Analysis
-
max time kernel
147s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 04:34
Static task
static1
Behavioral task
behavioral1
Sample
f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe
-
Size
168KB
-
MD5
f747007de3cb01e70c1170572951cecc
-
SHA1
6f683e1b46bb7aa6cf4939d02fc2a8d0b2411fe5
-
SHA256
5b3e37227741161c58a39386fc7d48013ad2d4a43b3826f1cc35d2bb40e0b44c
-
SHA512
d1ce4370a17b1904188846e25b13487762e1228b99e312371aaf0144f87c3cb85776d8508c3e7f6b385b2d0a8c64388df0d927bc91e1e7495f3679d96c37f95a
-
SSDEEP
3072:dIM4k11DfZS5sXm7mgD1Z+cqw6/BiuDVH3rO20ME4p80OhKdC:aG11Df/XomgT+a6/B/Zsd0goC
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
Processes:
igfxwk32.exepid process 2740 igfxwk32.exe -
Executes dropped EXE 31 IoCs
Processes:
igfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exepid process 2960 igfxwk32.exe 2740 igfxwk32.exe 2636 igfxwk32.exe 1736 igfxwk32.exe 1704 igfxwk32.exe 1468 igfxwk32.exe 1892 igfxwk32.exe 2380 igfxwk32.exe 2348 igfxwk32.exe 2088 igfxwk32.exe 1172 igfxwk32.exe 576 igfxwk32.exe 1900 igfxwk32.exe 2168 igfxwk32.exe 1792 igfxwk32.exe 1848 igfxwk32.exe 2296 igfxwk32.exe 2544 igfxwk32.exe 1412 igfxwk32.exe 2028 igfxwk32.exe 3048 igfxwk32.exe 2796 igfxwk32.exe 2960 igfxwk32.exe 2476 igfxwk32.exe 2880 igfxwk32.exe 2864 igfxwk32.exe 1316 igfxwk32.exe 812 igfxwk32.exe 1972 igfxwk32.exe 1960 igfxwk32.exe 1348 igfxwk32.exe -
Loads dropped DLL 31 IoCs
Processes:
f747007de3cb01e70c1170572951cecc_JaffaCakes118.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exepid process 2956 f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe 2960 igfxwk32.exe 2740 igfxwk32.exe 2636 igfxwk32.exe 1736 igfxwk32.exe 1704 igfxwk32.exe 1468 igfxwk32.exe 1892 igfxwk32.exe 2380 igfxwk32.exe 2348 igfxwk32.exe 2088 igfxwk32.exe 1172 igfxwk32.exe 576 igfxwk32.exe 1900 igfxwk32.exe 2168 igfxwk32.exe 1792 igfxwk32.exe 1848 igfxwk32.exe 2296 igfxwk32.exe 2544 igfxwk32.exe 1412 igfxwk32.exe 2028 igfxwk32.exe 3048 igfxwk32.exe 2796 igfxwk32.exe 2960 igfxwk32.exe 2476 igfxwk32.exe 2880 igfxwk32.exe 2864 igfxwk32.exe 1316 igfxwk32.exe 812 igfxwk32.exe 1972 igfxwk32.exe 1960 igfxwk32.exe -
Processes:
resource yara_rule behavioral1/memory/2956-2-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2956-3-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2956-4-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2956-6-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2956-8-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2956-7-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2956-16-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2740-28-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2740-27-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2740-30-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2740-29-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2740-33-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1736-47-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1468-63-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2380-74-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2380-79-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2088-97-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/576-113-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2168-130-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1848-146-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2544-162-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2028-179-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2796-195-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2476-212-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2864-228-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/812-241-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1960-250-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1960-254-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 32 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
igfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exef747007de3cb01e70c1170572951cecc_JaffaCakes118.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe -
Drops file in System32 directory 48 IoCs
Processes:
igfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exef747007de3cb01e70c1170572951cecc_JaffaCakes118.exeigfxwk32.exeigfxwk32.exeigfxwk32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxwk32.exe f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe -
Suspicious use of SetThreadContext 16 IoCs
Processes:
f747007de3cb01e70c1170572951cecc_JaffaCakes118.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exedescription pid process target process PID 1968 set thread context of 2956 1968 f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe PID 2960 set thread context of 2740 2960 igfxwk32.exe igfxwk32.exe PID 2636 set thread context of 1736 2636 igfxwk32.exe igfxwk32.exe PID 1704 set thread context of 1468 1704 igfxwk32.exe igfxwk32.exe PID 1892 set thread context of 2380 1892 igfxwk32.exe igfxwk32.exe PID 2348 set thread context of 2088 2348 igfxwk32.exe igfxwk32.exe PID 1172 set thread context of 576 1172 igfxwk32.exe igfxwk32.exe PID 1900 set thread context of 2168 1900 igfxwk32.exe igfxwk32.exe PID 1792 set thread context of 1848 1792 igfxwk32.exe igfxwk32.exe PID 2296 set thread context of 2544 2296 igfxwk32.exe igfxwk32.exe PID 1412 set thread context of 2028 1412 igfxwk32.exe igfxwk32.exe PID 3048 set thread context of 2796 3048 igfxwk32.exe igfxwk32.exe PID 2960 set thread context of 2476 2960 igfxwk32.exe igfxwk32.exe PID 2880 set thread context of 2864 2880 igfxwk32.exe igfxwk32.exe PID 1316 set thread context of 812 1316 igfxwk32.exe igfxwk32.exe PID 1972 set thread context of 1960 1972 igfxwk32.exe igfxwk32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 32 IoCs
Processes:
f747007de3cb01e70c1170572951cecc_JaffaCakes118.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exepid process 2956 f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe 2956 f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe 2740 igfxwk32.exe 2740 igfxwk32.exe 1736 igfxwk32.exe 1736 igfxwk32.exe 1468 igfxwk32.exe 1468 igfxwk32.exe 2380 igfxwk32.exe 2380 igfxwk32.exe 2088 igfxwk32.exe 2088 igfxwk32.exe 576 igfxwk32.exe 576 igfxwk32.exe 2168 igfxwk32.exe 2168 igfxwk32.exe 1848 igfxwk32.exe 1848 igfxwk32.exe 2544 igfxwk32.exe 2544 igfxwk32.exe 2028 igfxwk32.exe 2028 igfxwk32.exe 2796 igfxwk32.exe 2796 igfxwk32.exe 2476 igfxwk32.exe 2476 igfxwk32.exe 2864 igfxwk32.exe 2864 igfxwk32.exe 812 igfxwk32.exe 812 igfxwk32.exe 1960 igfxwk32.exe 1960 igfxwk32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
f747007de3cb01e70c1170572951cecc_JaffaCakes118.exef747007de3cb01e70c1170572951cecc_JaffaCakes118.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exedescription pid process target process PID 1968 wrote to memory of 2956 1968 f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe PID 1968 wrote to memory of 2956 1968 f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe PID 1968 wrote to memory of 2956 1968 f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe PID 1968 wrote to memory of 2956 1968 f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe PID 1968 wrote to memory of 2956 1968 f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe PID 1968 wrote to memory of 2956 1968 f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe PID 1968 wrote to memory of 2956 1968 f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe PID 2956 wrote to memory of 2960 2956 f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe igfxwk32.exe PID 2956 wrote to memory of 2960 2956 f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe igfxwk32.exe PID 2956 wrote to memory of 2960 2956 f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe igfxwk32.exe PID 2956 wrote to memory of 2960 2956 f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe igfxwk32.exe PID 2960 wrote to memory of 2740 2960 igfxwk32.exe igfxwk32.exe PID 2960 wrote to memory of 2740 2960 igfxwk32.exe igfxwk32.exe PID 2960 wrote to memory of 2740 2960 igfxwk32.exe igfxwk32.exe PID 2960 wrote to memory of 2740 2960 igfxwk32.exe igfxwk32.exe PID 2960 wrote to memory of 2740 2960 igfxwk32.exe igfxwk32.exe PID 2960 wrote to memory of 2740 2960 igfxwk32.exe igfxwk32.exe PID 2960 wrote to memory of 2740 2960 igfxwk32.exe igfxwk32.exe PID 2740 wrote to memory of 2636 2740 igfxwk32.exe igfxwk32.exe PID 2740 wrote to memory of 2636 2740 igfxwk32.exe igfxwk32.exe PID 2740 wrote to memory of 2636 2740 igfxwk32.exe igfxwk32.exe PID 2740 wrote to memory of 2636 2740 igfxwk32.exe igfxwk32.exe PID 2636 wrote to memory of 1736 2636 igfxwk32.exe igfxwk32.exe PID 2636 wrote to memory of 1736 2636 igfxwk32.exe igfxwk32.exe PID 2636 wrote to memory of 1736 2636 igfxwk32.exe igfxwk32.exe PID 2636 wrote to memory of 1736 2636 igfxwk32.exe igfxwk32.exe PID 2636 wrote to memory of 1736 2636 igfxwk32.exe igfxwk32.exe PID 2636 wrote to memory of 1736 2636 igfxwk32.exe igfxwk32.exe PID 2636 wrote to memory of 1736 2636 igfxwk32.exe igfxwk32.exe PID 1736 wrote to memory of 1704 1736 igfxwk32.exe igfxwk32.exe PID 1736 wrote to memory of 1704 1736 igfxwk32.exe igfxwk32.exe PID 1736 wrote to memory of 1704 1736 igfxwk32.exe igfxwk32.exe PID 1736 wrote to memory of 1704 1736 igfxwk32.exe igfxwk32.exe PID 1704 wrote to memory of 1468 1704 igfxwk32.exe igfxwk32.exe PID 1704 wrote to memory of 1468 1704 igfxwk32.exe igfxwk32.exe PID 1704 wrote to memory of 1468 1704 igfxwk32.exe igfxwk32.exe PID 1704 wrote to memory of 1468 1704 igfxwk32.exe igfxwk32.exe PID 1704 wrote to memory of 1468 1704 igfxwk32.exe igfxwk32.exe PID 1704 wrote to memory of 1468 1704 igfxwk32.exe igfxwk32.exe PID 1704 wrote to memory of 1468 1704 igfxwk32.exe igfxwk32.exe PID 1468 wrote to memory of 1892 1468 igfxwk32.exe igfxwk32.exe PID 1468 wrote to memory of 1892 1468 igfxwk32.exe igfxwk32.exe PID 1468 wrote to memory of 1892 1468 igfxwk32.exe igfxwk32.exe PID 1468 wrote to memory of 1892 1468 igfxwk32.exe igfxwk32.exe PID 1892 wrote to memory of 2380 1892 igfxwk32.exe igfxwk32.exe PID 1892 wrote to memory of 2380 1892 igfxwk32.exe igfxwk32.exe PID 1892 wrote to memory of 2380 1892 igfxwk32.exe igfxwk32.exe PID 1892 wrote to memory of 2380 1892 igfxwk32.exe igfxwk32.exe PID 1892 wrote to memory of 2380 1892 igfxwk32.exe igfxwk32.exe PID 1892 wrote to memory of 2380 1892 igfxwk32.exe igfxwk32.exe PID 1892 wrote to memory of 2380 1892 igfxwk32.exe igfxwk32.exe PID 2380 wrote to memory of 2348 2380 igfxwk32.exe igfxwk32.exe PID 2380 wrote to memory of 2348 2380 igfxwk32.exe igfxwk32.exe PID 2380 wrote to memory of 2348 2380 igfxwk32.exe igfxwk32.exe PID 2380 wrote to memory of 2348 2380 igfxwk32.exe igfxwk32.exe PID 2348 wrote to memory of 2088 2348 igfxwk32.exe igfxwk32.exe PID 2348 wrote to memory of 2088 2348 igfxwk32.exe igfxwk32.exe PID 2348 wrote to memory of 2088 2348 igfxwk32.exe igfxwk32.exe PID 2348 wrote to memory of 2088 2348 igfxwk32.exe igfxwk32.exe PID 2348 wrote to memory of 2088 2348 igfxwk32.exe igfxwk32.exe PID 2348 wrote to memory of 2088 2348 igfxwk32.exe igfxwk32.exe PID 2348 wrote to memory of 2088 2348 igfxwk32.exe igfxwk32.exe PID 2088 wrote to memory of 1172 2088 igfxwk32.exe igfxwk32.exe PID 2088 wrote to memory of 1172 2088 igfxwk32.exe igfxwk32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Users\Admin\AppData\Local\Temp\F74700~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Users\Admin\AppData\Local\Temp\F74700~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1172 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:576 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1900 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2168 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1792 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1848 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2296 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2544 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1412 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2028 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:3048 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2796 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2960 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2476 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2880 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2864 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1316 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:812 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1972 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1960 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe33⤵
- Executes dropped EXE
PID:1348
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
168KB
MD5f747007de3cb01e70c1170572951cecc
SHA16f683e1b46bb7aa6cf4939d02fc2a8d0b2411fe5
SHA2565b3e37227741161c58a39386fc7d48013ad2d4a43b3826f1cc35d2bb40e0b44c
SHA512d1ce4370a17b1904188846e25b13487762e1228b99e312371aaf0144f87c3cb85776d8508c3e7f6b385b2d0a8c64388df0d927bc91e1e7495f3679d96c37f95a