Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16/09/2024, 14:36
Static task
static1
Behavioral task
behavioral1
Sample
e4fadd2671f0024fa398fca80b0b61bd_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e4fadd2671f0024fa398fca80b0b61bd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e4fadd2671f0024fa398fca80b0b61bd_JaffaCakes118.exe
-
Size
3.3MB
-
MD5
e4fadd2671f0024fa398fca80b0b61bd
-
SHA1
665dc0b9e2acd1125dfcd13c283becb397e97921
-
SHA256
3c46546df7d3a157dfd03c2ea3e82d41d03a0c9fbdb29f59f0a32070cf5bc78a
-
SHA512
7f11abbefc2c3d259522f1abc1e3381540d79920a04f77504929064c1b8ad6a7636b8657801be4236a7385f816d65071743109a3bfec7bfd10a9000308373135
-
SSDEEP
6144:YWPMQQNV7JzLqwjDV3saQeNlFcWoVCEtvOzatiSIh:vJQR9RQeNjZowEtv8iiSG
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2708 igfxph32.exe -
Executes dropped EXE 34 IoCs
pid Process 2708 igfxph32.exe 2756 igfxph32.exe 2564 igfxph32.exe 2576 igfxph32.exe 2508 igfxph32.exe 432 igfxph32.exe 2624 igfxph32.exe 2700 igfxph32.exe 2056 igfxph32.exe 1952 igfxph32.exe 2016 igfxph32.exe 2196 igfxph32.exe 2044 igfxph32.exe 1504 igfxph32.exe 1236 igfxph32.exe 2052 igfxph32.exe 2204 igfxph32.exe 868 igfxph32.exe 2456 igfxph32.exe 3004 igfxph32.exe 2096 igfxph32.exe 2676 igfxph32.exe 2712 igfxph32.exe 2640 igfxph32.exe 2544 igfxph32.exe 3032 igfxph32.exe 924 igfxph32.exe 1604 igfxph32.exe 1760 igfxph32.exe 2404 igfxph32.exe 2496 igfxph32.exe 3056 igfxph32.exe 1532 igfxph32.exe 2964 igfxph32.exe -
Loads dropped DLL 64 IoCs
pid Process 2108 e4fadd2671f0024fa398fca80b0b61bd_JaffaCakes118.exe 2108 e4fadd2671f0024fa398fca80b0b61bd_JaffaCakes118.exe 2708 igfxph32.exe 2708 igfxph32.exe 2756 igfxph32.exe 2756 igfxph32.exe 2564 igfxph32.exe 2564 igfxph32.exe 2576 igfxph32.exe 2576 igfxph32.exe 2508 igfxph32.exe 2508 igfxph32.exe 432 igfxph32.exe 432 igfxph32.exe 2624 igfxph32.exe 2624 igfxph32.exe 2700 igfxph32.exe 2700 igfxph32.exe 2056 igfxph32.exe 2056 igfxph32.exe 1952 igfxph32.exe 1952 igfxph32.exe 2016 igfxph32.exe 2016 igfxph32.exe 2196 igfxph32.exe 2196 igfxph32.exe 2044 igfxph32.exe 2044 igfxph32.exe 1504 igfxph32.exe 1504 igfxph32.exe 1236 igfxph32.exe 1236 igfxph32.exe 2052 igfxph32.exe 2052 igfxph32.exe 2204 igfxph32.exe 2204 igfxph32.exe 868 igfxph32.exe 868 igfxph32.exe 2456 igfxph32.exe 2456 igfxph32.exe 3004 igfxph32.exe 3004 igfxph32.exe 2096 igfxph32.exe 2096 igfxph32.exe 2676 igfxph32.exe 2676 igfxph32.exe 2712 igfxph32.exe 2712 igfxph32.exe 2640 igfxph32.exe 2640 igfxph32.exe 2544 igfxph32.exe 2544 igfxph32.exe 3032 igfxph32.exe 3032 igfxph32.exe 924 igfxph32.exe 924 igfxph32.exe 1604 igfxph32.exe 1604 igfxph32.exe 1760 igfxph32.exe 1760 igfxph32.exe 2404 igfxph32.exe 2404 igfxph32.exe 2496 igfxph32.exe 2496 igfxph32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxph32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxph32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxph32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxph32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxph32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxph32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxph32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxph32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxph32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxph32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxph32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxph32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxph32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxph32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxph32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxph32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxph32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxph32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxph32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxph32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxph32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxph32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxph32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum e4fadd2671f0024fa398fca80b0b61bd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxph32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxph32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxph32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxph32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 e4fadd2671f0024fa398fca80b0b61bd_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxph32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxph32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxph32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxph32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxph32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxph32.exe igfxph32.exe File opened for modification C:\Windows\SysWOW64\ igfxph32.exe File opened for modification C:\Windows\SysWOW64\ igfxph32.exe File opened for modification C:\Windows\SysWOW64\igfxph32.exe igfxph32.exe File opened for modification C:\Windows\SysWOW64\igfxph32.exe igfxph32.exe File opened for modification C:\Windows\SysWOW64\igfxph32.exe igfxph32.exe File created C:\Windows\SysWOW64\igfxph32.exe igfxph32.exe File created C:\Windows\SysWOW64\igfxph32.exe igfxph32.exe File opened for modification C:\Windows\SysWOW64\igfxph32.exe igfxph32.exe File created C:\Windows\SysWOW64\igfxph32.exe igfxph32.exe File opened for modification C:\Windows\SysWOW64\ igfxph32.exe File created C:\Windows\SysWOW64\igfxph32.exe igfxph32.exe File opened for modification C:\Windows\SysWOW64\ igfxph32.exe File opened for modification C:\Windows\SysWOW64\igfxph32.exe igfxph32.exe File opened for modification C:\Windows\SysWOW64\igfxph32.exe igfxph32.exe File opened for modification C:\Windows\SysWOW64\ igfxph32.exe File created C:\Windows\SysWOW64\igfxph32.exe igfxph32.exe File opened for modification C:\Windows\SysWOW64\ igfxph32.exe File opened for modification C:\Windows\SysWOW64\ igfxph32.exe File opened for modification C:\Windows\SysWOW64\ igfxph32.exe File opened for modification C:\Windows\SysWOW64\igfxph32.exe igfxph32.exe File opened for modification C:\Windows\SysWOW64\ igfxph32.exe File opened for modification C:\Windows\SysWOW64\ igfxph32.exe File opened for modification C:\Windows\SysWOW64\igfxph32.exe igfxph32.exe File opened for modification C:\Windows\SysWOW64\igfxph32.exe igfxph32.exe File opened for modification C:\Windows\SysWOW64\ e4fadd2671f0024fa398fca80b0b61bd_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxph32.exe igfxph32.exe File opened for modification C:\Windows\SysWOW64\ igfxph32.exe File created C:\Windows\SysWOW64\igfxph32.exe igfxph32.exe File created C:\Windows\SysWOW64\igfxph32.exe igfxph32.exe File opened for modification C:\Windows\SysWOW64\igfxph32.exe igfxph32.exe File opened for modification C:\Windows\SysWOW64\ igfxph32.exe File opened for modification C:\Windows\SysWOW64\ igfxph32.exe File opened for modification C:\Windows\SysWOW64\ igfxph32.exe File created C:\Windows\SysWOW64\igfxph32.exe igfxph32.exe File created C:\Windows\SysWOW64\igfxph32.exe igfxph32.exe File created C:\Windows\SysWOW64\igfxph32.exe igfxph32.exe File opened for modification C:\Windows\SysWOW64\ igfxph32.exe File opened for modification C:\Windows\SysWOW64\igfxph32.exe igfxph32.exe File opened for modification C:\Windows\SysWOW64\ igfxph32.exe File created C:\Windows\SysWOW64\igfxph32.exe igfxph32.exe File opened for modification C:\Windows\SysWOW64\igfxph32.exe igfxph32.exe File opened for modification C:\Windows\SysWOW64\igfxph32.exe igfxph32.exe File created C:\Windows\SysWOW64\igfxph32.exe igfxph32.exe File created C:\Windows\SysWOW64\igfxph32.exe igfxph32.exe File opened for modification C:\Windows\SysWOW64\ igfxph32.exe File opened for modification C:\Windows\SysWOW64\igfxph32.exe igfxph32.exe File opened for modification C:\Windows\SysWOW64\ igfxph32.exe File opened for modification C:\Windows\SysWOW64\igfxph32.exe igfxph32.exe File opened for modification C:\Windows\SysWOW64\igfxph32.exe igfxph32.exe File opened for modification C:\Windows\SysWOW64\igfxph32.exe e4fadd2671f0024fa398fca80b0b61bd_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxph32.exe igfxph32.exe File opened for modification C:\Windows\SysWOW64\ igfxph32.exe File opened for modification C:\Windows\SysWOW64\igfxph32.exe igfxph32.exe File created C:\Windows\SysWOW64\igfxph32.exe igfxph32.exe File opened for modification C:\Windows\SysWOW64\igfxph32.exe igfxph32.exe File opened for modification C:\Windows\SysWOW64\ igfxph32.exe File created C:\Windows\SysWOW64\igfxph32.exe igfxph32.exe File opened for modification C:\Windows\SysWOW64\igfxph32.exe igfxph32.exe File created C:\Windows\SysWOW64\igfxph32.exe igfxph32.exe File opened for modification C:\Windows\SysWOW64\ igfxph32.exe File created C:\Windows\SysWOW64\igfxph32.exe igfxph32.exe File opened for modification C:\Windows\SysWOW64\igfxph32.exe igfxph32.exe File created C:\Windows\SysWOW64\igfxph32.exe igfxph32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 35 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4fadd2671f0024fa398fca80b0b61bd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxph32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2108 e4fadd2671f0024fa398fca80b0b61bd_JaffaCakes118.exe 2108 e4fadd2671f0024fa398fca80b0b61bd_JaffaCakes118.exe 2708 igfxph32.exe 2708 igfxph32.exe 2756 igfxph32.exe 2756 igfxph32.exe 2564 igfxph32.exe 2564 igfxph32.exe 2576 igfxph32.exe 2576 igfxph32.exe 2508 igfxph32.exe 2508 igfxph32.exe 432 igfxph32.exe 432 igfxph32.exe 2624 igfxph32.exe 2624 igfxph32.exe 2700 igfxph32.exe 2700 igfxph32.exe 2056 igfxph32.exe 2056 igfxph32.exe 1952 igfxph32.exe 1952 igfxph32.exe 2016 igfxph32.exe 2016 igfxph32.exe 2196 igfxph32.exe 2196 igfxph32.exe 2044 igfxph32.exe 2044 igfxph32.exe 1504 igfxph32.exe 1504 igfxph32.exe 1236 igfxph32.exe 1236 igfxph32.exe 2052 igfxph32.exe 2052 igfxph32.exe 2204 igfxph32.exe 2204 igfxph32.exe 868 igfxph32.exe 868 igfxph32.exe 2456 igfxph32.exe 2456 igfxph32.exe 3004 igfxph32.exe 3004 igfxph32.exe 2096 igfxph32.exe 2096 igfxph32.exe 2676 igfxph32.exe 2676 igfxph32.exe 2712 igfxph32.exe 2712 igfxph32.exe 2640 igfxph32.exe 2640 igfxph32.exe 2544 igfxph32.exe 2544 igfxph32.exe 3032 igfxph32.exe 3032 igfxph32.exe 924 igfxph32.exe 924 igfxph32.exe 1604 igfxph32.exe 1604 igfxph32.exe 1760 igfxph32.exe 1760 igfxph32.exe 2404 igfxph32.exe 2404 igfxph32.exe 2496 igfxph32.exe 2496 igfxph32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2708 2108 e4fadd2671f0024fa398fca80b0b61bd_JaffaCakes118.exe 30 PID 2108 wrote to memory of 2708 2108 e4fadd2671f0024fa398fca80b0b61bd_JaffaCakes118.exe 30 PID 2108 wrote to memory of 2708 2108 e4fadd2671f0024fa398fca80b0b61bd_JaffaCakes118.exe 30 PID 2108 wrote to memory of 2708 2108 e4fadd2671f0024fa398fca80b0b61bd_JaffaCakes118.exe 30 PID 2708 wrote to memory of 2756 2708 igfxph32.exe 31 PID 2708 wrote to memory of 2756 2708 igfxph32.exe 31 PID 2708 wrote to memory of 2756 2708 igfxph32.exe 31 PID 2708 wrote to memory of 2756 2708 igfxph32.exe 31 PID 2756 wrote to memory of 2564 2756 igfxph32.exe 32 PID 2756 wrote to memory of 2564 2756 igfxph32.exe 32 PID 2756 wrote to memory of 2564 2756 igfxph32.exe 32 PID 2756 wrote to memory of 2564 2756 igfxph32.exe 32 PID 2564 wrote to memory of 2576 2564 igfxph32.exe 33 PID 2564 wrote to memory of 2576 2564 igfxph32.exe 33 PID 2564 wrote to memory of 2576 2564 igfxph32.exe 33 PID 2564 wrote to memory of 2576 2564 igfxph32.exe 33 PID 2576 wrote to memory of 2508 2576 igfxph32.exe 34 PID 2576 wrote to memory of 2508 2576 igfxph32.exe 34 PID 2576 wrote to memory of 2508 2576 igfxph32.exe 34 PID 2576 wrote to memory of 2508 2576 igfxph32.exe 34 PID 2508 wrote to memory of 432 2508 igfxph32.exe 35 PID 2508 wrote to memory of 432 2508 igfxph32.exe 35 PID 2508 wrote to memory of 432 2508 igfxph32.exe 35 PID 2508 wrote to memory of 432 2508 igfxph32.exe 35 PID 432 wrote to memory of 2624 432 igfxph32.exe 36 PID 432 wrote to memory of 2624 432 igfxph32.exe 36 PID 432 wrote to memory of 2624 432 igfxph32.exe 36 PID 432 wrote to memory of 2624 432 igfxph32.exe 36 PID 2624 wrote to memory of 2700 2624 igfxph32.exe 37 PID 2624 wrote to memory of 2700 2624 igfxph32.exe 37 PID 2624 wrote to memory of 2700 2624 igfxph32.exe 37 PID 2624 wrote to memory of 2700 2624 igfxph32.exe 37 PID 2700 wrote to memory of 2056 2700 igfxph32.exe 38 PID 2700 wrote to memory of 2056 2700 igfxph32.exe 38 PID 2700 wrote to memory of 2056 2700 igfxph32.exe 38 PID 2700 wrote to memory of 2056 2700 igfxph32.exe 38 PID 2056 wrote to memory of 1952 2056 igfxph32.exe 39 PID 2056 wrote to memory of 1952 2056 igfxph32.exe 39 PID 2056 wrote to memory of 1952 2056 igfxph32.exe 39 PID 2056 wrote to memory of 1952 2056 igfxph32.exe 39 PID 1952 wrote to memory of 2016 1952 igfxph32.exe 40 PID 1952 wrote to memory of 2016 1952 igfxph32.exe 40 PID 1952 wrote to memory of 2016 1952 igfxph32.exe 40 PID 1952 wrote to memory of 2016 1952 igfxph32.exe 40 PID 2016 wrote to memory of 2196 2016 igfxph32.exe 41 PID 2016 wrote to memory of 2196 2016 igfxph32.exe 41 PID 2016 wrote to memory of 2196 2016 igfxph32.exe 41 PID 2016 wrote to memory of 2196 2016 igfxph32.exe 41 PID 2196 wrote to memory of 2044 2196 igfxph32.exe 42 PID 2196 wrote to memory of 2044 2196 igfxph32.exe 42 PID 2196 wrote to memory of 2044 2196 igfxph32.exe 42 PID 2196 wrote to memory of 2044 2196 igfxph32.exe 42 PID 2044 wrote to memory of 1504 2044 igfxph32.exe 43 PID 2044 wrote to memory of 1504 2044 igfxph32.exe 43 PID 2044 wrote to memory of 1504 2044 igfxph32.exe 43 PID 2044 wrote to memory of 1504 2044 igfxph32.exe 43 PID 1504 wrote to memory of 1236 1504 igfxph32.exe 44 PID 1504 wrote to memory of 1236 1504 igfxph32.exe 44 PID 1504 wrote to memory of 1236 1504 igfxph32.exe 44 PID 1504 wrote to memory of 1236 1504 igfxph32.exe 44 PID 1236 wrote to memory of 2052 1236 igfxph32.exe 45 PID 1236 wrote to memory of 2052 1236 igfxph32.exe 45 PID 1236 wrote to memory of 2052 1236 igfxph32.exe 45 PID 1236 wrote to memory of 2052 1236 igfxph32.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4fadd2671f0024fa398fca80b0b61bd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e4fadd2671f0024fa398fca80b0b61bd_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\igfxph32.exe"C:\Windows\system32\igfxph32.exe" C:\Users\Admin\AppData\Local\Temp\E4FADD~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\igfxph32.exe"C:\Windows\system32\igfxph32.exe" C:\Windows\SysWOW64\igfxph32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\igfxph32.exe"C:\Windows\system32\igfxph32.exe" C:\Windows\SysWOW64\igfxph32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\igfxph32.exe"C:\Windows\system32\igfxph32.exe" C:\Windows\SysWOW64\igfxph32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\igfxph32.exe"C:\Windows\system32\igfxph32.exe" C:\Windows\SysWOW64\igfxph32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\igfxph32.exe"C:\Windows\system32\igfxph32.exe" C:\Windows\SysWOW64\igfxph32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\SysWOW64\igfxph32.exe"C:\Windows\system32\igfxph32.exe" C:\Windows\SysWOW64\igfxph32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\igfxph32.exe"C:\Windows\system32\igfxph32.exe" C:\Windows\SysWOW64\igfxph32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\igfxph32.exe"C:\Windows\system32\igfxph32.exe" C:\Windows\SysWOW64\igfxph32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\igfxph32.exe"C:\Windows\system32\igfxph32.exe" C:\Windows\SysWOW64\igfxph32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\igfxph32.exe"C:\Windows\system32\igfxph32.exe" C:\Windows\SysWOW64\igfxph32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\igfxph32.exe"C:\Windows\system32\igfxph32.exe" C:\Windows\SysWOW64\igfxph32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\igfxph32.exe"C:\Windows\system32\igfxph32.exe" C:\Windows\SysWOW64\igfxph32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\igfxph32.exe"C:\Windows\system32\igfxph32.exe" C:\Windows\SysWOW64\igfxph32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\igfxph32.exe"C:\Windows\system32\igfxph32.exe" C:\Windows\SysWOW64\igfxph32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\SysWOW64\igfxph32.exe"C:\Windows\system32\igfxph32.exe" C:\Windows\SysWOW64\igfxph32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2052 -
C:\Windows\SysWOW64\igfxph32.exe"C:\Windows\system32\igfxph32.exe" C:\Windows\SysWOW64\igfxph32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2204 -
C:\Windows\SysWOW64\igfxph32.exe"C:\Windows\system32\igfxph32.exe" C:\Windows\SysWOW64\igfxph32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:868 -
C:\Windows\SysWOW64\igfxph32.exe"C:\Windows\system32\igfxph32.exe" C:\Windows\SysWOW64\igfxph32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2456 -
C:\Windows\SysWOW64\igfxph32.exe"C:\Windows\system32\igfxph32.exe" C:\Windows\SysWOW64\igfxph32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3004 -
C:\Windows\SysWOW64\igfxph32.exe"C:\Windows\system32\igfxph32.exe" C:\Windows\SysWOW64\igfxph32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2096 -
C:\Windows\SysWOW64\igfxph32.exe"C:\Windows\system32\igfxph32.exe" C:\Windows\SysWOW64\igfxph32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2676 -
C:\Windows\SysWOW64\igfxph32.exe"C:\Windows\system32\igfxph32.exe" C:\Windows\SysWOW64\igfxph32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2712 -
C:\Windows\SysWOW64\igfxph32.exe"C:\Windows\system32\igfxph32.exe" C:\Windows\SysWOW64\igfxph32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2640 -
C:\Windows\SysWOW64\igfxph32.exe"C:\Windows\system32\igfxph32.exe" C:\Windows\SysWOW64\igfxph32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2544 -
C:\Windows\SysWOW64\igfxph32.exe"C:\Windows\system32\igfxph32.exe" C:\Windows\SysWOW64\igfxph32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3032 -
C:\Windows\SysWOW64\igfxph32.exe"C:\Windows\system32\igfxph32.exe" C:\Windows\SysWOW64\igfxph32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:924 -
C:\Windows\SysWOW64\igfxph32.exe"C:\Windows\system32\igfxph32.exe" C:\Windows\SysWOW64\igfxph32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1604 -
C:\Windows\SysWOW64\igfxph32.exe"C:\Windows\system32\igfxph32.exe" C:\Windows\SysWOW64\igfxph32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1760 -
C:\Windows\SysWOW64\igfxph32.exe"C:\Windows\system32\igfxph32.exe" C:\Windows\SysWOW64\igfxph32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2404 -
C:\Windows\SysWOW64\igfxph32.exe"C:\Windows\system32\igfxph32.exe" C:\Windows\SysWOW64\igfxph32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2496 -
C:\Windows\SysWOW64\igfxph32.exe"C:\Windows\system32\igfxph32.exe" C:\Windows\SysWOW64\igfxph32.exe33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3056 -
C:\Windows\SysWOW64\igfxph32.exe"C:\Windows\system32\igfxph32.exe" C:\Windows\SysWOW64\igfxph32.exe34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1532 -
C:\Windows\SysWOW64\igfxph32.exe"C:\Windows\system32\igfxph32.exe" C:\Windows\SysWOW64\igfxph32.exe35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2964
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.3MB
MD5e4fadd2671f0024fa398fca80b0b61bd
SHA1665dc0b9e2acd1125dfcd13c283becb397e97921
SHA2563c46546df7d3a157dfd03c2ea3e82d41d03a0c9fbdb29f59f0a32070cf5bc78a
SHA5127f11abbefc2c3d259522f1abc1e3381540d79920a04f77504929064c1b8ad6a7636b8657801be4236a7385f816d65071743109a3bfec7bfd10a9000308373135