Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 14:07
Static task
static1
Behavioral task
behavioral1
Sample
d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe
-
Size
174KB
-
MD5
d21c621d44bca8273b62c12c3bbd8d18
-
SHA1
51e6f9f5ec103f11c5ddac5f673a0bf035d7d629
-
SHA256
068b938f3445581d35ced514a15bbdc9352abd7538285b3c026a2b3a32020351
-
SHA512
126db2189732449073f5c6905b89d3761233fb102d9b03e0a0b676fa39386213d72610ef5154e7bad5b06d3d9f141c934b4819b59d275c192856247f23743577
-
SSDEEP
3072:q6UHMux55s+W0z9fb6ULsFvGTwHiygGKFvRaS0MwlnYkArorWd40Nno:BuWf0z9fHLyowHw5vRaEi7brWigo
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings 2 TTPs 15 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation igfxwd32.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation igfxwd32.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation igfxwd32.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation igfxwd32.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation igfxwd32.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation igfxwd32.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation igfxwd32.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation igfxwd32.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation igfxwd32.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation igfxwd32.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation igfxwd32.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation igfxwd32.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation igfxwd32.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation igfxwd32.exe -
Deletes itself 1 IoCs
pid Process 2908 igfxwd32.exe -
Executes dropped EXE 29 IoCs
pid Process 3060 igfxwd32.exe 2908 igfxwd32.exe 1056 igfxwd32.exe 4180 igfxwd32.exe 4548 igfxwd32.exe 3592 igfxwd32.exe 544 igfxwd32.exe 4756 igfxwd32.exe 3780 igfxwd32.exe 3092 igfxwd32.exe 1612 igfxwd32.exe 3148 igfxwd32.exe 3008 igfxwd32.exe 208 igfxwd32.exe 2448 igfxwd32.exe 4688 igfxwd32.exe 1416 igfxwd32.exe 3020 igfxwd32.exe 3124 igfxwd32.exe 340 igfxwd32.exe 2324 igfxwd32.exe 3172 igfxwd32.exe 4940 igfxwd32.exe 5108 igfxwd32.exe 5076 igfxwd32.exe 3220 igfxwd32.exe 2984 igfxwd32.exe 1196 igfxwd32.exe 3476 igfxwd32.exe -
resource yara_rule behavioral2/memory/432-0-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/432-2-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/432-3-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/432-4-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/432-38-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2908-44-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2908-47-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4180-53-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3592-60-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4756-68-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3092-73-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3092-76-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3148-83-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/208-90-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4688-97-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3020-104-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/340-112-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3172-119-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/5108-127-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3220-136-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1196-144-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 30 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe -
Drops file in System32 directory 45 IoCs
description ioc Process File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe -
Suspicious use of SetThreadContext 15 IoCs
description pid Process procid_target PID 2240 set thread context of 432 2240 d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe 86 PID 3060 set thread context of 2908 3060 igfxwd32.exe 92 PID 1056 set thread context of 4180 1056 igfxwd32.exe 97 PID 4548 set thread context of 3592 4548 igfxwd32.exe 100 PID 544 set thread context of 4756 544 igfxwd32.exe 102 PID 3780 set thread context of 3092 3780 igfxwd32.exe 105 PID 1612 set thread context of 3148 1612 igfxwd32.exe 107 PID 3008 set thread context of 208 3008 igfxwd32.exe 109 PID 2448 set thread context of 4688 2448 igfxwd32.exe 111 PID 1416 set thread context of 3020 1416 igfxwd32.exe 113 PID 3124 set thread context of 340 3124 igfxwd32.exe 115 PID 2324 set thread context of 3172 2324 igfxwd32.exe 117 PID 4940 set thread context of 5108 4940 igfxwd32.exe 119 PID 5076 set thread context of 3220 5076 igfxwd32.exe 121 PID 2984 set thread context of 1196 2984 igfxwd32.exe 123 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 30 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwd32.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 432 d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe 432 d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe 432 d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe 432 d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe 2908 igfxwd32.exe 2908 igfxwd32.exe 2908 igfxwd32.exe 2908 igfxwd32.exe 4180 igfxwd32.exe 4180 igfxwd32.exe 4180 igfxwd32.exe 4180 igfxwd32.exe 3592 igfxwd32.exe 3592 igfxwd32.exe 3592 igfxwd32.exe 3592 igfxwd32.exe 4756 igfxwd32.exe 4756 igfxwd32.exe 4756 igfxwd32.exe 4756 igfxwd32.exe 3092 igfxwd32.exe 3092 igfxwd32.exe 3092 igfxwd32.exe 3092 igfxwd32.exe 3148 igfxwd32.exe 3148 igfxwd32.exe 3148 igfxwd32.exe 3148 igfxwd32.exe 208 igfxwd32.exe 208 igfxwd32.exe 208 igfxwd32.exe 208 igfxwd32.exe 4688 igfxwd32.exe 4688 igfxwd32.exe 4688 igfxwd32.exe 4688 igfxwd32.exe 3020 igfxwd32.exe 3020 igfxwd32.exe 3020 igfxwd32.exe 3020 igfxwd32.exe 340 igfxwd32.exe 340 igfxwd32.exe 340 igfxwd32.exe 340 igfxwd32.exe 3172 igfxwd32.exe 3172 igfxwd32.exe 3172 igfxwd32.exe 3172 igfxwd32.exe 5108 igfxwd32.exe 5108 igfxwd32.exe 5108 igfxwd32.exe 5108 igfxwd32.exe 3220 igfxwd32.exe 3220 igfxwd32.exe 3220 igfxwd32.exe 3220 igfxwd32.exe 1196 igfxwd32.exe 1196 igfxwd32.exe 1196 igfxwd32.exe 1196 igfxwd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2240 wrote to memory of 432 2240 d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe 86 PID 2240 wrote to memory of 432 2240 d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe 86 PID 2240 wrote to memory of 432 2240 d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe 86 PID 2240 wrote to memory of 432 2240 d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe 86 PID 2240 wrote to memory of 432 2240 d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe 86 PID 2240 wrote to memory of 432 2240 d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe 86 PID 2240 wrote to memory of 432 2240 d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe 86 PID 432 wrote to memory of 3060 432 d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe 87 PID 432 wrote to memory of 3060 432 d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe 87 PID 432 wrote to memory of 3060 432 d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe 87 PID 3060 wrote to memory of 2908 3060 igfxwd32.exe 92 PID 3060 wrote to memory of 2908 3060 igfxwd32.exe 92 PID 3060 wrote to memory of 2908 3060 igfxwd32.exe 92 PID 3060 wrote to memory of 2908 3060 igfxwd32.exe 92 PID 3060 wrote to memory of 2908 3060 igfxwd32.exe 92 PID 3060 wrote to memory of 2908 3060 igfxwd32.exe 92 PID 3060 wrote to memory of 2908 3060 igfxwd32.exe 92 PID 2908 wrote to memory of 1056 2908 igfxwd32.exe 94 PID 2908 wrote to memory of 1056 2908 igfxwd32.exe 94 PID 2908 wrote to memory of 1056 2908 igfxwd32.exe 94 PID 1056 wrote to memory of 4180 1056 igfxwd32.exe 97 PID 1056 wrote to memory of 4180 1056 igfxwd32.exe 97 PID 1056 wrote to memory of 4180 1056 igfxwd32.exe 97 PID 1056 wrote to memory of 4180 1056 igfxwd32.exe 97 PID 1056 wrote to memory of 4180 1056 igfxwd32.exe 97 PID 1056 wrote to memory of 4180 1056 igfxwd32.exe 97 PID 1056 wrote to memory of 4180 1056 igfxwd32.exe 97 PID 4180 wrote to memory of 4548 4180 igfxwd32.exe 99 PID 4180 wrote to memory of 4548 4180 igfxwd32.exe 99 PID 4180 wrote to memory of 4548 4180 igfxwd32.exe 99 PID 4548 wrote to memory of 3592 4548 igfxwd32.exe 100 PID 4548 wrote to memory of 3592 4548 igfxwd32.exe 100 PID 4548 wrote to memory of 3592 4548 igfxwd32.exe 100 PID 4548 wrote to memory of 3592 4548 igfxwd32.exe 100 PID 4548 wrote to memory of 3592 4548 igfxwd32.exe 100 PID 4548 wrote to memory of 3592 4548 igfxwd32.exe 100 PID 4548 wrote to memory of 3592 4548 igfxwd32.exe 100 PID 3592 wrote to memory of 544 3592 igfxwd32.exe 101 PID 3592 wrote to memory of 544 3592 igfxwd32.exe 101 PID 3592 wrote to memory of 544 3592 igfxwd32.exe 101 PID 544 wrote to memory of 4756 544 igfxwd32.exe 102 PID 544 wrote to memory of 4756 544 igfxwd32.exe 102 PID 544 wrote to memory of 4756 544 igfxwd32.exe 102 PID 544 wrote to memory of 4756 544 igfxwd32.exe 102 PID 544 wrote to memory of 4756 544 igfxwd32.exe 102 PID 544 wrote to memory of 4756 544 igfxwd32.exe 102 PID 544 wrote to memory of 4756 544 igfxwd32.exe 102 PID 4756 wrote to memory of 3780 4756 igfxwd32.exe 103 PID 4756 wrote to memory of 3780 4756 igfxwd32.exe 103 PID 4756 wrote to memory of 3780 4756 igfxwd32.exe 103 PID 3780 wrote to memory of 3092 3780 igfxwd32.exe 105 PID 3780 wrote to memory of 3092 3780 igfxwd32.exe 105 PID 3780 wrote to memory of 3092 3780 igfxwd32.exe 105 PID 3780 wrote to memory of 3092 3780 igfxwd32.exe 105 PID 3780 wrote to memory of 3092 3780 igfxwd32.exe 105 PID 3780 wrote to memory of 3092 3780 igfxwd32.exe 105 PID 3780 wrote to memory of 3092 3780 igfxwd32.exe 105 PID 3092 wrote to memory of 1612 3092 igfxwd32.exe 106 PID 3092 wrote to memory of 1612 3092 igfxwd32.exe 106 PID 3092 wrote to memory of 1612 3092 igfxwd32.exe 106 PID 1612 wrote to memory of 3148 1612 igfxwd32.exe 107 PID 1612 wrote to memory of 3148 1612 igfxwd32.exe 107 PID 1612 wrote to memory of 3148 1612 igfxwd32.exe 107 PID 1612 wrote to memory of 3148 1612 igfxwd32.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d21c621d44bca8273b62c12c3bbd8d18_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Users\Admin\AppData\Local\Temp\D21C62~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Users\Admin\AppData\Local\Temp\D21C62~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3148 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3008 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:208 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2448 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4688 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1416 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3020 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3124 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:340 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2324 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3172 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4940 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5108 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5076 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3220 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2984 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1196 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe31⤵
- Executes dropped EXE
PID:3476
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
174KB
MD5d21c621d44bca8273b62c12c3bbd8d18
SHA151e6f9f5ec103f11c5ddac5f673a0bf035d7d629
SHA256068b938f3445581d35ced514a15bbdc9352abd7538285b3c026a2b3a32020351
SHA512126db2189732449073f5c6905b89d3761233fb102d9b03e0a0b676fa39386213d72610ef5154e7bad5b06d3d9f141c934b4819b59d275c192856247f23743577