpntv32.exe File opened for modification C:\Windows\SysWOW64\ wmpntv32.exe File opened for modification C:\Windows\SysWOW64\ wmpntv32.exe -
Suspicious use of SetThreadContext 15 IoCs
description pid Process procid_target PID 4448 set thread context of 2324 4448 JaffaCakes118_b9365eee02d5771b68ff81312f660664.exe 89 PID 4772 set thread context of 4808 4772 wmpntv32.exe 95 PID 5644 set thread context of 5684 5644 wmpntv32.exe 97 PID 4976 set thread context of 5488 4976 wmpntv32.exe 103 PID 6076 set thread context of 6056 6076 wmpntv32.exe 105 PID 1492 set thread context of 468 1492 wmpntv32.exe 107 PID 5456 set thread context of 2560 5456 wmpntv32.exe 109 PID 1704 set thread context of 956 1704 wmpntv32.exe 111 PID 2696 set thread context of 4940 2696 wmpntv32.exe 113 PID 3608 set thread context of 2940 3608 wmpntv32.exe 115 PID 5360 set thread context of 4412 5360 wmpntv32.exe 118 PID 3964 set thread context of 5124 3964 wmpntv32.exe 120 PID 3004 set thread context of 4668 3004 wmpntv32.exe 122 PID 5728 set thread context of 5580 5728 wmpntv32.exe 124 PID 1188 set thread context of 4972 1188 wmpntv32.exe 126 -
resource yara_rule behavioral1/memory/2324-1-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2324-4-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2324-5-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2324-6-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2324-33-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2324-43-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/4808-48-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/4808-49-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/4808-50-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/4808-51-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/4808-55-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/5684-61-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/5684-62-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/5684-63-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/5684-64-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/5684-69-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/5488-76-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/5488-80-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/6056-87-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/6056-89-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/468-100-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2560-107-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2560-111-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/956-121-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/4940-130-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2940-137-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2940-138-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/4412-147-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/5124-155-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/5124-157-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/4668-163-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/4668-167-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/5580-174-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/5580-178-0x0000000000400000-0x0000000000456000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 29 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b9365eee02d5771b68ff81312f660664.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b9365eee02d5771b68ff81312f660664.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpntv32.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpntv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpntv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpntv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpntv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ JaffaCakes118_b9365eee02d5771b68ff81312f660664.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpntv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpntv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpntv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpntv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpntv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpntv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpntv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpntv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpntv32.exe -
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 2324 JaffaCakes118_b9365eee02d5771b68ff81312f660664.exe 2324 JaffaCakes118_b9365eee02d5771b68ff81312f660664.exe 2324 JaffaCakes118_b9365eee02d5771b68ff81312f660664.exe 2324 JaffaCakes118_b9365eee02d5771b68ff81312f660664.exe 4808 wmpntv32.exe 4808 wmpntv32.exe 4808 wmpntv32.exe 4808 wmpntv32.exe 5684 wmpntv32.exe 5684 wmpntv32.exe 5684 wmpntv32.exe 5684 wmpntv32.exe 5488 wmpntv32.exe 5488 wmpntv32.exe 5488 wmpntv32.exe 5488 wmpntv32.exe 6056 wmpntv32.exe 6056 wmpntv32.exe 6056 wmpntv32.exe 6056 wmpntv32.exe 468 wmpntv32.exe 468 wmpntv32.exe 468 wmpntv32.exe 468 wmpntv32.exe 2560 wmpntv32.exe 2560 wmpntv32.exe 2560 wmpntv32.exe 2560 wmpntv32.exe 956 wmpntv32.exe 956 wmpntv32.exe 956 wmpntv32.exe 956 wmpntv32.exe 4940 wmpntv32.exe 4940 wmpntv32.exe 4940 wmpntv32.exe 4940 wmpntv32.exe 2940 wmpntv32.exe 2940 wmpntv32.exe 2940 wmpntv32.exe 2940 wmpntv32.exe 4412 wmpntv32.exe 4412 wmpntv32.exe 4412 wmpntv32.exe 4412 wmpntv32.exe 5124 wmpntv32.exe 5124 wmpntv32.exe 5124 wmpntv32.exe 5124 wmpntv32.exe 5580 wmpntv32.exe 5580 wmpntv32.exe 5580 wmpntv32.exe 5580 wmpntv32.exe 4972 wmpntv32.exe 4972 wmpntv32.exe 4972 wmpntv32.exe 4972 wmpntv32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4448 wrote to memory of 2324 4448 JaffaCakes118_b9365eee02d5771b68ff81312f660664.exe 89 PID 4448 wrote to memory of 2324 4448 JaffaCakes118_b9365eee02d5771b68ff81312f660664.exe 89 PID 4448 wrote to memory of 2324 4448 JaffaCakes118_b9365eee02d5771b68ff81312f660664.exe 89 PID 4448 wrote to memory of 2324 4448 JaffaCakes118_b9365eee02d5771b68ff81312f660664.exe 89 PID 4448 wrote to memory of 2324 4448 JaffaCakes118_b9365eee02d5771b68ff81312f660664.exe 89 PID 4448 wrote to memory of 2324 4448 JaffaCakes118_b9365eee02d5771b68ff81312f660664.exe 89 PID 4448 wrote to memory of 2324 4448 JaffaCakes118_b9365eee02d5771b68ff81312f660664.exe 89 PID 2324 wrote to memory of 4772 2324 JaffaCakes118_b9365eee02d5771b68ff81312f660664.exe 94 PID 2324 wrote to memory of 4772 2324 JaffaCakes118_b9365eee02d5771b68ff81312f660664.exe 94 PID 2324 wrote to memory of 4772 2324 JaffaCakes118_b9365eee02d5771b68ff81312f660664.exe 94 PID 4772 wrote to memory of 4808 4772 wmpntv32.exe 95 PID 4772 wrote to memory of 4808 4772 wmpntv32.exe 95 PID 4772 wrote to memory of 4808 4772 wmpntv32.exe 95 PID 4772 wrote to memory of 4808 4772 wmpntv32.exe 95 PID 4772 wrote to memory of 4808 4772 wmpntv32.exe 95 PID 4772 wrote to memory of 4808 4772 wmpntv32.exe 95 PID 4772 wrote to memory of 4808 4772 wmpntv32.exe 95 PID 4808 wrote to memory of 5644 4808 wmpntv32.exe 96 PID 4808 wrote to memory of 5644 4808 wmpntv32.exe 96 PID 4808 wrote to memory of 5644 4808 wmpntv32.exe 96 PID 5644 wrote to memory of 5684 5644 wmpntv32.exe 97 PID 5644 wrote to memory of 5684 5644 wmpntv32.exe 97 PID 5644 wrote to memory of 5684 5644 wmpntv32.exe 97 PID 5644 wrote to memory of 5684 5644 wmpntv32.exe 97 PID 5644 wrote to memory of 5684 5644 wmpntv32.exe 97 PID 5644 wrote to memory of 5684 5644 wmpntv32.exe 97 PID 5644 wrote to memory of 5684 5644 wmpntv32.exe 97 PID 5684 wrote to memory of 4976 5684 wmpntv32.exe 102 PID 5684 wrote to memory of 4976 5684 wmpntv32.exe 102 PID 5684 wrote to memory of 4976 5684 wmpntv32.exe 102 PID 4976 wrote to memory of 5488 4976 wmpntv32.exe 103 PID 4976 wrote to memory of 5488 4976 wmpntv32.exe 103 PID 4976 wrote to memory of 5488 4976 wmpntv32.exe 103 PID 4976 wrote to memory of 5488 4976 wmpntv32.exe 103 PID 4976 wrote to memory of 5488 4976 wmpntv32.exe 103 PID 4976 wrote to memory of 5488 4976 wmpntv32.exe 103 PID 4976 wrote to memory of 5488 4976 wmpntv32.exe 103 PID 5488 wrote to memory of 6076 5488 wmpntv32.exe 104 PID 5488 wrote to memory of 6076 5488 wmpntv32.exe 104 PID 5488 wrote to memory of 6076 5488 wmpntv32.exe 104 PID 6076 wrote to memory of 6056 6076 wmpntv32.exe 105 PID 6076 wrote to memory of 6056 6076 wmpntv32.exe 105 PID 6076 wrote to memory of 6056 6076 wmpntv32.exe 105 PID 6076 wrote to memory of 6056 6076 wmpntv32.exe 105 PID 6076 wrote to memory of 6056 6076 wmpntv32.exe 105 PID 6076 wrote to memory of 6056 6076 wmpntv32.exe 105 PID 6076 wrote to memory of 6056 6076 wmpntv32.exe 105 PID 6056 wrote to memory of 1492 6056 wmpntv32.exe 106 PID 6056 wrote to memory of 1492 6056 wmpntv32.exe 106 PID 6056 wrote to memory of 1492 6056 wmpntv32.exe 106 PID 1492 wrote to memory of 468 1492 wmpntv32.exe 107 PID 1492 wrote to memory of 468 1492 wmpntv32.exe 107 PID 1492 wrote to memory of 468 1492 wmpntv32.exe 107 PID 1492 wrote to memory of 468 1492 wmpntv32.exe 107 PID 1492 wrote to memory of 468 1492 wmpntv32.exe 107 PID 1492 wrote to memory of 468 1492 wmpntv32.exe 107 PID 1492 wrote to memory of 468 1492 wmpntv32.exe 107 PID 468 wrote to memory of 5456 468 wmpntv32.exe 108 PID 468 wrote to memory of 5456 468 wmpntv32.exe 108 PID 468 wrote to memory of 5456 468 wmpntv32.exe 108 PID 5456 wrote to memory of 2560 5456 wmpntv32.exe 109 PID 5456 wrote to memory of 2560 5456 wmpntv32.exe 109 PID 5456 wrote to memory of 2560 5456 wmpntv32.exe 109 PID 5456 wrote to memory of 2560 5456 wmpntv32.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b9365eee02d5771b68ff81312f660664.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b9365eee02d5771b68ff81312f660664.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b9365eee02d5771b68ff81312f660664.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b9365eee02d5771b68ff81312f660664.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5644 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5684 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5488 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:6076 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:6056 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5456 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2560 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1704 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:956 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2696 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4940 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3608 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2940 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5360 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4412 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3964 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5124 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3004 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4668 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5728 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5580 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1188 -
C:\Windows\SysWOW64\wmpntv32.exe"C:\Windows\system32\wmpntv32.exe" C:\Windows\SysWOW64\wmpntv32.exe30⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4972
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
292KB
MD5b9365eee02d5771b68ff81312f660664
SHA14dbfc852bb74d0c09822cd9480f48170b431e4f8
SHA25663abf69ef5c6bf8173602b97939bfefe4967fa4b810872347134f1355e4aba16
SHA5124c47d654b0db4f3fc7c4ba21df8ea240d15e7b2ad74432d37eb569e99a48605ab722c8acc5ddd9fd7a84d535d8ceaaa4a080c6d9f79df3239fb2a4bc041141be