Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 11:28
Static task
static1
Behavioral task
behavioral1
Sample
da3facee7a96f29ebc9a3196dc7b277e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da3facee7a96f29ebc9a3196dc7b277e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
da3facee7a96f29ebc9a3196dc7b277e_JaffaCakes118.exe
-
Size
150KB
-
MD5
da3facee7a96f29ebc9a3196dc7b277e
-
SHA1
2aef3160046e8d182e807248c48829152f4075e4
-
SHA256
eb8ed6c7d9080156bf2373f52ebf194284bdf5b72402290dc9760a053338dcdd
-
SHA512
b2a8a5858cc11c2283d900e943e9e48b875427428c9fbd7739eb5d6839858e9bdcbf4e0d27e59692ca87aed4f578842bbda7e8f700d5c6bd3e2a7ef92acf77c1
-
SSDEEP
3072:LdGFGzpJgFVmDLdhhH2gRgESxd0bgM4n8mNFEL6LuFoXxVZs71svJkQEWYS7EbDd:LwGfthhWgRgESxd0aHNF+EZYsqQEW372
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings 2 TTPs 15 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation igfxck32.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation igfxck32.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation igfxck32.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation da3facee7a96f29ebc9a3196dc7b277e_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation igfxck32.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation igfxck32.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation igfxck32.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation igfxck32.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation igfxck32.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation igfxck32.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation igfxck32.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation igfxck32.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation igfxck32.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation igfxck32.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation igfxck32.exe -
Deletes itself 1 IoCs
pid Process 1072 igfxck32.exe -
Executes dropped EXE 30 IoCs
pid Process 4088 igfxck32.exe 1072 igfxck32.exe 2264 igfxck32.exe 1416 igfxck32.exe 2000 igfxck32.exe 3236 igfxck32.exe 3512 igfxck32.exe 4128 igfxck32.exe 1320 igfxck32.exe 3048 igfxck32.exe 1188 igfxck32.exe 2028 igfxck32.exe 1164 igfxck32.exe 64 igfxck32.exe 2256 igfxck32.exe 2944 igfxck32.exe 4144 igfxck32.exe 4720 igfxck32.exe 3980 igfxck32.exe 412 igfxck32.exe 2552 igfxck32.exe 1608 igfxck32.exe 2380 igfxck32.exe 3756 igfxck32.exe 3540 igfxck32.exe 4364 igfxck32.exe 832 igfxck32.exe 4004 igfxck32.exe 4488 igfxck32.exe 3304 igfxck32.exe -
resource yara_rule behavioral2/memory/1984-1-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1984-4-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1984-5-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1984-6-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1984-33-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1072-46-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1984-50-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1072-51-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1072-64-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1416-63-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1416-66-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1416-70-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/3236-74-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/3236-75-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/3236-80-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/3236-85-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4128-92-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4128-97-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/3048-101-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/2028-108-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/2028-116-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/64-119-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/64-125-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/2944-129-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/2944-136-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4720-139-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4720-146-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/412-149-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/412-156-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1608-162-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/3756-170-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4364-176-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/3756-179-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4364-181-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4364-185-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4004-192-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4004-201-0x0000000000400000-0x000000000045A000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 32 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxck32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxck32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxck32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxck32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxck32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 da3facee7a96f29ebc9a3196dc7b277e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxck32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxck32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxck32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxck32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxck32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxck32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxck32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxck32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxck32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxck32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxck32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum da3facee7a96f29ebc9a3196dc7b277e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxck32.exe -
Drops file in System32 directory 48 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File opened for modification C:\Windows\SysWOW64\ igfxck32.exe File opened for modification C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File created C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File opened for modification C:\Windows\SysWOW64\ igfxck32.exe File opened for modification C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File opened for modification C:\Windows\SysWOW64\ igfxck32.exe File opened for modification C:\Windows\SysWOW64\igfxck32.exe da3facee7a96f29ebc9a3196dc7b277e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File opened for modification C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File created C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File opened for modification C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File created C:\Windows\SysWOW64\igfxck32.exe da3facee7a96f29ebc9a3196dc7b277e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxck32.exe File opened for modification C:\Windows\SysWOW64\ igfxck32.exe File created C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File created C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File opened for modification C:\Windows\SysWOW64\ igfxck32.exe File created C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File created C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File opened for modification C:\Windows\SysWOW64\ igfxck32.exe File created C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File opened for modification C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File opened for modification C:\Windows\SysWOW64\ igfxck32.exe File opened for modification C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File opened for modification C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File created C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File opened for modification C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File opened for modification C:\Windows\SysWOW64\ igfxck32.exe File opened for modification C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File opened for modification C:\Windows\SysWOW64\ da3facee7a96f29ebc9a3196dc7b277e_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File opened for modification C:\Windows\SysWOW64\ igfxck32.exe File opened for modification C:\Windows\SysWOW64\ igfxck32.exe File created C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File created C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File opened for modification C:\Windows\SysWOW64\ igfxck32.exe File opened for modification C:\Windows\SysWOW64\ igfxck32.exe File created C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File opened for modification C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File created C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File opened for modification C:\Windows\SysWOW64\ igfxck32.exe File opened for modification C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File opened for modification C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File created C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File created C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File opened for modification C:\Windows\SysWOW64\igfxck32.exe igfxck32.exe File opened for modification C:\Windows\SysWOW64\ igfxck32.exe -
Suspicious use of SetThreadContext 16 IoCs
description pid Process procid_target PID 3520 set thread context of 1984 3520 da3facee7a96f29ebc9a3196dc7b277e_JaffaCakes118.exe 84 PID 4088 set thread context of 1072 4088 igfxck32.exe 91 PID 2264 set thread context of 1416 2264 igfxck32.exe 98 PID 2000 set thread context of 3236 2000 igfxck32.exe 101 PID 3512 set thread context of 4128 3512 igfxck32.exe 104 PID 1320 set thread context of 3048 1320 igfxck32.exe 106 PID 1188 set thread context of 2028 1188 igfxck32.exe 108 PID 1164 set thread context of 64 1164 igfxck32.exe 110 PID 2256 set thread context of 2944 2256 igfxck32.exe 112 PID 4144 set thread context of 4720 4144 igfxck32.exe 114 PID 3980 set thread context of 412 3980 igfxck32.exe 116 PID 2552 set thread context of 1608 2552 igfxck32.exe 118 PID 2380 set thread context of 3756 2380 igfxck32.exe 120 PID 3540 set thread context of 4364 3540 igfxck32.exe 122 PID 832 set thread context of 4004 832 igfxck32.exe 124 PID 4488 set thread context of 3304 4488 igfxck32.exe 126 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 32 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da3facee7a96f29ebc9a3196dc7b277e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da3facee7a96f29ebc9a3196dc7b277e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxck32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxck32.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxck32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxck32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxck32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxck32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxck32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxck32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxck32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxck32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxck32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxck32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxck32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ da3facee7a96f29ebc9a3196dc7b277e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxck32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxck32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxck32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1984 da3facee7a96f29ebc9a3196dc7b277e_JaffaCakes118.exe 1984 da3facee7a96f29ebc9a3196dc7b277e_JaffaCakes118.exe 1984 da3facee7a96f29ebc9a3196dc7b277e_JaffaCakes118.exe 1984 da3facee7a96f29ebc9a3196dc7b277e_JaffaCakes118.exe 1072 igfxck32.exe 1072 igfxck32.exe 1072 igfxck32.exe 1072 igfxck32.exe 1416 igfxck32.exe 1416 igfxck32.exe 1416 igfxck32.exe 1416 igfxck32.exe 3236 igfxck32.exe 3236 igfxck32.exe 3236 igfxck32.exe 3236 igfxck32.exe 4128 igfxck32.exe 4128 igfxck32.exe 4128 igfxck32.exe 4128 igfxck32.exe 3048 igfxck32.exe 3048 igfxck32.exe 3048 igfxck32.exe 3048 igfxck32.exe 2028 igfxck32.exe 2028 igfxck32.exe 2028 igfxck32.exe 2028 igfxck32.exe 64 igfxck32.exe 64 igfxck32.exe 64 igfxck32.exe 64 igfxck32.exe 2944 igfxck32.exe 2944 igfxck32.exe 2944 igfxck32.exe 2944 igfxck32.exe 4720 igfxck32.exe 4720 igfxck32.exe 4720 igfxck32.exe 4720 igfxck32.exe 412 igfxck32.exe 412 igfxck32.exe 412 igfxck32.exe 412 igfxck32.exe 1608 igfxck32.exe 1608 igfxck32.exe 1608 igfxck32.exe 1608 igfxck32.exe 3756 igfxck32.exe 3756 igfxck32.exe 3756 igfxck32.exe 3756 igfxck32.exe 4364 igfxck32.exe 4364 igfxck32.exe 4364 igfxck32.exe 4364 igfxck32.exe 4004 igfxck32.exe 4004 igfxck32.exe 4004 igfxck32.exe 4004 igfxck32.exe 3304 igfxck32.exe 3304 igfxck32.exe 3304 igfxck32.exe 3304 igfxck32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3520 wrote to memory of 1984 3520 da3facee7a96f29ebc9a3196dc7b277e_JaffaCakes118.exe 84 PID 3520 wrote to memory of 1984 3520 da3facee7a96f29ebc9a3196dc7b277e_JaffaCakes118.exe 84 PID 3520 wrote to memory of 1984 3520 da3facee7a96f29ebc9a3196dc7b277e_JaffaCakes118.exe 84 PID 3520 wrote to memory of 1984 3520 da3facee7a96f29ebc9a3196dc7b277e_JaffaCakes118.exe 84 PID 3520 wrote to memory of 1984 3520 da3facee7a96f29ebc9a3196dc7b277e_JaffaCakes118.exe 84 PID 3520 wrote to memory of 1984 3520 da3facee7a96f29ebc9a3196dc7b277e_JaffaCakes118.exe 84 PID 3520 wrote to memory of 1984 3520 da3facee7a96f29ebc9a3196dc7b277e_JaffaCakes118.exe 84 PID 1984 wrote to memory of 4088 1984 da3facee7a96f29ebc9a3196dc7b277e_JaffaCakes118.exe 90 PID 1984 wrote to memory of 4088 1984 da3facee7a96f29ebc9a3196dc7b277e_JaffaCakes118.exe 90 PID 1984 wrote to memory of 4088 1984 da3facee7a96f29ebc9a3196dc7b277e_JaffaCakes118.exe 90 PID 4088 wrote to memory of 1072 4088 igfxck32.exe 91 PID 4088 wrote to memory of 1072 4088 igfxck32.exe 91 PID 4088 wrote to memory of 1072 4088 igfxck32.exe 91 PID 4088 wrote to memory of 1072 4088 igfxck32.exe 91 PID 4088 wrote to memory of 1072 4088 igfxck32.exe 91 PID 4088 wrote to memory of 1072 4088 igfxck32.exe 91 PID 4088 wrote to memory of 1072 4088 igfxck32.exe 91 PID 1072 wrote to memory of 2264 1072 igfxck32.exe 97 PID 1072 wrote to memory of 2264 1072 igfxck32.exe 97 PID 1072 wrote to memory of 2264 1072 igfxck32.exe 97 PID 2264 wrote to memory of 1416 2264 igfxck32.exe 98 PID 2264 wrote to memory of 1416 2264 igfxck32.exe 98 PID 2264 wrote to memory of 1416 2264 igfxck32.exe 98 PID 2264 wrote to memory of 1416 2264 igfxck32.exe 98 PID 2264 wrote to memory of 1416 2264 igfxck32.exe 98 PID 2264 wrote to memory of 1416 2264 igfxck32.exe 98 PID 2264 wrote to memory of 1416 2264 igfxck32.exe 98 PID 1416 wrote to memory of 2000 1416 igfxck32.exe 99 PID 1416 wrote to memory of 2000 1416 igfxck32.exe 99 PID 1416 wrote to memory of 2000 1416 igfxck32.exe 99 PID 2000 wrote to memory of 3236 2000 igfxck32.exe 101 PID 2000 wrote to memory of 3236 2000 igfxck32.exe 101 PID 2000 wrote to memory of 3236 2000 igfxck32.exe 101 PID 2000 wrote to memory of 3236 2000 igfxck32.exe 101 PID 2000 wrote to memory of 3236 2000 igfxck32.exe 101 PID 2000 wrote to memory of 3236 2000 igfxck32.exe 101 PID 2000 wrote to memory of 3236 2000 igfxck32.exe 101 PID 3236 wrote to memory of 3512 3236 igfxck32.exe 103 PID 3236 wrote to memory of 3512 3236 igfxck32.exe 103 PID 3236 wrote to memory of 3512 3236 igfxck32.exe 103 PID 3512 wrote to memory of 4128 3512 igfxck32.exe 104 PID 3512 wrote to memory of 4128 3512 igfxck32.exe 104 PID 3512 wrote to memory of 4128 3512 igfxck32.exe 104 PID 3512 wrote to memory of 4128 3512 igfxck32.exe 104 PID 3512 wrote to memory of 4128 3512 igfxck32.exe 104 PID 3512 wrote to memory of 4128 3512 igfxck32.exe 104 PID 3512 wrote to memory of 4128 3512 igfxck32.exe 104 PID 4128 wrote to memory of 1320 4128 igfxck32.exe 105 PID 4128 wrote to memory of 1320 4128 igfxck32.exe 105 PID 4128 wrote to memory of 1320 4128 igfxck32.exe 105 PID 1320 wrote to memory of 3048 1320 igfxck32.exe 106 PID 1320 wrote to memory of 3048 1320 igfxck32.exe 106 PID 1320 wrote to memory of 3048 1320 igfxck32.exe 106 PID 1320 wrote to memory of 3048 1320 igfxck32.exe 106 PID 1320 wrote to memory of 3048 1320 igfxck32.exe 106 PID 1320 wrote to memory of 3048 1320 igfxck32.exe 106 PID 1320 wrote to memory of 3048 1320 igfxck32.exe 106 PID 3048 wrote to memory of 1188 3048 igfxck32.exe 107 PID 3048 wrote to memory of 1188 3048 igfxck32.exe 107 PID 3048 wrote to memory of 1188 3048 igfxck32.exe 107 PID 1188 wrote to memory of 2028 1188 igfxck32.exe 108 PID 1188 wrote to memory of 2028 1188 igfxck32.exe 108 PID 1188 wrote to memory of 2028 1188 igfxck32.exe 108 PID 1188 wrote to memory of 2028 1188 igfxck32.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\da3facee7a96f29ebc9a3196dc7b277e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\da3facee7a96f29ebc9a3196dc7b277e_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\da3facee7a96f29ebc9a3196dc7b277e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\da3facee7a96f29ebc9a3196dc7b277e_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Users\Admin\AppData\Local\Temp\DA3FAC~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Users\Admin\AppData\Local\Temp\DA3FAC~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2028 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1164 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:64 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2256 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2944 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4144 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4720 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3980 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:412 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2552 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1608 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2380 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3756 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3540 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4364 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:832 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4004 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4488 -
C:\Windows\SysWOW64\igfxck32.exe"C:\Windows\system32\igfxck32.exe" C:\Windows\SysWOW64\igfxck32.exe32⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3304
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150KB
MD5da3facee7a96f29ebc9a3196dc7b277e
SHA12aef3160046e8d182e807248c48829152f4075e4
SHA256eb8ed6c7d9080156bf2373f52ebf194284bdf5b72402290dc9760a053338dcdd
SHA512b2a8a5858cc11c2283d900e943e9e48b875427428c9fbd7739eb5d6839858e9bdcbf4e0d27e59692ca87aed4f578842bbda7e8f700d5c6bd3e2a7ef92acf77c1