Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2024, 16:44
Static task
static1
Behavioral task
behavioral1
Sample
e2f02f8b5bb36a736d67d2d995a52813_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e2f02f8b5bb36a736d67d2d995a52813_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e2f02f8b5bb36a736d67d2d995a52813_JaffaCakes118.exe
-
Size
170KB
-
MD5
e2f02f8b5bb36a736d67d2d995a52813
-
SHA1
cefc849ed964d317e9d9141723e4780a236a30d4
-
SHA256
622e7bb230ad894be3cd46524732b06b98d1c37f250cca59907607fdbd53c289
-
SHA512
d65041f0cc5323558eb5b65b4de070f4d15eac720dbb62bf611f7eb04b58704869707b94e6649cafed94fecd78c6a1457dd061967388cdc9befdc0fab73baa14
-
SSDEEP
3072:42B6xr+t9V5vCRXx+uhZ1Qxk7bGbsw/Y7qqxPp+E5f3Eh9/Umhspe5uiahC:wka9x+CLQpcqqH+UUsmSehb
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings 2 TTPs 17 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation e2f02f8b5bb36a736d67d2d995a52813_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxwl32.exe -
Deletes itself 1 IoCs
pid Process 3076 igfxwl32.exe -
Executes dropped EXE 33 IoCs
pid Process 4536 igfxwl32.exe 3076 igfxwl32.exe 396 igfxwl32.exe 3052 igfxwl32.exe 1900 igfxwl32.exe 2608 igfxwl32.exe 2300 igfxwl32.exe 4960 igfxwl32.exe 3812 igfxwl32.exe 3876 igfxwl32.exe 3908 igfxwl32.exe 624 igfxwl32.exe 3152 igfxwl32.exe 1508 igfxwl32.exe 2860 igfxwl32.exe 4316 igfxwl32.exe 3060 igfxwl32.exe 3204 igfxwl32.exe 2908 igfxwl32.exe 2116 igfxwl32.exe 4272 igfxwl32.exe 2628 igfxwl32.exe 1388 igfxwl32.exe 2968 igfxwl32.exe 4956 igfxwl32.exe 4644 igfxwl32.exe 4348 igfxwl32.exe 1656 igfxwl32.exe 3584 igfxwl32.exe 732 igfxwl32.exe 4848 igfxwl32.exe 3976 igfxwl32.exe 1340 igfxwl32.exe -
resource yara_rule behavioral2/memory/2808-1-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2808-4-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2808-5-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2808-6-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2808-41-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3076-48-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3076-51-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3052-59-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2608-70-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4960-79-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3876-88-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/624-97-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1508-106-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4316-115-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3204-127-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2116-134-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2628-143-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2968-155-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4644-165-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1656-176-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/732-186-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3976-195-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 34 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 e2f02f8b5bb36a736d67d2d995a52813_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum e2f02f8b5bb36a736d67d2d995a52813_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe -
Drops file in System32 directory 51 IoCs
description ioc Process File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ e2f02f8b5bb36a736d67d2d995a52813_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe e2f02f8b5bb36a736d67d2d995a52813_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe e2f02f8b5bb36a736d67d2d995a52813_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe -
Suspicious use of SetThreadContext 17 IoCs
description pid Process procid_target PID 2188 set thread context of 2808 2188 e2f02f8b5bb36a736d67d2d995a52813_JaffaCakes118.exe 89 PID 4536 set thread context of 3076 4536 igfxwl32.exe 93 PID 396 set thread context of 3052 396 igfxwl32.exe 95 PID 1900 set thread context of 2608 1900 igfxwl32.exe 99 PID 2300 set thread context of 4960 2300 igfxwl32.exe 101 PID 3812 set thread context of 3876 3812 igfxwl32.exe 103 PID 3908 set thread context of 624 3908 igfxwl32.exe 105 PID 3152 set thread context of 1508 3152 igfxwl32.exe 107 PID 2860 set thread context of 4316 2860 igfxwl32.exe 109 PID 3060 set thread context of 3204 3060 igfxwl32.exe 111 PID 2908 set thread context of 2116 2908 igfxwl32.exe 113 PID 4272 set thread context of 2628 4272 igfxwl32.exe 115 PID 1388 set thread context of 2968 1388 igfxwl32.exe 117 PID 4956 set thread context of 4644 4956 igfxwl32.exe 119 PID 4348 set thread context of 1656 4348 igfxwl32.exe 121 PID 3584 set thread context of 732 3584 igfxwl32.exe 123 PID 4848 set thread context of 3976 4848 igfxwl32.exe 125 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 34 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2f02f8b5bb36a736d67d2d995a52813_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2f02f8b5bb36a736d67d2d995a52813_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe -
Modifies registry class 17 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ e2f02f8b5bb36a736d67d2d995a52813_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2188 e2f02f8b5bb36a736d67d2d995a52813_JaffaCakes118.exe 2188 e2f02f8b5bb36a736d67d2d995a52813_JaffaCakes118.exe 2808 e2f02f8b5bb36a736d67d2d995a52813_JaffaCakes118.exe 2808 e2f02f8b5bb36a736d67d2d995a52813_JaffaCakes118.exe 2808 e2f02f8b5bb36a736d67d2d995a52813_JaffaCakes118.exe 2808 e2f02f8b5bb36a736d67d2d995a52813_JaffaCakes118.exe 4536 igfxwl32.exe 4536 igfxwl32.exe 3076 igfxwl32.exe 3076 igfxwl32.exe 3076 igfxwl32.exe 3076 igfxwl32.exe 396 igfxwl32.exe 396 igfxwl32.exe 3052 igfxwl32.exe 3052 igfxwl32.exe 3052 igfxwl32.exe 3052 igfxwl32.exe 1900 igfxwl32.exe 1900 igfxwl32.exe 2608 igfxwl32.exe 2608 igfxwl32.exe 2608 igfxwl32.exe 2608 igfxwl32.exe 2300 igfxwl32.exe 2300 igfxwl32.exe 4960 igfxwl32.exe 4960 igfxwl32.exe 4960 igfxwl32.exe 4960 igfxwl32.exe 3812 igfxwl32.exe 3812 igfxwl32.exe 3876 igfxwl32.exe 3876 igfxwl32.exe 3876 igfxwl32.exe 3876 igfxwl32.exe 3908 igfxwl32.exe 3908 igfxwl32.exe 624 igfxwl32.exe 624 igfxwl32.exe 624 igfxwl32.exe 624 igfxwl32.exe 3152 igfxwl32.exe 3152 igfxwl32.exe 1508 igfxwl32.exe 1508 igfxwl32.exe 1508 igfxwl32.exe 1508 igfxwl32.exe 2860 igfxwl32.exe 2860 igfxwl32.exe 4316 igfxwl32.exe 4316 igfxwl32.exe 4316 igfxwl32.exe 4316 igfxwl32.exe 3060 igfxwl32.exe 3060 igfxwl32.exe 3204 igfxwl32.exe 3204 igfxwl32.exe 3204 igfxwl32.exe 3204 igfxwl32.exe 2908 igfxwl32.exe 2908 igfxwl32.exe 2116 igfxwl32.exe 2116 igfxwl32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2808 2188 e2f02f8b5bb36a736d67d2d995a52813_JaffaCakes118.exe 89 PID 2188 wrote to memory of 2808 2188 e2f02f8b5bb36a736d67d2d995a52813_JaffaCakes118.exe 89 PID 2188 wrote to memory of 2808 2188 e2f02f8b5bb36a736d67d2d995a52813_JaffaCakes118.exe 89 PID 2188 wrote to memory of 2808 2188 e2f02f8b5bb36a736d67d2d995a52813_JaffaCakes118.exe 89 PID 2188 wrote to memory of 2808 2188 e2f02f8b5bb36a736d67d2d995a52813_JaffaCakes118.exe 89 PID 2188 wrote to memory of 2808 2188 e2f02f8b5bb36a736d67d2d995a52813_JaffaCakes118.exe 89 PID 2188 wrote to memory of 2808 2188 e2f02f8b5bb36a736d67d2d995a52813_JaffaCakes118.exe 89 PID 2808 wrote to memory of 4536 2808 e2f02f8b5bb36a736d67d2d995a52813_JaffaCakes118.exe 90 PID 2808 wrote to memory of 4536 2808 e2f02f8b5bb36a736d67d2d995a52813_JaffaCakes118.exe 90 PID 2808 wrote to memory of 4536 2808 e2f02f8b5bb36a736d67d2d995a52813_JaffaCakes118.exe 90 PID 4536 wrote to memory of 3076 4536 igfxwl32.exe 93 PID 4536 wrote to memory of 3076 4536 igfxwl32.exe 93 PID 4536 wrote to memory of 3076 4536 igfxwl32.exe 93 PID 4536 wrote to memory of 3076 4536 igfxwl32.exe 93 PID 4536 wrote to memory of 3076 4536 igfxwl32.exe 93 PID 4536 wrote to memory of 3076 4536 igfxwl32.exe 93 PID 4536 wrote to memory of 3076 4536 igfxwl32.exe 93 PID 3076 wrote to memory of 396 3076 igfxwl32.exe 94 PID 3076 wrote to memory of 396 3076 igfxwl32.exe 94 PID 3076 wrote to memory of 396 3076 igfxwl32.exe 94 PID 396 wrote to memory of 3052 396 igfxwl32.exe 95 PID 396 wrote to memory of 3052 396 igfxwl32.exe 95 PID 396 wrote to memory of 3052 396 igfxwl32.exe 95 PID 396 wrote to memory of 3052 396 igfxwl32.exe 95 PID 396 wrote to memory of 3052 396 igfxwl32.exe 95 PID 396 wrote to memory of 3052 396 igfxwl32.exe 95 PID 396 wrote to memory of 3052 396 igfxwl32.exe 95 PID 3052 wrote to memory of 1900 3052 igfxwl32.exe 96 PID 3052 wrote to memory of 1900 3052 igfxwl32.exe 96 PID 3052 wrote to memory of 1900 3052 igfxwl32.exe 96 PID 1900 wrote to memory of 2608 1900 igfxwl32.exe 99 PID 1900 wrote to memory of 2608 1900 igfxwl32.exe 99 PID 1900 wrote to memory of 2608 1900 igfxwl32.exe 99 PID 1900 wrote to memory of 2608 1900 igfxwl32.exe 99 PID 1900 wrote to memory of 2608 1900 igfxwl32.exe 99 PID 1900 wrote to memory of 2608 1900 igfxwl32.exe 99 PID 1900 wrote to memory of 2608 1900 igfxwl32.exe 99 PID 2608 wrote to memory of 2300 2608 igfxwl32.exe 100 PID 2608 wrote to memory of 2300 2608 igfxwl32.exe 100 PID 2608 wrote to memory of 2300 2608 igfxwl32.exe 100 PID 2300 wrote to memory of 4960 2300 igfxwl32.exe 101 PID 2300 wrote to memory of 4960 2300 igfxwl32.exe 101 PID 2300 wrote to memory of 4960 2300 igfxwl32.exe 101 PID 2300 wrote to memory of 4960 2300 igfxwl32.exe 101 PID 2300 wrote to memory of 4960 2300 igfxwl32.exe 101 PID 2300 wrote to memory of 4960 2300 igfxwl32.exe 101 PID 2300 wrote to memory of 4960 2300 igfxwl32.exe 101 PID 4960 wrote to memory of 3812 4960 igfxwl32.exe 102 PID 4960 wrote to memory of 3812 4960 igfxwl32.exe 102 PID 4960 wrote to memory of 3812 4960 igfxwl32.exe 102 PID 3812 wrote to memory of 3876 3812 igfxwl32.exe 103 PID 3812 wrote to memory of 3876 3812 igfxwl32.exe 103 PID 3812 wrote to memory of 3876 3812 igfxwl32.exe 103 PID 3812 wrote to memory of 3876 3812 igfxwl32.exe 103 PID 3812 wrote to memory of 3876 3812 igfxwl32.exe 103 PID 3812 wrote to memory of 3876 3812 igfxwl32.exe 103 PID 3812 wrote to memory of 3876 3812 igfxwl32.exe 103 PID 3876 wrote to memory of 3908 3876 igfxwl32.exe 104 PID 3876 wrote to memory of 3908 3876 igfxwl32.exe 104 PID 3876 wrote to memory of 3908 3876 igfxwl32.exe 104 PID 3908 wrote to memory of 624 3908 igfxwl32.exe 105 PID 3908 wrote to memory of 624 3908 igfxwl32.exe 105 PID 3908 wrote to memory of 624 3908 igfxwl32.exe 105 PID 3908 wrote to memory of 624 3908 igfxwl32.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2f02f8b5bb36a736d67d2d995a52813_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e2f02f8b5bb36a736d67d2d995a52813_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\e2f02f8b5bb36a736d67d2d995a52813_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e2f02f8b5bb36a736d67d2d995a52813_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Users\Admin\AppData\Local\Temp\E2F02F~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Users\Admin\AppData\Local\Temp\E2F02F~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:624 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3152 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1508 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2860 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4316 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3060 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3204 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2908 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2116 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4272 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2628 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1388 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2968 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4956 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4644 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4348 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1656 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3584 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe32⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:732 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4848 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe34⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3976 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe35⤵
- Executes dropped EXE
PID:1340
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
170KB
MD5e2f02f8b5bb36a736d67d2d995a52813
SHA1cefc849ed964d317e9d9141723e4780a236a30d4
SHA256622e7bb230ad894be3cd46524732b06b98d1c37f250cca59907607fdbd53c289
SHA512d65041f0cc5323558eb5b65b4de070f4d15eac720dbb62bf611f7eb04b58704869707b94e6649cafed94fecd78c6a1457dd061967388cdc9befdc0fab73baa14