Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 14:07
Static task
static1
Behavioral task
behavioral1
Sample
d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe
-
Size
174KB
-
MD5
d21c621d44bca8273b62c12c3bbd8d18
-
SHA1
51e6f9f5ec103f11c5ddac5f673a0bf035d7d629
-
SHA256
068b938f3445581d35ced514a15bbdc9352abd7538285b3c026a2b3a32020351
-
SHA512
126db2189732449073f5c6905b89d3761233fb102d9b03e0a0b676fa39386213d72610ef5154e7bad5b06d3d9f141c934b4819b59d275c192856247f23743577
-
SSDEEP
3072:q6UHMux55s+W0z9fb6ULsFvGTwHiygGKFvRaS0MwlnYkArorWd40Nno:BuWf0z9fHLyowHw5vRaEi7brWigo
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2828 igfxwd32.exe -
Executes dropped EXE 30 IoCs
pid Process 2796 igfxwd32.exe 2828 igfxwd32.exe 3036 igfxwd32.exe 2892 igfxwd32.exe 2072 igfxwd32.exe 440 igfxwd32.exe 2824 igfxwd32.exe 2124 igfxwd32.exe 288 igfxwd32.exe 1660 igfxwd32.exe 1764 igfxwd32.exe 944 igfxwd32.exe 1608 igfxwd32.exe 612 igfxwd32.exe 1368 igfxwd32.exe 2940 igfxwd32.exe 2456 igfxwd32.exe 2348 igfxwd32.exe 2556 igfxwd32.exe 2780 igfxwd32.exe 2620 igfxwd32.exe 2604 igfxwd32.exe 2904 igfxwd32.exe 1956 igfxwd32.exe 296 igfxwd32.exe 776 igfxwd32.exe 1776 igfxwd32.exe 2032 igfxwd32.exe 1648 igfxwd32.exe 1636 igfxwd32.exe -
Loads dropped DLL 30 IoCs
pid Process 2164 d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe 2796 igfxwd32.exe 2828 igfxwd32.exe 3036 igfxwd32.exe 2892 igfxwd32.exe 2072 igfxwd32.exe 440 igfxwd32.exe 2824 igfxwd32.exe 2124 igfxwd32.exe 288 igfxwd32.exe 1660 igfxwd32.exe 1764 igfxwd32.exe 944 igfxwd32.exe 1608 igfxwd32.exe 612 igfxwd32.exe 1368 igfxwd32.exe 2940 igfxwd32.exe 2456 igfxwd32.exe 2348 igfxwd32.exe 2556 igfxwd32.exe 2780 igfxwd32.exe 2620 igfxwd32.exe 2604 igfxwd32.exe 2904 igfxwd32.exe 1956 igfxwd32.exe 296 igfxwd32.exe 776 igfxwd32.exe 1776 igfxwd32.exe 2032 igfxwd32.exe 1648 igfxwd32.exe -
resource yara_rule behavioral1/memory/2164-4-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2164-7-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2164-3-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2164-2-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2164-9-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2164-8-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2164-19-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2828-30-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2828-29-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2828-31-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2828-32-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2828-38-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2892-48-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2892-49-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2892-50-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2892-55-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/440-65-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/440-66-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/440-67-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/440-72-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2124-83-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2124-89-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1660-99-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1660-100-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1660-101-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1660-106-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/944-117-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/944-124-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/612-135-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/612-141-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2940-151-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2940-159-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2348-169-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2348-176-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2780-192-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2604-203-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2604-209-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1956-226-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/776-237-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/776-244-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2032-253-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2032-258-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1636-266-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1636-271-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 32 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe -
Drops file in System32 directory 48 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe -
Suspicious use of SetThreadContext 16 IoCs
description pid Process procid_target PID 2096 set thread context of 2164 2096 d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe 31 PID 2796 set thread context of 2828 2796 igfxwd32.exe 33 PID 3036 set thread context of 2892 3036 igfxwd32.exe 35 PID 2072 set thread context of 440 2072 igfxwd32.exe 37 PID 2824 set thread context of 2124 2824 igfxwd32.exe 39 PID 288 set thread context of 1660 288 igfxwd32.exe 41 PID 1764 set thread context of 944 1764 igfxwd32.exe 43 PID 1608 set thread context of 612 1608 igfxwd32.exe 46 PID 1368 set thread context of 2940 1368 igfxwd32.exe 48 PID 2456 set thread context of 2348 2456 igfxwd32.exe 50 PID 2556 set thread context of 2780 2556 igfxwd32.exe 52 PID 2620 set thread context of 2604 2620 igfxwd32.exe 54 PID 2904 set thread context of 1956 2904 igfxwd32.exe 56 PID 296 set thread context of 776 296 igfxwd32.exe 58 PID 1776 set thread context of 2032 1776 igfxwd32.exe 60 PID 1648 set thread context of 1636 1648 igfxwd32.exe 62 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 32 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2164 d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe 2164 d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe 2828 igfxwd32.exe 2828 igfxwd32.exe 2892 igfxwd32.exe 2892 igfxwd32.exe 440 igfxwd32.exe 440 igfxwd32.exe 2124 igfxwd32.exe 2124 igfxwd32.exe 1660 igfxwd32.exe 1660 igfxwd32.exe 944 igfxwd32.exe 944 igfxwd32.exe 612 igfxwd32.exe 612 igfxwd32.exe 2940 igfxwd32.exe 2940 igfxwd32.exe 2348 igfxwd32.exe 2348 igfxwd32.exe 2780 igfxwd32.exe 2780 igfxwd32.exe 2604 igfxwd32.exe 2604 igfxwd32.exe 1956 igfxwd32.exe 1956 igfxwd32.exe 776 igfxwd32.exe 776 igfxwd32.exe 2032 igfxwd32.exe 2032 igfxwd32.exe 1636 igfxwd32.exe 1636 igfxwd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2164 2096 d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe 31 PID 2096 wrote to memory of 2164 2096 d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe 31 PID 2096 wrote to memory of 2164 2096 d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe 31 PID 2096 wrote to memory of 2164 2096 d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe 31 PID 2096 wrote to memory of 2164 2096 d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe 31 PID 2096 wrote to memory of 2164 2096 d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe 31 PID 2096 wrote to memory of 2164 2096 d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe 31 PID 2164 wrote to memory of 2796 2164 d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe 32 PID 2164 wrote to memory of 2796 2164 d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe 32 PID 2164 wrote to memory of 2796 2164 d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe 32 PID 2164 wrote to memory of 2796 2164 d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe 32 PID 2796 wrote to memory of 2828 2796 igfxwd32.exe 33 PID 2796 wrote to memory of 2828 2796 igfxwd32.exe 33 PID 2796 wrote to memory of 2828 2796 igfxwd32.exe 33 PID 2796 wrote to memory of 2828 2796 igfxwd32.exe 33 PID 2796 wrote to memory of 2828 2796 igfxwd32.exe 33 PID 2796 wrote to memory of 2828 2796 igfxwd32.exe 33 PID 2796 wrote to memory of 2828 2796 igfxwd32.exe 33 PID 2828 wrote to memory of 3036 2828 igfxwd32.exe 34 PID 2828 wrote to memory of 3036 2828 igfxwd32.exe 34 PID 2828 wrote to memory of 3036 2828 igfxwd32.exe 34 PID 2828 wrote to memory of 3036 2828 igfxwd32.exe 34 PID 3036 wrote to memory of 2892 3036 igfxwd32.exe 35 PID 3036 wrote to memory of 2892 3036 igfxwd32.exe 35 PID 3036 wrote to memory of 2892 3036 igfxwd32.exe 35 PID 3036 wrote to memory of 2892 3036 igfxwd32.exe 35 PID 3036 wrote to memory of 2892 3036 igfxwd32.exe 35 PID 3036 wrote to memory of 2892 3036 igfxwd32.exe 35 PID 3036 wrote to memory of 2892 3036 igfxwd32.exe 35 PID 2892 wrote to memory of 2072 2892 igfxwd32.exe 36 PID 2892 wrote to memory of 2072 2892 igfxwd32.exe 36 PID 2892 wrote to memory of 2072 2892 igfxwd32.exe 36 PID 2892 wrote to memory of 2072 2892 igfxwd32.exe 36 PID 2072 wrote to memory of 440 2072 igfxwd32.exe 37 PID 2072 wrote to memory of 440 2072 igfxwd32.exe 37 PID 2072 wrote to memory of 440 2072 igfxwd32.exe 37 PID 2072 wrote to memory of 440 2072 igfxwd32.exe 37 PID 2072 wrote to memory of 440 2072 igfxwd32.exe 37 PID 2072 wrote to memory of 440 2072 igfxwd32.exe 37 PID 2072 wrote to memory of 440 2072 igfxwd32.exe 37 PID 440 wrote to memory of 2824 440 igfxwd32.exe 38 PID 440 wrote to memory of 2824 440 igfxwd32.exe 38 PID 440 wrote to memory of 2824 440 igfxwd32.exe 38 PID 440 wrote to memory of 2824 440 igfxwd32.exe 38 PID 2824 wrote to memory of 2124 2824 igfxwd32.exe 39 PID 2824 wrote to memory of 2124 2824 igfxwd32.exe 39 PID 2824 wrote to memory of 2124 2824 igfxwd32.exe 39 PID 2824 wrote to memory of 2124 2824 igfxwd32.exe 39 PID 2824 wrote to memory of 2124 2824 igfxwd32.exe 39 PID 2824 wrote to memory of 2124 2824 igfxwd32.exe 39 PID 2824 wrote to memory of 2124 2824 igfxwd32.exe 39 PID 2124 wrote to memory of 288 2124 igfxwd32.exe 40 PID 2124 wrote to memory of 288 2124 igfxwd32.exe 40 PID 2124 wrote to memory of 288 2124 igfxwd32.exe 40 PID 2124 wrote to memory of 288 2124 igfxwd32.exe 40 PID 288 wrote to memory of 1660 288 igfxwd32.exe 41 PID 288 wrote to memory of 1660 288 igfxwd32.exe 41 PID 288 wrote to memory of 1660 288 igfxwd32.exe 41 PID 288 wrote to memory of 1660 288 igfxwd32.exe 41 PID 288 wrote to memory of 1660 288 igfxwd32.exe 41 PID 288 wrote to memory of 1660 288 igfxwd32.exe 41 PID 288 wrote to memory of 1660 288 igfxwd32.exe 41 PID 1660 wrote to memory of 1764 1660 igfxwd32.exe 42 PID 1660 wrote to memory of 1764 1660 igfxwd32.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Users\Admin\AppData\Local\Temp\D21C62~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Users\Admin\AppData\Local\Temp\D21C62~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:288 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1764 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:944 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1608 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:612 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1368 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2940 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2456 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2348 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2556 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2780 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2620 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2604 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2904 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1956 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:296 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:776 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1776 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2032 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1648 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe32⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1636 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe33⤵PID:1364
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
174KB
MD5d21c621d44bca8273b62c12c3bbd8d18
SHA151e6f9f5ec103f11c5ddac5f673a0bf035d7d629
SHA256068b938f3445581d35ced514a15bbdc9352abd7538285b3c026a2b3a32020351
SHA512126db2189732449073f5c6905b89d3761233fb102d9b03e0a0b676fa39386213d72610ef5154e7bad5b06d3d9f141c934b4819b59d275c192856247f23743577