Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 10:57
Static task
static1
Behavioral task
behavioral1
Sample
e252b7b4ded60127cc7055e7ebdc2c24_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e252b7b4ded60127cc7055e7ebdc2c24_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e252b7b4ded60127cc7055e7ebdc2c24_JaffaCakes118.exe
-
Size
172KB
-
MD5
e252b7b4ded60127cc7055e7ebdc2c24
-
SHA1
cf34fc6879a71f9eac3763dd2b1f6be897501dcd
-
SHA256
7b7617175b4ce06c090994f79a7fe6277a9fdfc21ff69c553de4efd0c18e9701
-
SHA512
f8de390e7ecd9248f00ed082ff77baec342412975b790e5ec1874529e6741b282ede809588380242c0cd75e70f2fa44efb361a120e7b678eba90510155eeadfa
-
SSDEEP
3072:3KBVVCwNN7U8l6i4SlWOun4eDurDCDXIbBA0b8XxfJYJA:68m7OslWOteFUbBAuAxfp
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings 2 TTPs 16 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation igfxpa32.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation igfxpa32.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation igfxpa32.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation igfxpa32.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation igfxpa32.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation e252b7b4ded60127cc7055e7ebdc2c24_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation igfxpa32.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation igfxpa32.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation igfxpa32.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation igfxpa32.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation igfxpa32.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation igfxpa32.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation igfxpa32.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation igfxpa32.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation igfxpa32.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation igfxpa32.exe -
Deletes itself 1 IoCs
pid Process 3748 igfxpa32.exe -
Executes dropped EXE 32 IoCs
pid Process 1996 igfxpa32.exe 3748 igfxpa32.exe 3632 igfxpa32.exe 1876 igfxpa32.exe 816 igfxpa32.exe 1472 igfxpa32.exe 3532 igfxpa32.exe 2424 igfxpa32.exe 3088 igfxpa32.exe 844 igfxpa32.exe 3896 igfxpa32.exe 2360 igfxpa32.exe 4760 igfxpa32.exe 2968 igfxpa32.exe 4756 igfxpa32.exe 2060 igfxpa32.exe 4260 igfxpa32.exe 1260 igfxpa32.exe 2432 igfxpa32.exe 2692 igfxpa32.exe 3800 igfxpa32.exe 3616 igfxpa32.exe 220 igfxpa32.exe 880 igfxpa32.exe 2516 igfxpa32.exe 5112 igfxpa32.exe 1788 igfxpa32.exe 3776 igfxpa32.exe 3580 igfxpa32.exe 3792 igfxpa32.exe 3636 igfxpa32.exe 1784 igfxpa32.exe -
resource yara_rule behavioral2/memory/4088-2-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/4088-5-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/4088-7-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/4088-6-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/4088-34-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/3748-47-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/4088-49-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/3748-51-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/1876-59-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/3748-63-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/1876-65-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/1876-71-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/2424-78-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/1472-77-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/1472-81-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/2424-86-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/2424-92-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/844-97-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/844-100-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/2360-106-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/2360-112-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/2968-116-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/2968-120-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/2060-125-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/2060-129-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/1260-135-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/1260-138-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/2692-143-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/2692-147-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/3616-153-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/3616-158-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/880-162-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/880-168-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/5112-170-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/5112-179-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/3776-183-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/3776-189-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/3792-194-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/3792-199-0x0000000000400000-0x0000000000451000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 34 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpa32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 e252b7b4ded60127cc7055e7ebdc2c24_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpa32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpa32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpa32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpa32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpa32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum e252b7b4ded60127cc7055e7ebdc2c24_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpa32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpa32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpa32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpa32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpa32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpa32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpa32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpa32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpa32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpa32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpa32.exe -
Drops file in System32 directory 48 IoCs
description ioc Process File created C:\Windows\SysWOW64\igfxpa32.exe igfxpa32.exe File created C:\Windows\SysWOW64\igfxpa32.exe igfxpa32.exe File opened for modification C:\Windows\SysWOW64\ igfxpa32.exe File created C:\Windows\SysWOW64\igfxpa32.exe igfxpa32.exe File created C:\Windows\SysWOW64\igfxpa32.exe igfxpa32.exe File opened for modification C:\Windows\SysWOW64\igfxpa32.exe igfxpa32.exe File opened for modification C:\Windows\SysWOW64\igfxpa32.exe igfxpa32.exe File created C:\Windows\SysWOW64\igfxpa32.exe igfxpa32.exe File created C:\Windows\SysWOW64\igfxpa32.exe igfxpa32.exe File opened for modification C:\Windows\SysWOW64\igfxpa32.exe igfxpa32.exe File opened for modification C:\Windows\SysWOW64\igfxpa32.exe igfxpa32.exe File created C:\Windows\SysWOW64\igfxpa32.exe e252b7b4ded60127cc7055e7ebdc2c24_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxpa32.exe igfxpa32.exe File opened for modification C:\Windows\SysWOW64\ igfxpa32.exe File created C:\Windows\SysWOW64\igfxpa32.exe igfxpa32.exe File opened for modification C:\Windows\SysWOW64\igfxpa32.exe igfxpa32.exe File opened for modification C:\Windows\SysWOW64\igfxpa32.exe igfxpa32.exe File created C:\Windows\SysWOW64\igfxpa32.exe igfxpa32.exe File opened for modification C:\Windows\SysWOW64\ igfxpa32.exe File opened for modification C:\Windows\SysWOW64\igfxpa32.exe igfxpa32.exe File opened for modification C:\Windows\SysWOW64\ igfxpa32.exe File opened for modification C:\Windows\SysWOW64\ igfxpa32.exe File opened for modification C:\Windows\SysWOW64\ igfxpa32.exe File opened for modification C:\Windows\SysWOW64\igfxpa32.exe igfxpa32.exe File opened for modification C:\Windows\SysWOW64\igfxpa32.exe e252b7b4ded60127cc7055e7ebdc2c24_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxpa32.exe File opened for modification C:\Windows\SysWOW64\igfxpa32.exe igfxpa32.exe File opened for modification C:\Windows\SysWOW64\ igfxpa32.exe File opened for modification C:\Windows\SysWOW64\igfxpa32.exe igfxpa32.exe File created C:\Windows\SysWOW64\igfxpa32.exe igfxpa32.exe File opened for modification C:\Windows\SysWOW64\igfxpa32.exe igfxpa32.exe File created C:\Windows\SysWOW64\igfxpa32.exe igfxpa32.exe File created C:\Windows\SysWOW64\igfxpa32.exe igfxpa32.exe File opened for modification C:\Windows\SysWOW64\ igfxpa32.exe File created C:\Windows\SysWOW64\igfxpa32.exe igfxpa32.exe File opened for modification C:\Windows\SysWOW64\igfxpa32.exe igfxpa32.exe File opened for modification C:\Windows\SysWOW64\ igfxpa32.exe File opened for modification C:\Windows\SysWOW64\ igfxpa32.exe File created C:\Windows\SysWOW64\igfxpa32.exe igfxpa32.exe File opened for modification C:\Windows\SysWOW64\ igfxpa32.exe File opened for modification C:\Windows\SysWOW64\ e252b7b4ded60127cc7055e7ebdc2c24_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxpa32.exe igfxpa32.exe File opened for modification C:\Windows\SysWOW64\ igfxpa32.exe File opened for modification C:\Windows\SysWOW64\igfxpa32.exe igfxpa32.exe File opened for modification C:\Windows\SysWOW64\ igfxpa32.exe File created C:\Windows\SysWOW64\igfxpa32.exe igfxpa32.exe File opened for modification C:\Windows\SysWOW64\ igfxpa32.exe File created C:\Windows\SysWOW64\igfxpa32.exe igfxpa32.exe -
Suspicious use of SetThreadContext 17 IoCs
description pid Process procid_target PID 1364 set thread context of 4088 1364 e252b7b4ded60127cc7055e7ebdc2c24_JaffaCakes118.exe 86 PID 1996 set thread context of 3748 1996 igfxpa32.exe 96 PID 3632 set thread context of 1876 3632 igfxpa32.exe 100 PID 816 set thread context of 1472 816 igfxpa32.exe 102 PID 3532 set thread context of 2424 3532 igfxpa32.exe 106 PID 3088 set thread context of 844 3088 igfxpa32.exe 108 PID 3896 set thread context of 2360 3896 igfxpa32.exe 110 PID 4760 set thread context of 2968 4760 igfxpa32.exe 112 PID 4756 set thread context of 2060 4756 igfxpa32.exe 114 PID 4260 set thread context of 1260 4260 igfxpa32.exe 116 PID 2432 set thread context of 2692 2432 igfxpa32.exe 118 PID 3800 set thread context of 3616 3800 igfxpa32.exe 120 PID 220 set thread context of 880 220 igfxpa32.exe 122 PID 2516 set thread context of 5112 2516 igfxpa32.exe 124 PID 1788 set thread context of 3776 1788 igfxpa32.exe 126 PID 3580 set thread context of 3792 3580 igfxpa32.exe 128 PID 3636 set thread context of 1784 3636 igfxpa32.exe 130 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 33 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e252b7b4ded60127cc7055e7ebdc2c24_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e252b7b4ded60127cc7055e7ebdc2c24_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpa32.exe -
Modifies registry class 16 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ e252b7b4ded60127cc7055e7ebdc2c24_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxpa32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4088 e252b7b4ded60127cc7055e7ebdc2c24_JaffaCakes118.exe 4088 e252b7b4ded60127cc7055e7ebdc2c24_JaffaCakes118.exe 4088 e252b7b4ded60127cc7055e7ebdc2c24_JaffaCakes118.exe 4088 e252b7b4ded60127cc7055e7ebdc2c24_JaffaCakes118.exe 3748 igfxpa32.exe 3748 igfxpa32.exe 3748 igfxpa32.exe 3748 igfxpa32.exe 1876 igfxpa32.exe 1876 igfxpa32.exe 1876 igfxpa32.exe 1876 igfxpa32.exe 1472 igfxpa32.exe 1472 igfxpa32.exe 1472 igfxpa32.exe 1472 igfxpa32.exe 2424 igfxpa32.exe 2424 igfxpa32.exe 2424 igfxpa32.exe 2424 igfxpa32.exe 844 igfxpa32.exe 844 igfxpa32.exe 844 igfxpa32.exe 844 igfxpa32.exe 2360 igfxpa32.exe 2360 igfxpa32.exe 2360 igfxpa32.exe 2360 igfxpa32.exe 2968 igfxpa32.exe 2968 igfxpa32.exe 2968 igfxpa32.exe 2968 igfxpa32.exe 2060 igfxpa32.exe 2060 igfxpa32.exe 2060 igfxpa32.exe 2060 igfxpa32.exe 1260 igfxpa32.exe 1260 igfxpa32.exe 1260 igfxpa32.exe 1260 igfxpa32.exe 2692 igfxpa32.exe 2692 igfxpa32.exe 2692 igfxpa32.exe 2692 igfxpa32.exe 3616 igfxpa32.exe 3616 igfxpa32.exe 3616 igfxpa32.exe 3616 igfxpa32.exe 880 igfxpa32.exe 880 igfxpa32.exe 880 igfxpa32.exe 880 igfxpa32.exe 5112 igfxpa32.exe 5112 igfxpa32.exe 5112 igfxpa32.exe 5112 igfxpa32.exe 3776 igfxpa32.exe 3776 igfxpa32.exe 3776 igfxpa32.exe 3776 igfxpa32.exe 3792 igfxpa32.exe 3792 igfxpa32.exe 3792 igfxpa32.exe 3792 igfxpa32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1364 wrote to memory of 4088 1364 e252b7b4ded60127cc7055e7ebdc2c24_JaffaCakes118.exe 86 PID 1364 wrote to memory of 4088 1364 e252b7b4ded60127cc7055e7ebdc2c24_JaffaCakes118.exe 86 PID 1364 wrote to memory of 4088 1364 e252b7b4ded60127cc7055e7ebdc2c24_JaffaCakes118.exe 86 PID 1364 wrote to memory of 4088 1364 e252b7b4ded60127cc7055e7ebdc2c24_JaffaCakes118.exe 86 PID 1364 wrote to memory of 4088 1364 e252b7b4ded60127cc7055e7ebdc2c24_JaffaCakes118.exe 86 PID 1364 wrote to memory of 4088 1364 e252b7b4ded60127cc7055e7ebdc2c24_JaffaCakes118.exe 86 PID 1364 wrote to memory of 4088 1364 e252b7b4ded60127cc7055e7ebdc2c24_JaffaCakes118.exe 86 PID 4088 wrote to memory of 1996 4088 e252b7b4ded60127cc7055e7ebdc2c24_JaffaCakes118.exe 95 PID 4088 wrote to memory of 1996 4088 e252b7b4ded60127cc7055e7ebdc2c24_JaffaCakes118.exe 95 PID 4088 wrote to memory of 1996 4088 e252b7b4ded60127cc7055e7ebdc2c24_JaffaCakes118.exe 95 PID 1996 wrote to memory of 3748 1996 igfxpa32.exe 96 PID 1996 wrote to memory of 3748 1996 igfxpa32.exe 96 PID 1996 wrote to memory of 3748 1996 igfxpa32.exe 96 PID 1996 wrote to memory of 3748 1996 igfxpa32.exe 96 PID 1996 wrote to memory of 3748 1996 igfxpa32.exe 96 PID 1996 wrote to memory of 3748 1996 igfxpa32.exe 96 PID 1996 wrote to memory of 3748 1996 igfxpa32.exe 96 PID 3748 wrote to memory of 3632 3748 igfxpa32.exe 99 PID 3748 wrote to memory of 3632 3748 igfxpa32.exe 99 PID 3748 wrote to memory of 3632 3748 igfxpa32.exe 99 PID 3632 wrote to memory of 1876 3632 igfxpa32.exe 100 PID 3632 wrote to memory of 1876 3632 igfxpa32.exe 100 PID 3632 wrote to memory of 1876 3632 igfxpa32.exe 100 PID 3632 wrote to memory of 1876 3632 igfxpa32.exe 100 PID 3632 wrote to memory of 1876 3632 igfxpa32.exe 100 PID 3632 wrote to memory of 1876 3632 igfxpa32.exe 100 PID 3632 wrote to memory of 1876 3632 igfxpa32.exe 100 PID 1876 wrote to memory of 816 1876 igfxpa32.exe 101 PID 1876 wrote to memory of 816 1876 igfxpa32.exe 101 PID 1876 wrote to memory of 816 1876 igfxpa32.exe 101 PID 816 wrote to memory of 1472 816 igfxpa32.exe 102 PID 816 wrote to memory of 1472 816 igfxpa32.exe 102 PID 816 wrote to memory of 1472 816 igfxpa32.exe 102 PID 816 wrote to memory of 1472 816 igfxpa32.exe 102 PID 816 wrote to memory of 1472 816 igfxpa32.exe 102 PID 816 wrote to memory of 1472 816 igfxpa32.exe 102 PID 816 wrote to memory of 1472 816 igfxpa32.exe 102 PID 1472 wrote to memory of 3532 1472 igfxpa32.exe 105 PID 1472 wrote to memory of 3532 1472 igfxpa32.exe 105 PID 1472 wrote to memory of 3532 1472 igfxpa32.exe 105 PID 3532 wrote to memory of 2424 3532 igfxpa32.exe 106 PID 3532 wrote to memory of 2424 3532 igfxpa32.exe 106 PID 3532 wrote to memory of 2424 3532 igfxpa32.exe 106 PID 3532 wrote to memory of 2424 3532 igfxpa32.exe 106 PID 3532 wrote to memory of 2424 3532 igfxpa32.exe 106 PID 3532 wrote to memory of 2424 3532 igfxpa32.exe 106 PID 3532 wrote to memory of 2424 3532 igfxpa32.exe 106 PID 2424 wrote to memory of 3088 2424 igfxpa32.exe 107 PID 2424 wrote to memory of 3088 2424 igfxpa32.exe 107 PID 2424 wrote to memory of 3088 2424 igfxpa32.exe 107 PID 3088 wrote to memory of 844 3088 igfxpa32.exe 108 PID 3088 wrote to memory of 844 3088 igfxpa32.exe 108 PID 3088 wrote to memory of 844 3088 igfxpa32.exe 108 PID 3088 wrote to memory of 844 3088 igfxpa32.exe 108 PID 3088 wrote to memory of 844 3088 igfxpa32.exe 108 PID 3088 wrote to memory of 844 3088 igfxpa32.exe 108 PID 3088 wrote to memory of 844 3088 igfxpa32.exe 108 PID 844 wrote to memory of 3896 844 igfxpa32.exe 109 PID 844 wrote to memory of 3896 844 igfxpa32.exe 109 PID 844 wrote to memory of 3896 844 igfxpa32.exe 109 PID 3896 wrote to memory of 2360 3896 igfxpa32.exe 110 PID 3896 wrote to memory of 2360 3896 igfxpa32.exe 110 PID 3896 wrote to memory of 2360 3896 igfxpa32.exe 110 PID 3896 wrote to memory of 2360 3896 igfxpa32.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\e252b7b4ded60127cc7055e7ebdc2c24_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e252b7b4ded60127cc7055e7ebdc2c24_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\e252b7b4ded60127cc7055e7ebdc2c24_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e252b7b4ded60127cc7055e7ebdc2c24_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\SysWOW64\igfxpa32.exe"C:\Windows\system32\igfxpa32.exe" C:\Users\Admin\AppData\Local\Temp\E252B7~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\igfxpa32.exe"C:\Windows\system32\igfxpa32.exe" C:\Users\Admin\AppData\Local\Temp\E252B7~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\SysWOW64\igfxpa32.exe"C:\Windows\system32\igfxpa32.exe" C:\Windows\SysWOW64\igfxpa32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\SysWOW64\igfxpa32.exe"C:\Windows\system32\igfxpa32.exe" C:\Windows\SysWOW64\igfxpa32.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\igfxpa32.exe"C:\Windows\system32\igfxpa32.exe" C:\Windows\SysWOW64\igfxpa32.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\SysWOW64\igfxpa32.exe"C:\Windows\system32\igfxpa32.exe" C:\Windows\SysWOW64\igfxpa32.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\igfxpa32.exe"C:\Windows\system32\igfxpa32.exe" C:\Windows\SysWOW64\igfxpa32.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\SysWOW64\igfxpa32.exe"C:\Windows\system32\igfxpa32.exe" C:\Windows\SysWOW64\igfxpa32.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\igfxpa32.exe"C:\Windows\system32\igfxpa32.exe" C:\Windows\SysWOW64\igfxpa32.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Windows\SysWOW64\igfxpa32.exe"C:\Windows\system32\igfxpa32.exe" C:\Windows\SysWOW64\igfxpa32.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\igfxpa32.exe"C:\Windows\system32\igfxpa32.exe" C:\Windows\SysWOW64\igfxpa32.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Windows\SysWOW64\igfxpa32.exe"C:\Windows\system32\igfxpa32.exe" C:\Windows\SysWOW64\igfxpa32.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2360 -
C:\Windows\SysWOW64\igfxpa32.exe"C:\Windows\system32\igfxpa32.exe" C:\Windows\SysWOW64\igfxpa32.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4760 -
C:\Windows\SysWOW64\igfxpa32.exe"C:\Windows\system32\igfxpa32.exe" C:\Windows\SysWOW64\igfxpa32.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2968 -
C:\Windows\SysWOW64\igfxpa32.exe"C:\Windows\system32\igfxpa32.exe" C:\Windows\SysWOW64\igfxpa32.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4756 -
C:\Windows\SysWOW64\igfxpa32.exe"C:\Windows\system32\igfxpa32.exe" C:\Windows\SysWOW64\igfxpa32.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2060 -
C:\Windows\SysWOW64\igfxpa32.exe"C:\Windows\system32\igfxpa32.exe" C:\Windows\SysWOW64\igfxpa32.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4260 -
C:\Windows\SysWOW64\igfxpa32.exe"C:\Windows\system32\igfxpa32.exe" C:\Windows\SysWOW64\igfxpa32.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1260 -
C:\Windows\SysWOW64\igfxpa32.exe"C:\Windows\system32\igfxpa32.exe" C:\Windows\SysWOW64\igfxpa32.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2432 -
C:\Windows\SysWOW64\igfxpa32.exe"C:\Windows\system32\igfxpa32.exe" C:\Windows\SysWOW64\igfxpa32.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2692 -
C:\Windows\SysWOW64\igfxpa32.exe"C:\Windows\system32\igfxpa32.exe" C:\Windows\SysWOW64\igfxpa32.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3800 -
C:\Windows\SysWOW64\igfxpa32.exe"C:\Windows\system32\igfxpa32.exe" C:\Windows\SysWOW64\igfxpa32.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3616 -
C:\Windows\SysWOW64\igfxpa32.exe"C:\Windows\system32\igfxpa32.exe" C:\Windows\SysWOW64\igfxpa32.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:220 -
C:\Windows\SysWOW64\igfxpa32.exe"C:\Windows\system32\igfxpa32.exe" C:\Windows\SysWOW64\igfxpa32.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:880 -
C:\Windows\SysWOW64\igfxpa32.exe"C:\Windows\system32\igfxpa32.exe" C:\Windows\SysWOW64\igfxpa32.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2516 -
C:\Windows\SysWOW64\igfxpa32.exe"C:\Windows\system32\igfxpa32.exe" C:\Windows\SysWOW64\igfxpa32.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5112 -
C:\Windows\SysWOW64\igfxpa32.exe"C:\Windows\system32\igfxpa32.exe" C:\Windows\SysWOW64\igfxpa32.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1788 -
C:\Windows\SysWOW64\igfxpa32.exe"C:\Windows\system32\igfxpa32.exe" C:\Windows\SysWOW64\igfxpa32.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3776 -
C:\Windows\SysWOW64\igfxpa32.exe"C:\Windows\system32\igfxpa32.exe" C:\Windows\SysWOW64\igfxpa32.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3580 -
C:\Windows\SysWOW64\igfxpa32.exe"C:\Windows\system32\igfxpa32.exe" C:\Windows\SysWOW64\igfxpa32.exe32⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3792 -
C:\Windows\SysWOW64\igfxpa32.exe"C:\Windows\system32\igfxpa32.exe" C:\Windows\SysWOW64\igfxpa32.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3636 -
C:\Windows\SysWOW64\igfxpa32.exe"C:\Windows\system32\igfxpa32.exe" C:\Windows\SysWOW64\igfxpa32.exe34⤵
- Executes dropped EXE
- Maps connected drives based on registry
PID:1784
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD5e252b7b4ded60127cc7055e7ebdc2c24
SHA1cf34fc6879a71f9eac3763dd2b1f6be897501dcd
SHA2567b7617175b4ce06c090994f79a7fe6277a9fdfc21ff69c553de4efd0c18e9701
SHA512f8de390e7ecd9248f00ed082ff77baec342412975b790e5ec1874529e6741b282ede809588380242c0cd75e70f2fa44efb361a120e7b678eba90510155eeadfa