Analysis
-
max time kernel
144s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 05:35
Static task
static1
Behavioral task
behavioral1
Sample
14d85810387c0e7379a0065e0111e0f6_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
14d85810387c0e7379a0065e0111e0f6_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
14d85810387c0e7379a0065e0111e0f6_JaffaCakes118.exe
-
Size
200KB
-
MD5
14d85810387c0e7379a0065e0111e0f6
-
SHA1
bd50f01691c3cd4621325ca63a24578d93f90662
-
SHA256
e10fcb4c0822ad0ca39c7c08d53ef9b595f2b35e806169fb5463ff9ee51feb27
-
SHA512
0bb22d29306aefd9b6c3f63a915bc3a8dda0aed4274320d21d03a3aeb92dc07b3b4edb2003e32b0611db77bf759141de6573cd063714c61411b6d5a2325f6b03
-
SSDEEP
3072:gUjx9+9friBq8C2TjfkrzsxsX5rfFgQ0HQx75Ap8CS/WqlIHKE:jYfriQ8C0jfkrzmsp5t0aFA27
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2788 igfxwl32.exe -
Executes dropped EXE 33 IoCs
pid Process 3040 igfxwl32.exe 2788 igfxwl32.exe 2508 igfxwl32.exe 2956 igfxwl32.exe 2580 igfxwl32.exe 1644 igfxwl32.exe 1980 igfxwl32.exe 1952 igfxwl32.exe 1960 igfxwl32.exe 2144 igfxwl32.exe 2888 igfxwl32.exe 3052 igfxwl32.exe 1304 igfxwl32.exe 1532 igfxwl32.exe 836 igfxwl32.exe 2100 igfxwl32.exe 3064 igfxwl32.exe 1256 igfxwl32.exe 2988 igfxwl32.exe 3028 igfxwl32.exe 1708 igfxwl32.exe 2764 igfxwl32.exe 2560 igfxwl32.exe 2528 igfxwl32.exe 2828 igfxwl32.exe 344 igfxwl32.exe 288 igfxwl32.exe 1672 igfxwl32.exe 2608 igfxwl32.exe 2484 igfxwl32.exe 2272 igfxwl32.exe 1104 igfxwl32.exe 1480 igfxwl32.exe -
Loads dropped DLL 33 IoCs
pid Process 1964 14d85810387c0e7379a0065e0111e0f6_JaffaCakes118.exe 3040 igfxwl32.exe 2788 igfxwl32.exe 2508 igfxwl32.exe 2956 igfxwl32.exe 2580 igfxwl32.exe 1644 igfxwl32.exe 1980 igfxwl32.exe 1952 igfxwl32.exe 1960 igfxwl32.exe 2144 igfxwl32.exe 2888 igfxwl32.exe 3052 igfxwl32.exe 1304 igfxwl32.exe 1532 igfxwl32.exe 836 igfxwl32.exe 2100 igfxwl32.exe 3064 igfxwl32.exe 1256 igfxwl32.exe 2988 igfxwl32.exe 3028 igfxwl32.exe 1708 igfxwl32.exe 2764 igfxwl32.exe 2560 igfxwl32.exe 2528 igfxwl32.exe 2828 igfxwl32.exe 344 igfxwl32.exe 288 igfxwl32.exe 1672 igfxwl32.exe 2608 igfxwl32.exe 2484 igfxwl32.exe 2272 igfxwl32.exe 1104 igfxwl32.exe -
resource yara_rule behavioral1/memory/1964-3-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1964-10-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1964-11-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1964-12-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1964-9-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1964-6-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1964-4-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1964-22-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2788-35-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2788-36-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2788-37-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2788-34-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2788-42-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2956-55-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2956-54-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2956-53-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2956-61-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1644-75-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1644-74-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1644-73-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1644-80-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1952-92-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1952-98-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2144-112-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2144-110-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2144-117-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/3052-135-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1532-148-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1532-155-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2100-167-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2100-174-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1256-187-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1256-194-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1256-191-0x0000000003150000-0x0000000003196000-memory.dmp upx behavioral1/memory/3028-209-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/3028-214-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2764-227-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2764-233-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2528-247-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2528-251-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/344-271-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1672-281-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1672-287-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1672-284-0x0000000003230000-0x0000000003276000-memory.dmp upx behavioral1/memory/2484-298-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2484-301-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1104-314-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1104-317-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 34 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 14d85810387c0e7379a0065e0111e0f6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 14d85810387c0e7379a0065e0111e0f6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe -
Drops file in System32 directory 51 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ 14d85810387c0e7379a0065e0111e0f6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe 14d85810387c0e7379a0065e0111e0f6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe 14d85810387c0e7379a0065e0111e0f6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe -
Suspicious use of SetThreadContext 17 IoCs
description pid Process procid_target PID 2936 set thread context of 1964 2936 14d85810387c0e7379a0065e0111e0f6_JaffaCakes118.exe 28 PID 3040 set thread context of 2788 3040 igfxwl32.exe 30 PID 2508 set thread context of 2956 2508 igfxwl32.exe 32 PID 2580 set thread context of 1644 2580 igfxwl32.exe 34 PID 1980 set thread context of 1952 1980 igfxwl32.exe 36 PID 1960 set thread context of 2144 1960 igfxwl32.exe 40 PID 2888 set thread context of 3052 2888 igfxwl32.exe 42 PID 1304 set thread context of 1532 1304 igfxwl32.exe 44 PID 836 set thread context of 2100 836 igfxwl32.exe 46 PID 3064 set thread context of 1256 3064 igfxwl32.exe 48 PID 2988 set thread context of 3028 2988 igfxwl32.exe 50 PID 1708 set thread context of 2764 1708 igfxwl32.exe 52 PID 2560 set thread context of 2528 2560 igfxwl32.exe 54 PID 2828 set thread context of 344 2828 igfxwl32.exe 56 PID 288 set thread context of 1672 288 igfxwl32.exe 58 PID 2608 set thread context of 2484 2608 igfxwl32.exe 60 PID 2272 set thread context of 1104 2272 igfxwl32.exe 62 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 1964 14d85810387c0e7379a0065e0111e0f6_JaffaCakes118.exe 1964 14d85810387c0e7379a0065e0111e0f6_JaffaCakes118.exe 2788 igfxwl32.exe 2788 igfxwl32.exe 2956 igfxwl32.exe 2956 igfxwl32.exe 1644 igfxwl32.exe 1644 igfxwl32.exe 1952 igfxwl32.exe 1952 igfxwl32.exe 2144 igfxwl32.exe 2144 igfxwl32.exe 3052 igfxwl32.exe 3052 igfxwl32.exe 1532 igfxwl32.exe 1532 igfxwl32.exe 2100 igfxwl32.exe 2100 igfxwl32.exe 1256 igfxwl32.exe 1256 igfxwl32.exe 3028 igfxwl32.exe 3028 igfxwl32.exe 2764 igfxwl32.exe 2764 igfxwl32.exe 2528 igfxwl32.exe 2528 igfxwl32.exe 344 igfxwl32.exe 344 igfxwl32.exe 1672 igfxwl32.exe 1672 igfxwl32.exe 2484 igfxwl32.exe 2484 igfxwl32.exe 1104 igfxwl32.exe 1104 igfxwl32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2936 wrote to memory of 1964 2936 14d85810387c0e7379a0065e0111e0f6_JaffaCakes118.exe 28 PID 2936 wrote to memory of 1964 2936 14d85810387c0e7379a0065e0111e0f6_JaffaCakes118.exe 28 PID 2936 wrote to memory of 1964 2936 14d85810387c0e7379a0065e0111e0f6_JaffaCakes118.exe 28 PID 2936 wrote to memory of 1964 2936 14d85810387c0e7379a0065e0111e0f6_JaffaCakes118.exe 28 PID 2936 wrote to memory of 1964 2936 14d85810387c0e7379a0065e0111e0f6_JaffaCakes118.exe 28 PID 2936 wrote to memory of 1964 2936 14d85810387c0e7379a0065e0111e0f6_JaffaCakes118.exe 28 PID 2936 wrote to memory of 1964 2936 14d85810387c0e7379a0065e0111e0f6_JaffaCakes118.exe 28 PID 1964 wrote to memory of 3040 1964 14d85810387c0e7379a0065e0111e0f6_JaffaCakes118.exe 29 PID 1964 wrote to memory of 3040 1964 14d85810387c0e7379a0065e0111e0f6_JaffaCakes118.exe 29 PID 1964 wrote to memory of 3040 1964 14d85810387c0e7379a0065e0111e0f6_JaffaCakes118.exe 29 PID 1964 wrote to memory of 3040 1964 14d85810387c0e7379a0065e0111e0f6_JaffaCakes118.exe 29 PID 3040 wrote to memory of 2788 3040 igfxwl32.exe 30 PID 3040 wrote to memory of 2788 3040 igfxwl32.exe 30 PID 3040 wrote to memory of 2788 3040 igfxwl32.exe 30 PID 3040 wrote to memory of 2788 3040 igfxwl32.exe 30 PID 3040 wrote to memory of 2788 3040 igfxwl32.exe 30 PID 3040 wrote to memory of 2788 3040 igfxwl32.exe 30 PID 3040 wrote to memory of 2788 3040 igfxwl32.exe 30 PID 2788 wrote to memory of 2508 2788 igfxwl32.exe 31 PID 2788 wrote to memory of 2508 2788 igfxwl32.exe 31 PID 2788 wrote to memory of 2508 2788 igfxwl32.exe 31 PID 2788 wrote to memory of 2508 2788 igfxwl32.exe 31 PID 2508 wrote to memory of 2956 2508 igfxwl32.exe 32 PID 2508 wrote to memory of 2956 2508 igfxwl32.exe 32 PID 2508 wrote to memory of 2956 2508 igfxwl32.exe 32 PID 2508 wrote to memory of 2956 2508 igfxwl32.exe 32 PID 2508 wrote to memory of 2956 2508 igfxwl32.exe 32 PID 2508 wrote to memory of 2956 2508 igfxwl32.exe 32 PID 2508 wrote to memory of 2956 2508 igfxwl32.exe 32 PID 2956 wrote to memory of 2580 2956 igfxwl32.exe 33 PID 2956 wrote to memory of 2580 2956 igfxwl32.exe 33 PID 2956 wrote to memory of 2580 2956 igfxwl32.exe 33 PID 2956 wrote to memory of 2580 2956 igfxwl32.exe 33 PID 2580 wrote to memory of 1644 2580 igfxwl32.exe 34 PID 2580 wrote to memory of 1644 2580 igfxwl32.exe 34 PID 2580 wrote to memory of 1644 2580 igfxwl32.exe 34 PID 2580 wrote to memory of 1644 2580 igfxwl32.exe 34 PID 2580 wrote to memory of 1644 2580 igfxwl32.exe 34 PID 2580 wrote to memory of 1644 2580 igfxwl32.exe 34 PID 2580 wrote to memory of 1644 2580 igfxwl32.exe 34 PID 1644 wrote to memory of 1980 1644 igfxwl32.exe 35 PID 1644 wrote to memory of 1980 1644 igfxwl32.exe 35 PID 1644 wrote to memory of 1980 1644 igfxwl32.exe 35 PID 1644 wrote to memory of 1980 1644 igfxwl32.exe 35 PID 1980 wrote to memory of 1952 1980 igfxwl32.exe 36 PID 1980 wrote to memory of 1952 1980 igfxwl32.exe 36 PID 1980 wrote to memory of 1952 1980 igfxwl32.exe 36 PID 1980 wrote to memory of 1952 1980 igfxwl32.exe 36 PID 1980 wrote to memory of 1952 1980 igfxwl32.exe 36 PID 1980 wrote to memory of 1952 1980 igfxwl32.exe 36 PID 1980 wrote to memory of 1952 1980 igfxwl32.exe 36 PID 1952 wrote to memory of 1960 1952 igfxwl32.exe 37 PID 1952 wrote to memory of 1960 1952 igfxwl32.exe 37 PID 1952 wrote to memory of 1960 1952 igfxwl32.exe 37 PID 1952 wrote to memory of 1960 1952 igfxwl32.exe 37 PID 1960 wrote to memory of 2144 1960 igfxwl32.exe 40 PID 1960 wrote to memory of 2144 1960 igfxwl32.exe 40 PID 1960 wrote to memory of 2144 1960 igfxwl32.exe 40 PID 1960 wrote to memory of 2144 1960 igfxwl32.exe 40 PID 1960 wrote to memory of 2144 1960 igfxwl32.exe 40 PID 1960 wrote to memory of 2144 1960 igfxwl32.exe 40 PID 1960 wrote to memory of 2144 1960 igfxwl32.exe 40 PID 2144 wrote to memory of 2888 2144 igfxwl32.exe 41 PID 2144 wrote to memory of 2888 2144 igfxwl32.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\14d85810387c0e7379a0065e0111e0f6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\14d85810387c0e7379a0065e0111e0f6_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\14d85810387c0e7379a0065e0111e0f6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\14d85810387c0e7379a0065e0111e0f6_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Users\Admin\AppData\Local\Temp\14D858~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Users\Admin\AppData\Local\Temp\14D858~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2888 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3052 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1304 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1532 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:836 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2100 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:3064 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1256 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2988 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3028 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1708 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2764 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2560 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2528 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2828 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:344 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:288 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1672 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2608 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2484 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe33⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2272 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe34⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1104 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe35⤵
- Executes dropped EXE
PID:1480
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200KB
MD514d85810387c0e7379a0065e0111e0f6
SHA1bd50f01691c3cd4621325ca63a24578d93f90662
SHA256e10fcb4c0822ad0ca39c7c08d53ef9b595f2b35e806169fb5463ff9ee51feb27
SHA5120bb22d29306aefd9b6c3f63a915bc3a8dda0aed4274320d21d03a3aeb92dc07b3b4edb2003e32b0611db77bf759141de6573cd063714c61411b6d5a2325f6b03