Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18-04-2024 04:34
Static task
static1
Behavioral task
behavioral1
Sample
f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe
-
Size
168KB
-
MD5
f747007de3cb01e70c1170572951cecc
-
SHA1
6f683e1b46bb7aa6cf4939d02fc2a8d0b2411fe5
-
SHA256
5b3e37227741161c58a39386fc7d48013ad2d4a43b3826f1cc35d2bb40e0b44c
-
SHA512
d1ce4370a17b1904188846e25b13487762e1228b99e312371aaf0144f87c3cb85776d8508c3e7f6b385b2d0a8c64388df0d927bc91e1e7495f3679d96c37f95a
-
SSDEEP
3072:dIM4k11DfZS5sXm7mgD1Z+cqw6/BiuDVH3rO20ME4p80OhKdC:aG11Df/XomgT+a6/B/Zsd0goC
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings 2 TTPs 15 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
igfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exef747007de3cb01e70c1170572951cecc_JaffaCakes118.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation igfxwk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation igfxwk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation igfxwk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation igfxwk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation igfxwk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation igfxwk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation igfxwk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation igfxwk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation igfxwk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation igfxwk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation igfxwk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation igfxwk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation igfxwk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation igfxwk32.exe -
Deletes itself 1 IoCs
Processes:
igfxwk32.exepid process 700 igfxwk32.exe -
Executes dropped EXE 29 IoCs
Processes:
igfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exepid process 2852 igfxwk32.exe 700 igfxwk32.exe 2584 igfxwk32.exe 5032 igfxwk32.exe 4664 igfxwk32.exe 3840 igfxwk32.exe 2264 igfxwk32.exe 1600 igfxwk32.exe 3148 igfxwk32.exe 4544 igfxwk32.exe 1660 igfxwk32.exe 4600 igfxwk32.exe 4240 igfxwk32.exe 2404 igfxwk32.exe 1092 igfxwk32.exe 1648 igfxwk32.exe 4988 igfxwk32.exe 4872 igfxwk32.exe 2012 igfxwk32.exe 5016 igfxwk32.exe 5056 igfxwk32.exe 4844 igfxwk32.exe 1216 igfxwk32.exe 3412 igfxwk32.exe 4040 igfxwk32.exe 4488 igfxwk32.exe 2760 igfxwk32.exe 3548 igfxwk32.exe 5048 igfxwk32.exe -
Processes:
resource yara_rule behavioral2/memory/1500-0-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1500-2-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1500-4-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1500-3-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1500-38-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/700-44-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/700-47-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/5032-54-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/5032-55-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3840-63-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3840-65-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1600-72-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1600-74-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4544-81-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4544-84-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4600-91-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4600-93-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2404-100-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2404-101-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1648-109-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1648-112-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4872-119-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4872-121-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/5016-127-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/5016-132-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4844-138-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4844-142-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3412-147-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3412-152-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4488-158-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4488-162-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3548-168-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3548-172-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 30 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
igfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exef747007de3cb01e70c1170572951cecc_JaffaCakes118.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe -
Drops file in System32 directory 45 IoCs
Processes:
igfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exef747007de3cb01e70c1170572951cecc_JaffaCakes118.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe -
Suspicious use of SetThreadContext 15 IoCs
Processes:
f747007de3cb01e70c1170572951cecc_JaffaCakes118.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exedescription pid process target process PID 4360 set thread context of 1500 4360 f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe PID 2852 set thread context of 700 2852 igfxwk32.exe igfxwk32.exe PID 2584 set thread context of 5032 2584 igfxwk32.exe igfxwk32.exe PID 4664 set thread context of 3840 4664 igfxwk32.exe igfxwk32.exe PID 2264 set thread context of 1600 2264 igfxwk32.exe igfxwk32.exe PID 3148 set thread context of 4544 3148 igfxwk32.exe igfxwk32.exe PID 1660 set thread context of 4600 1660 igfxwk32.exe igfxwk32.exe PID 4240 set thread context of 2404 4240 igfxwk32.exe igfxwk32.exe PID 1092 set thread context of 1648 1092 igfxwk32.exe igfxwk32.exe PID 4988 set thread context of 4872 4988 igfxwk32.exe igfxwk32.exe PID 2012 set thread context of 5016 2012 igfxwk32.exe igfxwk32.exe PID 5056 set thread context of 4844 5056 igfxwk32.exe igfxwk32.exe PID 1216 set thread context of 3412 1216 igfxwk32.exe igfxwk32.exe PID 4040 set thread context of 4488 4040 igfxwk32.exe igfxwk32.exe PID 2760 set thread context of 3548 2760 igfxwk32.exe igfxwk32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 15 IoCs
Processes:
igfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exef747007de3cb01e70c1170572951cecc_JaffaCakes118.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwk32.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
Processes:
f747007de3cb01e70c1170572951cecc_JaffaCakes118.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exepid process 1500 f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe 1500 f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe 1500 f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe 1500 f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe 700 igfxwk32.exe 700 igfxwk32.exe 700 igfxwk32.exe 700 igfxwk32.exe 5032 igfxwk32.exe 5032 igfxwk32.exe 5032 igfxwk32.exe 5032 igfxwk32.exe 3840 igfxwk32.exe 3840 igfxwk32.exe 3840 igfxwk32.exe 3840 igfxwk32.exe 1600 igfxwk32.exe 1600 igfxwk32.exe 1600 igfxwk32.exe 1600 igfxwk32.exe 4544 igfxwk32.exe 4544 igfxwk32.exe 4544 igfxwk32.exe 4544 igfxwk32.exe 4600 igfxwk32.exe 4600 igfxwk32.exe 4600 igfxwk32.exe 4600 igfxwk32.exe 2404 igfxwk32.exe 2404 igfxwk32.exe 2404 igfxwk32.exe 2404 igfxwk32.exe 1648 igfxwk32.exe 1648 igfxwk32.exe 1648 igfxwk32.exe 1648 igfxwk32.exe 4872 igfxwk32.exe 4872 igfxwk32.exe 4872 igfxwk32.exe 4872 igfxwk32.exe 5016 igfxwk32.exe 5016 igfxwk32.exe 5016 igfxwk32.exe 5016 igfxwk32.exe 4844 igfxwk32.exe 4844 igfxwk32.exe 4844 igfxwk32.exe 4844 igfxwk32.exe 3412 igfxwk32.exe 3412 igfxwk32.exe 3412 igfxwk32.exe 3412 igfxwk32.exe 4488 igfxwk32.exe 4488 igfxwk32.exe 4488 igfxwk32.exe 4488 igfxwk32.exe 3548 igfxwk32.exe 3548 igfxwk32.exe 3548 igfxwk32.exe 3548 igfxwk32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
f747007de3cb01e70c1170572951cecc_JaffaCakes118.exef747007de3cb01e70c1170572951cecc_JaffaCakes118.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exeigfxwk32.exedescription pid process target process PID 4360 wrote to memory of 1500 4360 f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe PID 4360 wrote to memory of 1500 4360 f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe PID 4360 wrote to memory of 1500 4360 f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe PID 4360 wrote to memory of 1500 4360 f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe PID 4360 wrote to memory of 1500 4360 f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe PID 4360 wrote to memory of 1500 4360 f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe PID 4360 wrote to memory of 1500 4360 f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe PID 1500 wrote to memory of 2852 1500 f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe igfxwk32.exe PID 1500 wrote to memory of 2852 1500 f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe igfxwk32.exe PID 1500 wrote to memory of 2852 1500 f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe igfxwk32.exe PID 2852 wrote to memory of 700 2852 igfxwk32.exe igfxwk32.exe PID 2852 wrote to memory of 700 2852 igfxwk32.exe igfxwk32.exe PID 2852 wrote to memory of 700 2852 igfxwk32.exe igfxwk32.exe PID 2852 wrote to memory of 700 2852 igfxwk32.exe igfxwk32.exe PID 2852 wrote to memory of 700 2852 igfxwk32.exe igfxwk32.exe PID 2852 wrote to memory of 700 2852 igfxwk32.exe igfxwk32.exe PID 2852 wrote to memory of 700 2852 igfxwk32.exe igfxwk32.exe PID 700 wrote to memory of 2584 700 igfxwk32.exe igfxwk32.exe PID 700 wrote to memory of 2584 700 igfxwk32.exe igfxwk32.exe PID 700 wrote to memory of 2584 700 igfxwk32.exe igfxwk32.exe PID 2584 wrote to memory of 5032 2584 igfxwk32.exe igfxwk32.exe PID 2584 wrote to memory of 5032 2584 igfxwk32.exe igfxwk32.exe PID 2584 wrote to memory of 5032 2584 igfxwk32.exe igfxwk32.exe PID 2584 wrote to memory of 5032 2584 igfxwk32.exe igfxwk32.exe PID 2584 wrote to memory of 5032 2584 igfxwk32.exe igfxwk32.exe PID 2584 wrote to memory of 5032 2584 igfxwk32.exe igfxwk32.exe PID 2584 wrote to memory of 5032 2584 igfxwk32.exe igfxwk32.exe PID 5032 wrote to memory of 4664 5032 igfxwk32.exe igfxwk32.exe PID 5032 wrote to memory of 4664 5032 igfxwk32.exe igfxwk32.exe PID 5032 wrote to memory of 4664 5032 igfxwk32.exe igfxwk32.exe PID 4664 wrote to memory of 3840 4664 igfxwk32.exe igfxwk32.exe PID 4664 wrote to memory of 3840 4664 igfxwk32.exe igfxwk32.exe PID 4664 wrote to memory of 3840 4664 igfxwk32.exe igfxwk32.exe PID 4664 wrote to memory of 3840 4664 igfxwk32.exe igfxwk32.exe PID 4664 wrote to memory of 3840 4664 igfxwk32.exe igfxwk32.exe PID 4664 wrote to memory of 3840 4664 igfxwk32.exe igfxwk32.exe PID 4664 wrote to memory of 3840 4664 igfxwk32.exe igfxwk32.exe PID 3840 wrote to memory of 2264 3840 igfxwk32.exe igfxwk32.exe PID 3840 wrote to memory of 2264 3840 igfxwk32.exe igfxwk32.exe PID 3840 wrote to memory of 2264 3840 igfxwk32.exe igfxwk32.exe PID 2264 wrote to memory of 1600 2264 igfxwk32.exe igfxwk32.exe PID 2264 wrote to memory of 1600 2264 igfxwk32.exe igfxwk32.exe PID 2264 wrote to memory of 1600 2264 igfxwk32.exe igfxwk32.exe PID 2264 wrote to memory of 1600 2264 igfxwk32.exe igfxwk32.exe PID 2264 wrote to memory of 1600 2264 igfxwk32.exe igfxwk32.exe PID 2264 wrote to memory of 1600 2264 igfxwk32.exe igfxwk32.exe PID 2264 wrote to memory of 1600 2264 igfxwk32.exe igfxwk32.exe PID 1600 wrote to memory of 3148 1600 igfxwk32.exe igfxwk32.exe PID 1600 wrote to memory of 3148 1600 igfxwk32.exe igfxwk32.exe PID 1600 wrote to memory of 3148 1600 igfxwk32.exe igfxwk32.exe PID 3148 wrote to memory of 4544 3148 igfxwk32.exe igfxwk32.exe PID 3148 wrote to memory of 4544 3148 igfxwk32.exe igfxwk32.exe PID 3148 wrote to memory of 4544 3148 igfxwk32.exe igfxwk32.exe PID 3148 wrote to memory of 4544 3148 igfxwk32.exe igfxwk32.exe PID 3148 wrote to memory of 4544 3148 igfxwk32.exe igfxwk32.exe PID 3148 wrote to memory of 4544 3148 igfxwk32.exe igfxwk32.exe PID 3148 wrote to memory of 4544 3148 igfxwk32.exe igfxwk32.exe PID 4544 wrote to memory of 1660 4544 igfxwk32.exe igfxwk32.exe PID 4544 wrote to memory of 1660 4544 igfxwk32.exe igfxwk32.exe PID 4544 wrote to memory of 1660 4544 igfxwk32.exe igfxwk32.exe PID 1660 wrote to memory of 4600 1660 igfxwk32.exe igfxwk32.exe PID 1660 wrote to memory of 4600 1660 igfxwk32.exe igfxwk32.exe PID 1660 wrote to memory of 4600 1660 igfxwk32.exe igfxwk32.exe PID 1660 wrote to memory of 4600 1660 igfxwk32.exe igfxwk32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f747007de3cb01e70c1170572951cecc_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Users\Admin\AppData\Local\Temp\F74700~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Users\Admin\AppData\Local\Temp\F74700~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4600 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4240 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2404 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1092 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1648 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4988 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4872 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2012 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5016 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5056 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4844 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1216 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3412 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4040 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4488 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2760 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3548 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe31⤵
- Executes dropped EXE
PID:5048
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5f747007de3cb01e70c1170572951cecc
SHA16f683e1b46bb7aa6cf4939d02fc2a8d0b2411fe5
SHA2565b3e37227741161c58a39386fc7d48013ad2d4a43b3826f1cc35d2bb40e0b44c
SHA512d1ce4370a17b1904188846e25b13487762e1228b99e312371aaf0144f87c3cb85776d8508c3e7f6b385b2d0a8c64388df0d927bc91e1e7495f3679d96c37f95a
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e