Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 10:22
Static task
static1
Behavioral task
behavioral1
Sample
1aeda6ec35f1076db6b88da73f670640_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1aeda6ec35f1076db6b88da73f670640_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
1aeda6ec35f1076db6b88da73f670640_JaffaCakes118.exe
-
Size
160KB
-
MD5
1aeda6ec35f1076db6b88da73f670640
-
SHA1
8c77c2a2ed7e7d800b266fb09c03d913e863771d
-
SHA256
226d19ed695c9b68d08266d31b7260129846f8c24096b6b6f52d6f3a47e5203a
-
SHA512
17c2a05cf4e8f0616c5e31d1b41c083b95583510962a4c08c0743656f0d69e9a8886f9dc3eadc1314b323db6dc82fe9cf5b2cb0c41876efcf11e941a80231fa0
-
SSDEEP
3072:uv/1tNNdyaiRScHtelmKjXgMmMSRwA0zhL4cLMw5YQHGgUpJLxM5:uvvd2Nh8XgMmNczTMAY0kpZE
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
Processes:
wnplt4.exepid process 2792 wnplt4.exe -
Executes dropped EXE 64 IoCs
Processes:
wnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exepid process 2736 wnplt4.exe 2792 wnplt4.exe 2472 wnplt4.exe 2948 wnplt4.exe 2548 wnplt4.exe 2560 wnplt4.exe 1848 wnplt4.exe 2268 wnplt4.exe 1740 wnplt4.exe 1044 wnplt4.exe 844 wnplt4.exe 568 wnplt4.exe 1868 wnplt4.exe 1544 wnplt4.exe 952 wnplt4.exe 1724 wnplt4.exe 2208 wnplt4.exe 1580 wnplt4.exe 3056 wnplt4.exe 2648 wnplt4.exe 2576 wnplt4.exe 2464 wnplt4.exe 1828 wnplt4.exe 1104 wnplt4.exe 2724 wnplt4.exe 2832 wnplt4.exe 1848 wnplt4.exe 2344 wnplt4.exe 1740 wnplt4.exe 544 wnplt4.exe 1224 wnplt4.exe 1468 wnplt4.exe 1132 wnplt4.exe 1056 wnplt4.exe 2272 wnplt4.exe 2888 wnplt4.exe 1952 wnplt4.exe 1600 wnplt4.exe 2604 wnplt4.exe 2780 wnplt4.exe 2452 wnplt4.exe 1908 wnplt4.exe 1764 wnplt4.exe 2628 wnplt4.exe 1192 wnplt4.exe 2800 wnplt4.exe 2672 wnplt4.exe 628 wnplt4.exe 2852 wnplt4.exe 692 wnplt4.exe 1084 wnplt4.exe 2052 wnplt4.exe 1680 wnplt4.exe 1856 wnplt4.exe 2272 wnplt4.exe 2540 wnplt4.exe 2988 wnplt4.exe 2592 wnplt4.exe 2640 wnplt4.exe 2576 wnplt4.exe 2164 wnplt4.exe 2520 wnplt4.exe 936 wnplt4.exe 852 wnplt4.exe -
Loads dropped DLL 64 IoCs
Processes:
1aeda6ec35f1076db6b88da73f670640_JaffaCakes118.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exepid process 3024 1aeda6ec35f1076db6b88da73f670640_JaffaCakes118.exe 3024 1aeda6ec35f1076db6b88da73f670640_JaffaCakes118.exe 2792 wnplt4.exe 2792 wnplt4.exe 2948 wnplt4.exe 2948 wnplt4.exe 2560 wnplt4.exe 2560 wnplt4.exe 2268 wnplt4.exe 2268 wnplt4.exe 1044 wnplt4.exe 1044 wnplt4.exe 568 wnplt4.exe 568 wnplt4.exe 1544 wnplt4.exe 1544 wnplt4.exe 1724 wnplt4.exe 1724 wnplt4.exe 1580 wnplt4.exe 1580 wnplt4.exe 2648 wnplt4.exe 2648 wnplt4.exe 2464 wnplt4.exe 2464 wnplt4.exe 1104 wnplt4.exe 1104 wnplt4.exe 2832 wnplt4.exe 2832 wnplt4.exe 2344 wnplt4.exe 2344 wnplt4.exe 544 wnplt4.exe 544 wnplt4.exe 1468 wnplt4.exe 1468 wnplt4.exe 1056 wnplt4.exe 1056 wnplt4.exe 2888 wnplt4.exe 2888 wnplt4.exe 1600 wnplt4.exe 1600 wnplt4.exe 2780 wnplt4.exe 2780 wnplt4.exe 1908 wnplt4.exe 1908 wnplt4.exe 2628 wnplt4.exe 2628 wnplt4.exe 2800 wnplt4.exe 2800 wnplt4.exe 628 wnplt4.exe 628 wnplt4.exe 692 wnplt4.exe 692 wnplt4.exe 2052 wnplt4.exe 2052 wnplt4.exe 1856 wnplt4.exe 1856 wnplt4.exe 2540 wnplt4.exe 2540 wnplt4.exe 2592 wnplt4.exe 2592 wnplt4.exe 2576 wnplt4.exe 2576 wnplt4.exe 2520 wnplt4.exe 2520 wnplt4.exe -
Processes:
resource yara_rule behavioral1/memory/3024-2-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/3024-8-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/3024-9-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/3024-7-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/3024-6-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/3024-4-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/3024-3-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/3024-22-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2792-33-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2792-34-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2792-32-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2792-40-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2948-51-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2948-50-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2948-49-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2948-57-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2560-68-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2560-75-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2268-86-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2268-92-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1044-103-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1044-109-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/568-121-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/568-126-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1544-138-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1544-143-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1724-155-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1724-160-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1580-172-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1580-178-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2648-188-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2648-195-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2464-207-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2464-213-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1104-224-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1104-230-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2832-241-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2832-247-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2344-257-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2344-260-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/544-270-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/544-273-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1468-283-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1468-286-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1056-296-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1056-299-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2888-309-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2888-312-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1600-322-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1600-325-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2780-335-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2780-338-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1908-348-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1908-351-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2628-360-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2628-364-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2800-374-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2800-377-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/628-387-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/628-390-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/692-400-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/692-403-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2052-413-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2052-416-0x0000000000400000-0x0000000000468000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
wnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exe1aeda6ec35f1076db6b88da73f670640_JaffaCakes118.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 1aeda6ec35f1076db6b88da73f670640_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wnplt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wnplt4.exe -
Drops file in System32 directory 64 IoCs
Processes:
wnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exedescription ioc process File opened for modification C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File created C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File created C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File created C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File opened for modification C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File opened for modification C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File opened for modification C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File created C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File opened for modification C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File opened for modification C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File opened for modification C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File opened for modification C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File opened for modification C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File created C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File created C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File opened for modification C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File created C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File opened for modification C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File opened for modification C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File created C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File created C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File created C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File created C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File opened for modification C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File created C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File opened for modification C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File created C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File opened for modification C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File opened for modification C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File created C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File created C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File opened for modification C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File created C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File created C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File created C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File created C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File opened for modification C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File opened for modification C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File created C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File opened for modification C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File opened for modification C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File opened for modification C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File opened for modification C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File opened for modification C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File created C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File created C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File opened for modification C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File opened for modification C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File created C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File opened for modification C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File opened for modification C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File created C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File opened for modification C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File opened for modification C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File created C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File opened for modification C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File opened for modification C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File created C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File created C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File created C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File created C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File created C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File opened for modification C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe File created C:\Windows\SysWOW64\wnplt4.exe wnplt4.exe -
Suspicious use of SetThreadContext 59 IoCs
Processes:
1aeda6ec35f1076db6b88da73f670640_JaffaCakes118.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exedescription pid process target process PID 2916 set thread context of 3024 2916 1aeda6ec35f1076db6b88da73f670640_JaffaCakes118.exe 1aeda6ec35f1076db6b88da73f670640_JaffaCakes118.exe PID 2736 set thread context of 2792 2736 wnplt4.exe wnplt4.exe PID 2472 set thread context of 2948 2472 wnplt4.exe wnplt4.exe PID 2548 set thread context of 2560 2548 wnplt4.exe wnplt4.exe PID 1848 set thread context of 2268 1848 wnplt4.exe wnplt4.exe PID 1740 set thread context of 1044 1740 wnplt4.exe wnplt4.exe PID 844 set thread context of 568 844 wnplt4.exe wnplt4.exe PID 1868 set thread context of 1544 1868 wnplt4.exe wnplt4.exe PID 952 set thread context of 1724 952 wnplt4.exe wnplt4.exe PID 2208 set thread context of 1580 2208 wnplt4.exe wnplt4.exe PID 3056 set thread context of 2648 3056 wnplt4.exe wnplt4.exe PID 2576 set thread context of 2464 2576 wnplt4.exe wnplt4.exe PID 1828 set thread context of 1104 1828 wnplt4.exe wnplt4.exe PID 2724 set thread context of 2832 2724 wnplt4.exe wnplt4.exe PID 1848 set thread context of 2344 1848 wnplt4.exe wnplt4.exe PID 1740 set thread context of 544 1740 wnplt4.exe wnplt4.exe PID 1224 set thread context of 1468 1224 wnplt4.exe wnplt4.exe PID 1132 set thread context of 1056 1132 wnplt4.exe wnplt4.exe PID 2272 set thread context of 2888 2272 wnplt4.exe wnplt4.exe PID 1952 set thread context of 1600 1952 wnplt4.exe wnplt4.exe PID 2604 set thread context of 2780 2604 wnplt4.exe wnplt4.exe PID 2452 set thread context of 1908 2452 wnplt4.exe wnplt4.exe PID 1764 set thread context of 2628 1764 wnplt4.exe wnplt4.exe PID 1192 set thread context of 2800 1192 wnplt4.exe wnplt4.exe PID 2672 set thread context of 628 2672 wnplt4.exe wnplt4.exe PID 2852 set thread context of 692 2852 wnplt4.exe wnplt4.exe PID 1084 set thread context of 2052 1084 wnplt4.exe wnplt4.exe PID 1680 set thread context of 1856 1680 wnplt4.exe wnplt4.exe PID 2272 set thread context of 2540 2272 wnplt4.exe wnplt4.exe PID 2988 set thread context of 2592 2988 wnplt4.exe wnplt4.exe PID 2640 set thread context of 2576 2640 wnplt4.exe wnplt4.exe PID 2164 set thread context of 2520 2164 wnplt4.exe wnplt4.exe PID 936 set thread context of 852 936 wnplt4.exe wnplt4.exe PID 1692 set thread context of 3064 1692 wnplt4.exe wnplt4.exe PID 1092 set thread context of 2244 1092 wnplt4.exe wnplt4.exe PID 2852 set thread context of 844 2852 wnplt4.exe wnplt4.exe PID 240 set thread context of 2392 240 wnplt4.exe wnplt4.exe PID 1896 set thread context of 1064 1896 wnplt4.exe wnplt4.exe PID 3020 set thread context of 2272 3020 wnplt4.exe wnplt4.exe PID 892 set thread context of 2988 892 wnplt4.exe wnplt4.exe PID 2604 set thread context of 2640 2604 wnplt4.exe wnplt4.exe PID 2504 set thread context of 2348 2504 wnplt4.exe wnplt4.exe PID 940 set thread context of 1308 940 wnplt4.exe wnplt4.exe PID 2196 set thread context of 2184 2196 wnplt4.exe wnplt4.exe PID 1748 set thread context of 336 1748 wnplt4.exe wnplt4.exe PID 588 set thread context of 1728 588 wnplt4.exe wnplt4.exe PID 836 set thread context of 2100 836 wnplt4.exe wnplt4.exe PID 2880 set thread context of 1176 2880 wnplt4.exe wnplt4.exe PID 1440 set thread context of 3068 1440 wnplt4.exe wnplt4.exe PID 688 set thread context of 608 688 wnplt4.exe wnplt4.exe PID 2764 set thread context of 2924 2764 wnplt4.exe wnplt4.exe PID 2164 set thread context of 1456 2164 wnplt4.exe wnplt4.exe PID 2712 set thread context of 2972 2712 wnplt4.exe wnplt4.exe PID 1632 set thread context of 1712 1632 wnplt4.exe wnplt4.exe PID 868 set thread context of 1740 868 wnplt4.exe wnplt4.exe PID 1820 set thread context of 1084 1820 wnplt4.exe wnplt4.exe PID 2160 set thread context of 996 2160 wnplt4.exe wnplt4.exe PID 1536 set thread context of 1416 1536 wnplt4.exe wnplt4.exe PID 1200 set thread context of 1720 1200 wnplt4.exe wnplt4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 59 IoCs
Processes:
1aeda6ec35f1076db6b88da73f670640_JaffaCakes118.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exepid process 3024 1aeda6ec35f1076db6b88da73f670640_JaffaCakes118.exe 2792 wnplt4.exe 2948 wnplt4.exe 2560 wnplt4.exe 2268 wnplt4.exe 1044 wnplt4.exe 568 wnplt4.exe 1544 wnplt4.exe 1724 wnplt4.exe 1580 wnplt4.exe 2648 wnplt4.exe 2464 wnplt4.exe 1104 wnplt4.exe 2832 wnplt4.exe 2344 wnplt4.exe 544 wnplt4.exe 1468 wnplt4.exe 1056 wnplt4.exe 2888 wnplt4.exe 1600 wnplt4.exe 2780 wnplt4.exe 1908 wnplt4.exe 2628 wnplt4.exe 2800 wnplt4.exe 628 wnplt4.exe 692 wnplt4.exe 2052 wnplt4.exe 1856 wnplt4.exe 2540 wnplt4.exe 2592 wnplt4.exe 2576 wnplt4.exe 2520 wnplt4.exe 852 wnplt4.exe 3064 wnplt4.exe 2244 wnplt4.exe 844 wnplt4.exe 2392 wnplt4.exe 1064 wnplt4.exe 2272 wnplt4.exe 2988 wnplt4.exe 2640 wnplt4.exe 2348 wnplt4.exe 1308 wnplt4.exe 2184 wnplt4.exe 336 wnplt4.exe 1728 wnplt4.exe 2100 wnplt4.exe 1176 wnplt4.exe 3068 wnplt4.exe 608 wnplt4.exe 2924 wnplt4.exe 1456 wnplt4.exe 2972 wnplt4.exe 1712 wnplt4.exe 1740 wnplt4.exe 1084 wnplt4.exe 996 wnplt4.exe 1416 wnplt4.exe 1720 wnplt4.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1aeda6ec35f1076db6b88da73f670640_JaffaCakes118.exe1aeda6ec35f1076db6b88da73f670640_JaffaCakes118.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exewnplt4.exedescription pid process target process PID 2916 wrote to memory of 3024 2916 1aeda6ec35f1076db6b88da73f670640_JaffaCakes118.exe 1aeda6ec35f1076db6b88da73f670640_JaffaCakes118.exe PID 2916 wrote to memory of 3024 2916 1aeda6ec35f1076db6b88da73f670640_JaffaCakes118.exe 1aeda6ec35f1076db6b88da73f670640_JaffaCakes118.exe PID 2916 wrote to memory of 3024 2916 1aeda6ec35f1076db6b88da73f670640_JaffaCakes118.exe 1aeda6ec35f1076db6b88da73f670640_JaffaCakes118.exe PID 2916 wrote to memory of 3024 2916 1aeda6ec35f1076db6b88da73f670640_JaffaCakes118.exe 1aeda6ec35f1076db6b88da73f670640_JaffaCakes118.exe PID 2916 wrote to memory of 3024 2916 1aeda6ec35f1076db6b88da73f670640_JaffaCakes118.exe 1aeda6ec35f1076db6b88da73f670640_JaffaCakes118.exe PID 2916 wrote to memory of 3024 2916 1aeda6ec35f1076db6b88da73f670640_JaffaCakes118.exe 1aeda6ec35f1076db6b88da73f670640_JaffaCakes118.exe PID 2916 wrote to memory of 3024 2916 1aeda6ec35f1076db6b88da73f670640_JaffaCakes118.exe 1aeda6ec35f1076db6b88da73f670640_JaffaCakes118.exe PID 3024 wrote to memory of 2736 3024 1aeda6ec35f1076db6b88da73f670640_JaffaCakes118.exe wnplt4.exe PID 3024 wrote to memory of 2736 3024 1aeda6ec35f1076db6b88da73f670640_JaffaCakes118.exe wnplt4.exe PID 3024 wrote to memory of 2736 3024 1aeda6ec35f1076db6b88da73f670640_JaffaCakes118.exe wnplt4.exe PID 3024 wrote to memory of 2736 3024 1aeda6ec35f1076db6b88da73f670640_JaffaCakes118.exe wnplt4.exe PID 2736 wrote to memory of 2792 2736 wnplt4.exe wnplt4.exe PID 2736 wrote to memory of 2792 2736 wnplt4.exe wnplt4.exe PID 2736 wrote to memory of 2792 2736 wnplt4.exe wnplt4.exe PID 2736 wrote to memory of 2792 2736 wnplt4.exe wnplt4.exe PID 2736 wrote to memory of 2792 2736 wnplt4.exe wnplt4.exe PID 2736 wrote to memory of 2792 2736 wnplt4.exe wnplt4.exe PID 2736 wrote to memory of 2792 2736 wnplt4.exe wnplt4.exe PID 2792 wrote to memory of 2472 2792 wnplt4.exe wnplt4.exe PID 2792 wrote to memory of 2472 2792 wnplt4.exe wnplt4.exe PID 2792 wrote to memory of 2472 2792 wnplt4.exe wnplt4.exe PID 2792 wrote to memory of 2472 2792 wnplt4.exe wnplt4.exe PID 2472 wrote to memory of 2948 2472 wnplt4.exe wnplt4.exe PID 2472 wrote to memory of 2948 2472 wnplt4.exe wnplt4.exe PID 2472 wrote to memory of 2948 2472 wnplt4.exe wnplt4.exe PID 2472 wrote to memory of 2948 2472 wnplt4.exe wnplt4.exe PID 2472 wrote to memory of 2948 2472 wnplt4.exe wnplt4.exe PID 2472 wrote to memory of 2948 2472 wnplt4.exe wnplt4.exe PID 2472 wrote to memory of 2948 2472 wnplt4.exe wnplt4.exe PID 2948 wrote to memory of 2548 2948 wnplt4.exe wnplt4.exe PID 2948 wrote to memory of 2548 2948 wnplt4.exe wnplt4.exe PID 2948 wrote to memory of 2548 2948 wnplt4.exe wnplt4.exe PID 2948 wrote to memory of 2548 2948 wnplt4.exe wnplt4.exe PID 2548 wrote to memory of 2560 2548 wnplt4.exe wnplt4.exe PID 2548 wrote to memory of 2560 2548 wnplt4.exe wnplt4.exe PID 2548 wrote to memory of 2560 2548 wnplt4.exe wnplt4.exe PID 2548 wrote to memory of 2560 2548 wnplt4.exe wnplt4.exe PID 2548 wrote to memory of 2560 2548 wnplt4.exe wnplt4.exe PID 2548 wrote to memory of 2560 2548 wnplt4.exe wnplt4.exe PID 2548 wrote to memory of 2560 2548 wnplt4.exe wnplt4.exe PID 2560 wrote to memory of 1848 2560 wnplt4.exe wnplt4.exe PID 2560 wrote to memory of 1848 2560 wnplt4.exe wnplt4.exe PID 2560 wrote to memory of 1848 2560 wnplt4.exe wnplt4.exe PID 2560 wrote to memory of 1848 2560 wnplt4.exe wnplt4.exe PID 1848 wrote to memory of 2268 1848 wnplt4.exe wnplt4.exe PID 1848 wrote to memory of 2268 1848 wnplt4.exe wnplt4.exe PID 1848 wrote to memory of 2268 1848 wnplt4.exe wnplt4.exe PID 1848 wrote to memory of 2268 1848 wnplt4.exe wnplt4.exe PID 1848 wrote to memory of 2268 1848 wnplt4.exe wnplt4.exe PID 1848 wrote to memory of 2268 1848 wnplt4.exe wnplt4.exe PID 1848 wrote to memory of 2268 1848 wnplt4.exe wnplt4.exe PID 2268 wrote to memory of 1740 2268 wnplt4.exe wnplt4.exe PID 2268 wrote to memory of 1740 2268 wnplt4.exe wnplt4.exe PID 2268 wrote to memory of 1740 2268 wnplt4.exe wnplt4.exe PID 2268 wrote to memory of 1740 2268 wnplt4.exe wnplt4.exe PID 1740 wrote to memory of 1044 1740 wnplt4.exe wnplt4.exe PID 1740 wrote to memory of 1044 1740 wnplt4.exe wnplt4.exe PID 1740 wrote to memory of 1044 1740 wnplt4.exe wnplt4.exe PID 1740 wrote to memory of 1044 1740 wnplt4.exe wnplt4.exe PID 1740 wrote to memory of 1044 1740 wnplt4.exe wnplt4.exe PID 1740 wrote to memory of 1044 1740 wnplt4.exe wnplt4.exe PID 1740 wrote to memory of 1044 1740 wnplt4.exe wnplt4.exe PID 1044 wrote to memory of 844 1044 wnplt4.exe wnplt4.exe PID 1044 wrote to memory of 844 1044 wnplt4.exe wnplt4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1aeda6ec35f1076db6b88da73f670640_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1aeda6ec35f1076db6b88da73f670640_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1aeda6ec35f1076db6b88da73f670640_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1aeda6ec35f1076db6b88da73f670640_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Users\Admin\AppData\Local\Temp\1AEDA6~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Users\Admin\AppData\Local\Temp\1AEDA6~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe34⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe36⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe38⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe40⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe42⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe44⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe46⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe48⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe50⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe52⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe54⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe56⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe58⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe60⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe62⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe64⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe66⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe67⤵
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe68⤵
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe69⤵
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe70⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe71⤵
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe72⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe73⤵
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe74⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe75⤵
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe76⤵
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe77⤵
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe78⤵
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe79⤵
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe80⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe81⤵
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe82⤵
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe83⤵
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe84⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe85⤵
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe86⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe87⤵
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe88⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe89⤵
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe90⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe91⤵
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe92⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe93⤵
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe94⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe95⤵
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe96⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe97⤵
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe98⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe99⤵
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe100⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe101⤵
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe102⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe103⤵
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe104⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe105⤵
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe106⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe107⤵
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe108⤵
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe109⤵
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe110⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe111⤵
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe112⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe113⤵
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe114⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe115⤵
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe116⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe117⤵
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\wnplt4.exe"C:\Windows\system32\wnplt4.exe" C:\Windows\SysWOW64\wnplt4.exe118⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Windows\SysWOW64\wnplt4.exeFilesize
160KB
MD51aeda6ec35f1076db6b88da73f670640
SHA18c77c2a2ed7e7d800b266fb09c03d913e863771d
SHA256226d19ed695c9b68d08266d31b7260129846f8c24096b6b6f52d6f3a47e5203a
SHA51217c2a05cf4e8f0616c5e31d1b41c083b95583510962a4c08c0743656f0d69e9a8886f9dc3eadc1314b323db6dc82fe9cf5b2cb0c41876efcf11e941a80231fa0
-
memory/336-647-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/336-650-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/544-273-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/544-270-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/568-121-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/568-126-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/628-390-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/628-387-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/692-403-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/692-400-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/844-533-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/844-529-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/852-491-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/852-494-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/1044-103-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/1044-109-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/1056-296-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/1056-299-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/1064-559-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/1064-556-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/1104-230-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/1104-224-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/1176-689-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/1176-686-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/1308-624-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/1308-621-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/1468-283-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/1468-286-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/1544-138-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/1544-143-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/1580-172-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/1580-178-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/1600-325-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/1600-322-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/1724-155-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/1724-160-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/1728-663-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/1728-660-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/1856-426-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/1856-429-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/1908-351-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/1908-348-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2052-416-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2052-413-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2100-676-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2100-672-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2184-637-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2184-634-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2244-520-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2244-517-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2268-92-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2268-86-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2272-572-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2272-569-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2344-260-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2344-257-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2348-608-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2348-611-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2392-543-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2392-546-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2464-207-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2464-213-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2520-481-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2520-478-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2540-439-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2540-442-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2560-68-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2560-75-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2576-465-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2576-468-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2592-452-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2592-455-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2628-364-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2628-360-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2640-595-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2640-598-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2648-195-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2648-188-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2780-338-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2780-335-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2792-33-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2792-34-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2792-32-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2792-40-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2800-374-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2800-377-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2832-247-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2832-241-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2888-309-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2888-312-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2948-51-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2948-57-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2948-50-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2948-49-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2988-585-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2988-582-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/3024-2-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/3024-22-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/3024-3-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/3024-0-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/3024-4-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/3024-6-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/3024-7-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/3024-9-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/3024-8-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/3064-504-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/3064-507-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB