Malware Analysis Report

2025-01-03 08:11

Sample ID 240418-y9m77aea86
Target f8ae3d04134db63bf814f3165944bdef_JaffaCakes118
SHA256 c563f1f45275a004ab9c038692b371b7369ffa0a98fb689b2a8a5ce0d6d51701
Tags
metasploit backdoor trojan upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

c563f1f45275a004ab9c038692b371b7369ffa0a98fb689b2a8a5ce0d6d51701

Threat Level: Known bad

The file f8ae3d04134db63bf814f3165944bdef_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

metasploit backdoor trojan upx

MetaSploit

UPX packed file

Executes dropped EXE

Checks computer location settings

Loads dropped DLL

Deletes itself

Maps connected drives based on registry

Drops file in System32 directory

Suspicious use of SetThreadContext

Enumerates physical storage devices

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

Modifies registry class

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-04-18 20:29

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-18 20:29

Reported

2024-04-18 20:31

Platform

win10v2004-20240412-en

Max time kernel

149s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe"

Signatures

MetaSploit

trojan backdoor metasploit

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\igfxwd32.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\igfxwd32.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\igfxwd32.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\igfxwd32.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\igfxwd32.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\igfxwd32.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\igfxwd32.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\igfxwd32.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\igfxwd32.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\igfxwd32.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\igfxwd32.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\igfxwd32.exe N/A

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Maps connected drives based on registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\igfxwd32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\igfxwd32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 C:\Windows\SysWOW64\igfxwd32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\igfxwd32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\igfxwd32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 C:\Windows\SysWOW64\igfxwd32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 C:\Windows\SysWOW64\igfxwd32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\igfxwd32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\igfxwd32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 C:\Windows\SysWOW64\igfxwd32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 C:\Windows\SysWOW64\igfxwd32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\igfxwd32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\igfxwd32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 C:\Windows\SysWOW64\igfxwd32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\igfxwd32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 C:\Windows\SysWOW64\igfxwd32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\igfxwd32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 C:\Windows\SysWOW64\igfxwd32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\igfxwd32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 C:\Windows\SysWOW64\igfxwd32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\igfxwd32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\igfxwd32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 C:\Windows\SysWOW64\igfxwd32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 C:\Windows\SysWOW64\igfxwd32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 C:\Windows\SysWOW64\igfxwd32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 C:\Windows\SysWOW64\igfxwd32.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File created C:\Windows\SysWOW64\igfxwd32.exe C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe N/A
File created C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File created C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File created C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File created C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File created C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File created C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File created C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\igfxwd32.exe N/A
File created C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File created C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\igfxwd32.exe C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe N/A
File created C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File created C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2268 set thread context of 1552 N/A C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe
PID 768 set thread context of 1348 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2336 set thread context of 1844 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 5016 set thread context of 4944 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 4280 set thread context of 4976 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 4084 set thread context of 4508 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 4480 set thread context of 4288 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 4376 set thread context of 4876 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 380 set thread context of 2268 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 4972 set thread context of 4332 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 3748 set thread context of 3832 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 3996 set thread context of 1660 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2972 set thread context of 5104 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2848 set thread context of 4832 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\igfxwd32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\igfxwd32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\igfxwd32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\igfxwd32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\igfxwd32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\igfxwd32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\igfxwd32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\igfxwd32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\igfxwd32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\igfxwd32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\igfxwd32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\igfxwd32.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2268 wrote to memory of 1552 N/A C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe
PID 2268 wrote to memory of 1552 N/A C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe
PID 2268 wrote to memory of 1552 N/A C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe
PID 2268 wrote to memory of 1552 N/A C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe
PID 2268 wrote to memory of 1552 N/A C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe
PID 2268 wrote to memory of 1552 N/A C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe
PID 2268 wrote to memory of 1552 N/A C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe
PID 1552 wrote to memory of 768 N/A C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 1552 wrote to memory of 768 N/A C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 1552 wrote to memory of 768 N/A C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 768 wrote to memory of 1348 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 768 wrote to memory of 1348 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 768 wrote to memory of 1348 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 768 wrote to memory of 1348 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 768 wrote to memory of 1348 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 768 wrote to memory of 1348 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 768 wrote to memory of 1348 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 1348 wrote to memory of 2336 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 1348 wrote to memory of 2336 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 1348 wrote to memory of 2336 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2336 wrote to memory of 1844 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2336 wrote to memory of 1844 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2336 wrote to memory of 1844 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2336 wrote to memory of 1844 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2336 wrote to memory of 1844 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2336 wrote to memory of 1844 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2336 wrote to memory of 1844 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 1844 wrote to memory of 5016 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 1844 wrote to memory of 5016 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 1844 wrote to memory of 5016 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 5016 wrote to memory of 4944 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 5016 wrote to memory of 4944 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 5016 wrote to memory of 4944 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 5016 wrote to memory of 4944 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 5016 wrote to memory of 4944 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 5016 wrote to memory of 4944 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 5016 wrote to memory of 4944 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 4944 wrote to memory of 4280 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 4944 wrote to memory of 4280 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 4944 wrote to memory of 4280 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 4280 wrote to memory of 4976 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 4280 wrote to memory of 4976 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 4280 wrote to memory of 4976 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 4280 wrote to memory of 4976 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 4280 wrote to memory of 4976 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 4280 wrote to memory of 4976 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 4280 wrote to memory of 4976 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 4976 wrote to memory of 4084 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 4976 wrote to memory of 4084 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 4976 wrote to memory of 4084 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 4084 wrote to memory of 4508 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 4084 wrote to memory of 4508 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 4084 wrote to memory of 4508 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 4084 wrote to memory of 4508 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 4084 wrote to memory of 4508 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 4084 wrote to memory of 4508 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 4084 wrote to memory of 4508 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 4508 wrote to memory of 4480 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 4508 wrote to memory of 4480 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 4508 wrote to memory of 4480 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 4480 wrote to memory of 4288 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 4480 wrote to memory of 4288 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 4480 wrote to memory of 4288 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 4480 wrote to memory of 4288 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe

Processes

C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe"

C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe"

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Users\Admin\AppData\Local\Temp\F8AE3D~1.EXE

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Users\Admin\AppData\Local\Temp\F8AE3D~1.EXE

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 22.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 134.71.91.104.in-addr.arpa udp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 7.173.189.20.in-addr.arpa udp

Files

memory/1552-0-0x0000000000400000-0x0000000000466000-memory.dmp

memory/1552-2-0x0000000000400000-0x0000000000466000-memory.dmp

memory/1552-3-0x0000000000400000-0x0000000000466000-memory.dmp

memory/1552-4-0x0000000000400000-0x0000000000466000-memory.dmp

C:\Windows\SysWOW64\igfxwd32.exe

MD5 f8ae3d04134db63bf814f3165944bdef
SHA1 c702c34f97cc79b37c61add307997ab9250dd8f3
SHA256 c563f1f45275a004ab9c038692b371b7369ffa0a98fb689b2a8a5ce0d6d51701
SHA512 2f6d2abf50847f65a505754d67946cb13ad3fcafd00563569b12f5904169942a934fea809681f345641dca29aa98a141382a23af48d12bdb26b27e94af3c88ac

memory/1552-37-0x0000000000400000-0x0000000000466000-memory.dmp

memory/1348-46-0x0000000000400000-0x0000000000466000-memory.dmp

memory/1844-52-0x0000000000400000-0x0000000000466000-memory.dmp

memory/1844-55-0x0000000000400000-0x0000000000466000-memory.dmp

memory/4944-62-0x0000000000400000-0x0000000000466000-memory.dmp

memory/4944-64-0x0000000000400000-0x0000000000466000-memory.dmp

memory/4976-72-0x0000000000400000-0x0000000000466000-memory.dmp

memory/4508-78-0x0000000000400000-0x0000000000466000-memory.dmp

memory/4508-80-0x0000000000400000-0x0000000000466000-memory.dmp

memory/4288-88-0x0000000000400000-0x0000000000466000-memory.dmp

memory/4288-89-0x0000000000400000-0x0000000000466000-memory.dmp

\??\PIPE\srvsvc

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

memory/4876-99-0x0000000000400000-0x0000000000466000-memory.dmp

memory/2268-105-0x0000000000400000-0x0000000000466000-memory.dmp

memory/2268-108-0x0000000000400000-0x0000000000466000-memory.dmp

memory/4332-114-0x0000000000400000-0x0000000000466000-memory.dmp

memory/4332-117-0x0000000000400000-0x0000000000466000-memory.dmp

memory/3832-123-0x0000000000400000-0x0000000000466000-memory.dmp

memory/3832-129-0x0000000000400000-0x0000000000466000-memory.dmp

memory/1660-134-0x0000000000400000-0x0000000000466000-memory.dmp

memory/1660-139-0x0000000000400000-0x0000000000466000-memory.dmp

memory/5104-144-0x0000000000400000-0x0000000000466000-memory.dmp

memory/5104-149-0x0000000000400000-0x0000000000466000-memory.dmp

memory/4832-155-0x0000000000400000-0x0000000000466000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-18 20:29

Reported

2024-04-18 20:31

Platform

win7-20240221-en

Max time kernel

148s

Max time network

121s

Command Line

"C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe"

Signatures

MetaSploit

trojan backdoor metasploit

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Maps connected drives based on registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 C:\Windows\SysWOW64\igfxwd32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\igfxwd32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\igfxwd32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\igfxwd32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 C:\Windows\SysWOW64\igfxwd32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\igfxwd32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 C:\Windows\SysWOW64\igfxwd32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 C:\Windows\SysWOW64\igfxwd32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\igfxwd32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 C:\Windows\SysWOW64\igfxwd32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 C:\Windows\SysWOW64\igfxwd32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\igfxwd32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\igfxwd32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\igfxwd32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 C:\Windows\SysWOW64\igfxwd32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\igfxwd32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\igfxwd32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 C:\Windows\SysWOW64\igfxwd32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 C:\Windows\SysWOW64\igfxwd32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\igfxwd32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 C:\Windows\SysWOW64\igfxwd32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\igfxwd32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 C:\Windows\SysWOW64\igfxwd32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 C:\Windows\SysWOW64\igfxwd32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\igfxwd32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\igfxwd32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 C:\Windows\SysWOW64\igfxwd32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 C:\Windows\SysWOW64\igfxwd32.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\igfxwd32.exe C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\igfxwd32.exe N/A
File created C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File created C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File created C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe N/A
File opened for modification C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File created C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File created C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File created C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\igfxwd32.exe N/A
File created C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\igfxwd32.exe N/A
File created C:\Windows\SysWOW64\igfxwd32.exe C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe N/A
File opened for modification C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File created C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\igfxwd32.exe N/A
File created C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File created C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\igfxwd32.exe N/A
File created C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File created C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\igfxwd32.exe N/A
File created C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File created C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\igfxwd32.exe N/A
File opened for modification C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1900 set thread context of 3044 N/A C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe
PID 2644 set thread context of 2328 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2480 set thread context of 2972 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2612 set thread context of 1968 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 268 set thread context of 484 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 1208 set thread context of 2272 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2016 set thread context of 2808 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 1800 set thread context of 1684 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 1816 set thread context of 852 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 3028 set thread context of 1220 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 1588 set thread context of 1744 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2636 set thread context of 2632 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2656 set thread context of 2332 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2424 set thread context of 2712 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 1924 set thread context of 2476 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A
N/A N/A C:\Windows\SysWOW64\igfxwd32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1900 wrote to memory of 3044 N/A C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe
PID 1900 wrote to memory of 3044 N/A C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe
PID 1900 wrote to memory of 3044 N/A C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe
PID 1900 wrote to memory of 3044 N/A C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe
PID 1900 wrote to memory of 3044 N/A C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe
PID 1900 wrote to memory of 3044 N/A C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe
PID 1900 wrote to memory of 3044 N/A C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe
PID 3044 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 3044 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 3044 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 3044 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2644 wrote to memory of 2328 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2644 wrote to memory of 2328 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2644 wrote to memory of 2328 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2644 wrote to memory of 2328 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2644 wrote to memory of 2328 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2644 wrote to memory of 2328 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2644 wrote to memory of 2328 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2328 wrote to memory of 2480 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2328 wrote to memory of 2480 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2328 wrote to memory of 2480 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2328 wrote to memory of 2480 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2480 wrote to memory of 2972 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2480 wrote to memory of 2972 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2480 wrote to memory of 2972 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2480 wrote to memory of 2972 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2480 wrote to memory of 2972 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2480 wrote to memory of 2972 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2480 wrote to memory of 2972 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2972 wrote to memory of 2612 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2972 wrote to memory of 2612 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2972 wrote to memory of 2612 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2972 wrote to memory of 2612 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2612 wrote to memory of 1968 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2612 wrote to memory of 1968 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2612 wrote to memory of 1968 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2612 wrote to memory of 1968 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2612 wrote to memory of 1968 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2612 wrote to memory of 1968 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2612 wrote to memory of 1968 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 1968 wrote to memory of 268 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 1968 wrote to memory of 268 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 1968 wrote to memory of 268 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 1968 wrote to memory of 268 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 268 wrote to memory of 484 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 268 wrote to memory of 484 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 268 wrote to memory of 484 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 268 wrote to memory of 484 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 268 wrote to memory of 484 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 268 wrote to memory of 484 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 268 wrote to memory of 484 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 484 wrote to memory of 1208 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 484 wrote to memory of 1208 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 484 wrote to memory of 1208 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 484 wrote to memory of 1208 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 1208 wrote to memory of 2272 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 1208 wrote to memory of 2272 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 1208 wrote to memory of 2272 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 1208 wrote to memory of 2272 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 1208 wrote to memory of 2272 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 1208 wrote to memory of 2272 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 1208 wrote to memory of 2272 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2272 wrote to memory of 2016 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe
PID 2272 wrote to memory of 2016 N/A C:\Windows\SysWOW64\igfxwd32.exe C:\Windows\SysWOW64\igfxwd32.exe

Processes

C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe"

C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe"

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Users\Admin\AppData\Local\Temp\F8AE3D~1.EXE

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Users\Admin\AppData\Local\Temp\F8AE3D~1.EXE

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

C:\Windows\SysWOW64\igfxwd32.exe

"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe

Network

N/A

Files

memory/3044-0-0x0000000000400000-0x0000000000466000-memory.dmp

memory/3044-2-0x0000000000400000-0x0000000000466000-memory.dmp

memory/3044-3-0x0000000000400000-0x0000000000466000-memory.dmp

memory/3044-4-0x0000000000400000-0x0000000000466000-memory.dmp

memory/3044-6-0x0000000000400000-0x0000000000466000-memory.dmp

memory/3044-7-0x0000000000400000-0x0000000000466000-memory.dmp

memory/3044-8-0x0000000000400000-0x0000000000466000-memory.dmp

C:\Windows\SysWOW64\igfxwd32.exe

MD5 f8ae3d04134db63bf814f3165944bdef
SHA1 c702c34f97cc79b37c61add307997ab9250dd8f3
SHA256 c563f1f45275a004ab9c038692b371b7369ffa0a98fb689b2a8a5ce0d6d51701
SHA512 2f6d2abf50847f65a505754d67946cb13ad3fcafd00563569b12f5904169942a934fea809681f345641dca29aa98a141382a23af48d12bdb26b27e94af3c88ac

memory/3044-16-0x0000000000400000-0x0000000000466000-memory.dmp

memory/2328-27-0x0000000000400000-0x0000000000466000-memory.dmp

memory/2328-29-0x0000000000400000-0x0000000000466000-memory.dmp

memory/2328-28-0x0000000000400000-0x0000000000466000-memory.dmp

\??\PIPE\srvsvc

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

memory/2328-32-0x0000000000400000-0x0000000000466000-memory.dmp

memory/2972-45-0x0000000000400000-0x0000000000466000-memory.dmp

memory/2972-50-0x0000000000400000-0x0000000000466000-memory.dmp

memory/1968-66-0x0000000000400000-0x0000000000466000-memory.dmp

memory/484-81-0x0000000000400000-0x0000000000466000-memory.dmp

memory/2272-100-0x0000000000400000-0x0000000000466000-memory.dmp

memory/2808-116-0x0000000000400000-0x0000000000466000-memory.dmp

memory/1684-133-0x0000000000400000-0x0000000000466000-memory.dmp

memory/852-149-0x0000000000400000-0x0000000000466000-memory.dmp

memory/1220-166-0x0000000000400000-0x0000000000466000-memory.dmp

memory/1744-182-0x0000000000400000-0x0000000000466000-memory.dmp

memory/2632-199-0x0000000000400000-0x0000000000466000-memory.dmp

memory/2332-215-0x0000000000400000-0x0000000000466000-memory.dmp

memory/2712-231-0x0000000000400000-0x0000000000466000-memory.dmp

memory/2476-243-0x0000000000400000-0x0000000000466000-memory.dmp

memory/2476-248-0x0000000000400000-0x0000000000466000-memory.dmp