Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 01:10
Static task
static1
Behavioral task
behavioral1
Sample
2e7bf8738079cbffae32f553b42c0cec_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2e7bf8738079cbffae32f553b42c0cec_JaffaCakes118.exe
Resource
win10v2004-20240708-en
General
-
Target
2e7bf8738079cbffae32f553b42c0cec_JaffaCakes118.exe
-
Size
142KB
-
MD5
2e7bf8738079cbffae32f553b42c0cec
-
SHA1
28d1f1235dc36a5d55703140db7a728214bf6aeb
-
SHA256
53fa227886f7fdaa77754dcd99d5cfd67b7929aa3950172f8d2ed1f721634032
-
SHA512
22b73f45b1be4edcece88819911961f73952bbdc85975a3fa2c174bae78ffafde1fd562f31b16b790fb973d6c151bd48303c1047af8d7ff2da69c30cd56ff579
-
SSDEEP
3072:RnPLrX7lS4DN6zhIpD9ElE7Z+ApSbHJiUFgcmoCtHIWMaq/ie8:RPL62pD9E8xQb7moZ1S
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2424 igfxck32.exe -
Executes dropped EXE 30 IoCs
pid Process 2132 igfxck32.exe 2424 igfxck32.exe 2140 igfxck32.exe 3024 igfxck32.exe 1752 igfxck32.exe 1084 igfxck32.exe 1764 igfxck32.exe 888 igfxck32.exe 2788 igfxck32.exe 1288 igfxck32.exe 828 igfxck32.exe 904 igfxck32.exe 1596 igfxck32.exe 2552 igfxck32.exe 2948 igfxck32.exe 1132 igfxck32.exe 604 igfxck32.exe 2416 igfxck32.exe 2640 igfxck32.exe 1540 igfxck32.exe 2688 igfxck32.exe 2852 igfxck32.exe 1972 igfxck32.exe 2564 igfxck32.exe 2612 igfxck32.exe 2340 igfxck32.exe 2100 igfxck32.exe 1420 igfxck32.exe 544 igfxck32.exe 1936 igfxck32.exe -
Loads dropped DLL 60 IoCs
pid Process 804 2e7bf8738079cbffae32f553b42c0cec_JaffaCakes118.exe 804 2e7bf8738079cbffae32f553b42c0cec_JaffaCakes118.exe 2132 igfxck32.exe 2132 igfxck32.exe 2424 igfxck32.exe 2424 igfxck32.exe 2140 igfxck32.exe 2140 igfxck32.exe 3024 igfxck32.exe 3024 igfxck32.exe 1752 igfxck32.exe 1752 igfxck32.exe 1084 igfxck32.exe 1084 igfxck32.exe 1764 igfxck32.exe 1764 igfxck32.exe 888 igfxck32.exe 888 igfxck32.exe 2788 igfxck32.exe 2788 igfxck32.exe 1288 igfxck32.exe 1288 igfxck32.exe 828 igfxck32.exe 828 igfxck32.exe 904 igfxck32.exe 904 igfxck32.exe 1596 igfxck32.exe 1596 igfxck32.exe 2552 igfxck32.exe 2552 igfxck32.exe 2948 igfxck32.exe 2948 igfxck32.exe 1132 igfxck32.exe 1132 igfxck32.exe 604 igfxck32.exe 604 igfxck32.exe 2416 igfxck32.exe 2416 igfxck32.exe 2640 igfxck32.exe 2640 igfxck32.exe 1540 igfxck32.exe 1540 igfxck32.exe 2688 igfxck32.exe 2688 igfxck32.exe 2852 igfxck32.exe 2852 igfxck32.exe 1972 igfxck32.exe 1972 igfxck32.exe 2564 igfxck32.exe 2564 igfxck32.exe 2612 igfxck32.exe 2612 igfxck32.exe 2340 igfxck32.exe 2340 igfxck32.exe 2100 igfxck32.exe 2100 igfxck32.exe 1420 igfxck32.exe 1420 igfxck32.exe 544 igfxck32.exe 544 igfxck32.exe -
resource yara_rule behavioral1/memory/804-2-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/804-4-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/804-3-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/804-6-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/804-7-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/804-8-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/804-21-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2424-32-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2424-33-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2424-34-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2424-40-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/3024-53-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/3024-52-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/3024-51-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/3024-59-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/1084-72-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/1084-79-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/888-92-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/888-91-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/888-90-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/888-98-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/1288-117-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/904-128-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/904-136-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2552-154-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/1132-165-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/1132-173-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2416-185-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2416-193-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/1540-203-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/1540-206-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2852-218-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2564-230-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2340-240-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/2340-243-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/1420-255-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/1936-265-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/1936-268-0x0000000000400000-0x000000000045A000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 32 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxck32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxck32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxck32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxck32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxck32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxck32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxck32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxck32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxck32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxck32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxck32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxck32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxck32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxck32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxck32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 2e7bf8738079cbffae32f553b42c0cec_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 2e7bf8738079cbffae32f553b42c0cec_JaffaCakes118.exe -
Drops file in System32 directory 48 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File opened for modification C:\Windows\SysWOW64\ 2e7bf8738079cbffae32f553b42c0cec_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File created C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File opened for modification C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File created C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File opened for modification C:\Windows\SysWOW64\ igfxck32.exe File created C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File opened for modification C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File created C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File opened for modification C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File created C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File opened for modification C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File opened for modification C:\Windows\SysWOW64\ igfxck32.exe File opened for modification C:\Windows\SysWOW64\ igfxck32.exe File opened for modification C:\Windows\SysWOW64\ igfxck32.exe File created C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File opened for modification C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File opened for modification C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File opened for modification C:\Windows\SysWOW64\ igfxck32.exe File opened for modification C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File created C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File opened for modification C:\Windows\SysWOW64\ igfxck32.exe File created C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File opened for modification C:\Windows\SysWOW64\igfxck32.exe 2e7bf8738079cbffae32f553b42c0cec_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxck32.exe 2e7bf8738079cbffae32f553b42c0cec_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File opened for modification C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File opened for modification C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File created C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File opened for modification C:\Windows\SysWOW64\ igfxck32.exe File opened for modification C:\Windows\SysWOW64\ igfxck32.exe File created C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File opened for modification C:\Windows\SysWOW64\ igfxck32.exe File created C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File opened for modification C:\Windows\SysWOW64\ igfxck32.exe File opened for modification C:\Windows\SysWOW64\ igfxck32.exe File opened for modification C:\Windows\SysWOW64\ igfxck32.exe File opened for modification C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File opened for modification C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File created C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File opened for modification C:\Windows\SysWOW64\ igfxck32.exe File opened for modification C:\Windows\SysWOW64\ igfxck32.exe File created C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File created C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File opened for modification C:\Windows\SysWOW64\ igfxck32.exe File created C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File opened for modification C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe -
Suspicious use of SetThreadContext 16 IoCs
description pid Process procid_target PID 1512 set thread context of 804 1512 2e7bf8738079cbffae32f553b42c0cec_JaffaCakes118.exe 30 PID 2132 set thread context of 2424 2132 igfxck32.exe 32 PID 2140 set thread context of 3024 2140 igfxck32.exe 35 PID 1752 set thread context of 1084 1752 igfxck32.exe 37 PID 1764 set thread context of 888 1764 igfxck32.exe 39 PID 2788 set thread context of 1288 2788 igfxck32.exe 41 PID 828 set thread context of 904 828 igfxck32.exe 43 PID 1596 set thread context of 2552 1596 igfxck32.exe 45 PID 2948 set thread context of 1132 2948 igfxck32.exe 47 PID 604 set thread context of 2416 604 igfxck32.exe 49 PID 2640 set thread context of 1540 2640 igfxck32.exe 51 PID 2688 set thread context of 2852 2688 igfxck32.exe 53 PID 1972 set thread context of 2564 1972 igfxck32.exe 55 PID 2612 set thread context of 2340 2612 igfxck32.exe 57 PID 2100 set thread context of 1420 2100 igfxck32.exe 59 PID 544 set thread context of 1936 544 igfxck32.exe 61 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 804 2e7bf8738079cbffae32f553b42c0cec_JaffaCakes118.exe 804 2e7bf8738079cbffae32f553b42c0cec_JaffaCakes118.exe 2424 igfxck32.exe 2424 igfxck32.exe 3024 igfxck32.exe 3024 igfxck32.exe 1084 igfxck32.exe 1084 igfxck32.exe 888 igfxck32.exe 888 igfxck32.exe 1288 igfxck32.exe 1288 igfxck32.exe 904 igfxck32.exe 904 igfxck32.exe 2552 igfxck32.exe 2552 igfxck32.exe 1132 igfxck32.exe 1132 igfxck32.exe 2416 igfxck32.exe 2416 igfxck32.exe 1540 igfxck32.exe 1540 igfxck32.exe 2852 igfxck32.exe 2852 igfxck32.exe 2564 igfxck32.exe 2564 igfxck32.exe 2340 igfxck32.exe 2340 igfxck32.exe 1420 igfxck32.exe 1420 igfxck32.exe 1936 igfxck32.exe 1936 igfxck32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1512 wrote to memory of 804 1512 2e7bf8738079cbffae32f553b42c0cec_JaffaCakes118.exe 30 PID 1512 wrote to memory of 804 1512 2e7bf8738079cbffae32f553b42c0cec_JaffaCakes118.exe 30 PID 1512 wrote to memory of 804 1512 2e7bf8738079cbffae32f553b42c0cec_JaffaCakes118.exe 30 PID 1512 wrote to memory of 804 1512 2e7bf8738079cbffae32f553b42c0cec_JaffaCakes118.exe 30 PID 1512 wrote to memory of 804 1512 2e7bf8738079cbffae32f553b42c0cec_JaffaCakes118.exe 30 PID 1512 wrote to memory of 804 1512 2e7bf8738079cbffae32f553b42c0cec_JaffaCakes118.exe 30 PID 1512 wrote to memory of 804 1512 2e7bf8738079cbffae32f553b42c0cec_JaffaCakes118.exe 30 PID 804 wrote to memory of 2132 804 2e7bf8738079cbffae32f553b42c0cec_JaffaCakes118.exe 31 PID 804 wrote to memory of 2132 804 2e7bf8738079cbffae32f553b42c0cec_JaffaCakes118.exe 31 PID 804 wrote to memory of 2132 804 2e7bf8738079cbffae32f553b42c0cec_JaffaCakes118.exe 31 PID 804 wrote to memory of 2132 804 2e7bf8738079cbffae32f553b42c0cec_JaffaCakes118.exe 31 PID 2132 wrote to memory of 2424 2132 igfxck32.exe 32 PID 2132 wrote to memory of 2424 2132 igfxck32.exe 32 PID 2132 wrote to memory of 2424 2132 igfxck32.exe 32 PID 2132 wrote to memory of 2424 2132 igfxck32.exe 32 PID 2132 wrote to memory of 2424 2132 igfxck32.exe 32 PID 2132 wrote to memory of 2424 2132 igfxck32.exe 32 PID 2132 wrote to memory of 2424 2132 igfxck32.exe 32 PID 2424 wrote to memory of 2140 2424 igfxck32.exe 34 PID 2424 wrote to memory of 2140 2424 igfxck32.exe 34 PID 2424 wrote to memory of 2140 2424 igfxck32.exe 34 PID 2424 wrote to memory of 2140 2424 igfxck32.exe 34 PID 2140 wrote to memory of 3024 2140 igfxck32.exe 35 PID 2140 wrote to memory of 3024 2140 igfxck32.exe 35 PID 2140 wrote to memory of 3024 2140 igfxck32.exe 35 PID 2140 wrote to memory of 3024 2140 igfxck32.exe 35 PID 2140 wrote to memory of 3024 2140 igfxck32.exe 35 PID 2140 wrote to memory of 3024 2140 igfxck32.exe 35 PID 2140 wrote to memory of 3024 2140 igfxck32.exe 35 PID 3024 wrote to memory of 1752 3024 igfxck32.exe 36 PID 3024 wrote to memory of 1752 3024 igfxck32.exe 36 PID 3024 wrote to memory of 1752 3024 igfxck32.exe 36 PID 3024 wrote to memory of 1752 3024 igfxck32.exe 36 PID 1752 wrote to memory of 1084 1752 igfxck32.exe 37 PID 1752 wrote to memory of 1084 1752 igfxck32.exe 37 PID 1752 wrote to memory of 1084 1752 igfxck32.exe 37 PID 1752 wrote to memory of 1084 1752 igfxck32.exe 37 PID 1752 wrote to memory of 1084 1752 igfxck32.exe 37 PID 1752 wrote to memory of 1084 1752 igfxck32.exe 37 PID 1752 wrote to memory of 1084 1752 igfxck32.exe 37 PID 1084 wrote to memory of 1764 1084 igfxck32.exe 38 PID 1084 wrote to memory of 1764 1084 igfxck32.exe 38 PID 1084 wrote to memory of 1764 1084 igfxck32.exe 38 PID 1084 wrote to memory of 1764 1084 igfxck32.exe 38 PID 1764 wrote to memory of 888 1764 igfxck32.exe 39 PID 1764 wrote to memory of 888 1764 igfxck32.exe 39 PID 1764 wrote to memory of 888 1764 igfxck32.exe 39 PID 1764 wrote to memory of 888 1764 igfxck32.exe 39 PID 1764 wrote to memory of 888 1764 igfxck32.exe 39 PID 1764 wrote to memory of 888 1764 igfxck32.exe 39 PID 1764 wrote to memory of 888 1764 igfxck32.exe 39 PID 888 wrote to memory of 2788 888 igfxck32.exe 40 PID 888 wrote to memory of 2788 888 igfxck32.exe 40 PID 888 wrote to memory of 2788 888 igfxck32.exe 40 PID 888 wrote to memory of 2788 888 igfxck32.exe 40 PID 2788 wrote to memory of 1288 2788 igfxck32.exe 41 PID 2788 wrote to memory of 1288 2788 igfxck32.exe 41 PID 2788 wrote to memory of 1288 2788 igfxck32.exe 41 PID 2788 wrote to memory of 1288 2788 igfxck32.exe 41 PID 2788 wrote to memory of 1288 2788 igfxck32.exe 41 PID 2788 wrote to memory of 1288 2788 igfxck32.exe 41 PID 2788 wrote to memory of 1288 2788 igfxck32.exe 41 PID 1288 wrote to memory of 828 1288 igfxck32.exe 42 PID 1288 wrote to memory of 828 1288 igfxck32.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e7bf8738079cbffae32f553b42c0cec_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2e7bf8738079cbffae32f553b42c0cec_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\2e7bf8738079cbffae32f553b42c0cec_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2e7bf8738079cbffae32f553b42c0cec_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Users\Admin\AppData\Local\Temp\2E7BF8~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Users\Admin\AppData\Local\Temp\2E7BF8~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:828 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:904 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1596 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2552 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2948 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1132 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:604 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2416 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2640 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1540 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2688 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2852 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1972 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2564 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2612 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2340 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2100 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1420 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:544 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe32⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1936 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe33⤵PID:2988
-
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe34⤵PID:1996
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
142KB
MD52e7bf8738079cbffae32f553b42c0cec
SHA128d1f1235dc36a5d55703140db7a728214bf6aeb
SHA25653fa227886f7fdaa77754dcd99d5cfd67b7929aa3950172f8d2ed1f721634032
SHA51222b73f45b1be4edcece88819911961f73952bbdc85975a3fa2c174bae78ffafde1fd562f31b16b790fb973d6c151bd48303c1047af8d7ff2da69c30cd56ff579