Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 14:14
Static task
static1
Behavioral task
behavioral1
Sample
edc3b2e52d165b6c7beb50d591cba878_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
edc3b2e52d165b6c7beb50d591cba878_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
edc3b2e52d165b6c7beb50d591cba878_JaffaCakes118.exe
-
Size
170KB
-
MD5
edc3b2e52d165b6c7beb50d591cba878
-
SHA1
1450e4f778dc6a68db89dd54c406dd8868d41f0a
-
SHA256
3d68cd3cd94edb3d4cc248294be736efb4673254175a28db1f04e4751b1479ac
-
SHA512
66cee0d2ca7613a4162db93e1f5e675a8972e5d73def01534b6272845bd64eec8f8408d7ca9cff7d34a332e539f2ea9a70af0b235ef8337ce8ea36188995f98d
-
SSDEEP
3072:M2nrY9mH+GU3hrGrGF2m0Y26SZUHK9ani4AOr/GaMl9gbUXAjNXXB99ueLK9er:brY973YiF2Tqni4AvarbOQR99uAyc
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2744 igfxwl32.exe -
Executes dropped EXE 34 IoCs
pid Process 1684 igfxwl32.exe 2744 igfxwl32.exe 2656 igfxwl32.exe 2676 igfxwl32.exe 664 igfxwl32.exe 1044 igfxwl32.exe 1636 igfxwl32.exe 320 igfxwl32.exe 316 igfxwl32.exe 2260 igfxwl32.exe 2540 igfxwl32.exe 740 igfxwl32.exe 940 igfxwl32.exe 1504 igfxwl32.exe 1732 igfxwl32.exe 2120 igfxwl32.exe 340 igfxwl32.exe 876 igfxwl32.exe 1600 igfxwl32.exe 780 igfxwl32.exe 2320 igfxwl32.exe 1436 igfxwl32.exe 2636 igfxwl32.exe 2640 igfxwl32.exe 1820 igfxwl32.exe 1112 igfxwl32.exe 304 igfxwl32.exe 2032 igfxwl32.exe 1756 igfxwl32.exe 2964 igfxwl32.exe 688 igfxwl32.exe 1420 igfxwl32.exe 1388 igfxwl32.exe 604 igfxwl32.exe -
Loads dropped DLL 34 IoCs
pid Process 2040 edc3b2e52d165b6c7beb50d591cba878_JaffaCakes118.exe 1684 igfxwl32.exe 2744 igfxwl32.exe 2656 igfxwl32.exe 2676 igfxwl32.exe 664 igfxwl32.exe 1044 igfxwl32.exe 1636 igfxwl32.exe 320 igfxwl32.exe 316 igfxwl32.exe 2260 igfxwl32.exe 2540 igfxwl32.exe 740 igfxwl32.exe 940 igfxwl32.exe 1504 igfxwl32.exe 1732 igfxwl32.exe 2120 igfxwl32.exe 340 igfxwl32.exe 876 igfxwl32.exe 1600 igfxwl32.exe 780 igfxwl32.exe 2320 igfxwl32.exe 1436 igfxwl32.exe 2636 igfxwl32.exe 2640 igfxwl32.exe 1820 igfxwl32.exe 1112 igfxwl32.exe 304 igfxwl32.exe 2032 igfxwl32.exe 1756 igfxwl32.exe 2964 igfxwl32.exe 688 igfxwl32.exe 1420 igfxwl32.exe 1388 igfxwl32.exe -
resource yara_rule behavioral1/memory/2040-4-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2040-6-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2040-2-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2040-8-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2040-9-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2040-11-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2040-10-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2040-21-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2744-34-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2744-33-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2744-32-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2744-31-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2744-40-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2676-50-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2676-54-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1044-67-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1044-66-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1044-72-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/320-84-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/320-83-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/320-82-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/320-90-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2260-101-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2260-107-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/740-123-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1504-140-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2120-157-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/876-173-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/780-190-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1436-206-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2640-216-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2640-222-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1112-240-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2032-250-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2032-254-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2964-262-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2964-267-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1420-279-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 36 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum edc3b2e52d165b6c7beb50d591cba878_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 edc3b2e52d165b6c7beb50d591cba878_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe -
Drops file in System32 directory 51 IoCs
description ioc Process File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ edc3b2e52d165b6c7beb50d591cba878_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe edc3b2e52d165b6c7beb50d591cba878_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe edc3b2e52d165b6c7beb50d591cba878_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe -
Suspicious use of SetThreadContext 18 IoCs
description pid Process procid_target PID 2552 set thread context of 2040 2552 edc3b2e52d165b6c7beb50d591cba878_JaffaCakes118.exe 31 PID 1684 set thread context of 2744 1684 igfxwl32.exe 34 PID 2656 set thread context of 2676 2656 igfxwl32.exe 36 PID 664 set thread context of 1044 664 igfxwl32.exe 38 PID 1636 set thread context of 320 1636 igfxwl32.exe 40 PID 316 set thread context of 2260 316 igfxwl32.exe 42 PID 2540 set thread context of 740 2540 igfxwl32.exe 44 PID 940 set thread context of 1504 940 igfxwl32.exe 46 PID 1732 set thread context of 2120 1732 igfxwl32.exe 48 PID 340 set thread context of 876 340 igfxwl32.exe 50 PID 1600 set thread context of 780 1600 igfxwl32.exe 52 PID 2320 set thread context of 1436 2320 igfxwl32.exe 54 PID 2636 set thread context of 2640 2636 igfxwl32.exe 56 PID 1820 set thread context of 1112 1820 igfxwl32.exe 58 PID 304 set thread context of 2032 304 igfxwl32.exe 60 PID 1756 set thread context of 2964 1756 igfxwl32.exe 62 PID 688 set thread context of 1420 688 igfxwl32.exe 64 PID 1388 set thread context of 604 1388 igfxwl32.exe 66 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 35 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edc3b2e52d165b6c7beb50d591cba878_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edc3b2e52d165b6c7beb50d591cba878_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe -
Suspicious behavior: EnumeratesProcesses 53 IoCs
pid Process 2552 edc3b2e52d165b6c7beb50d591cba878_JaffaCakes118.exe 2040 edc3b2e52d165b6c7beb50d591cba878_JaffaCakes118.exe 2040 edc3b2e52d165b6c7beb50d591cba878_JaffaCakes118.exe 1684 igfxwl32.exe 2744 igfxwl32.exe 2744 igfxwl32.exe 2656 igfxwl32.exe 2676 igfxwl32.exe 2676 igfxwl32.exe 664 igfxwl32.exe 1044 igfxwl32.exe 1044 igfxwl32.exe 1636 igfxwl32.exe 320 igfxwl32.exe 320 igfxwl32.exe 316 igfxwl32.exe 2260 igfxwl32.exe 2260 igfxwl32.exe 2540 igfxwl32.exe 740 igfxwl32.exe 740 igfxwl32.exe 940 igfxwl32.exe 1504 igfxwl32.exe 1504 igfxwl32.exe 1732 igfxwl32.exe 2120 igfxwl32.exe 2120 igfxwl32.exe 340 igfxwl32.exe 876 igfxwl32.exe 876 igfxwl32.exe 1600 igfxwl32.exe 780 igfxwl32.exe 780 igfxwl32.exe 2320 igfxwl32.exe 1436 igfxwl32.exe 1436 igfxwl32.exe 2636 igfxwl32.exe 2640 igfxwl32.exe 2640 igfxwl32.exe 1820 igfxwl32.exe 1112 igfxwl32.exe 1112 igfxwl32.exe 304 igfxwl32.exe 2032 igfxwl32.exe 2032 igfxwl32.exe 1756 igfxwl32.exe 2964 igfxwl32.exe 2964 igfxwl32.exe 688 igfxwl32.exe 1420 igfxwl32.exe 1420 igfxwl32.exe 1388 igfxwl32.exe 604 igfxwl32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2040 2552 edc3b2e52d165b6c7beb50d591cba878_JaffaCakes118.exe 31 PID 2552 wrote to memory of 2040 2552 edc3b2e52d165b6c7beb50d591cba878_JaffaCakes118.exe 31 PID 2552 wrote to memory of 2040 2552 edc3b2e52d165b6c7beb50d591cba878_JaffaCakes118.exe 31 PID 2552 wrote to memory of 2040 2552 edc3b2e52d165b6c7beb50d591cba878_JaffaCakes118.exe 31 PID 2552 wrote to memory of 2040 2552 edc3b2e52d165b6c7beb50d591cba878_JaffaCakes118.exe 31 PID 2552 wrote to memory of 2040 2552 edc3b2e52d165b6c7beb50d591cba878_JaffaCakes118.exe 31 PID 2552 wrote to memory of 2040 2552 edc3b2e52d165b6c7beb50d591cba878_JaffaCakes118.exe 31 PID 2040 wrote to memory of 1684 2040 edc3b2e52d165b6c7beb50d591cba878_JaffaCakes118.exe 32 PID 2040 wrote to memory of 1684 2040 edc3b2e52d165b6c7beb50d591cba878_JaffaCakes118.exe 32 PID 2040 wrote to memory of 1684 2040 edc3b2e52d165b6c7beb50d591cba878_JaffaCakes118.exe 32 PID 2040 wrote to memory of 1684 2040 edc3b2e52d165b6c7beb50d591cba878_JaffaCakes118.exe 32 PID 1684 wrote to memory of 2744 1684 igfxwl32.exe 34 PID 1684 wrote to memory of 2744 1684 igfxwl32.exe 34 PID 1684 wrote to memory of 2744 1684 igfxwl32.exe 34 PID 1684 wrote to memory of 2744 1684 igfxwl32.exe 34 PID 1684 wrote to memory of 2744 1684 igfxwl32.exe 34 PID 1684 wrote to memory of 2744 1684 igfxwl32.exe 34 PID 1684 wrote to memory of 2744 1684 igfxwl32.exe 34 PID 2744 wrote to memory of 2656 2744 igfxwl32.exe 35 PID 2744 wrote to memory of 2656 2744 igfxwl32.exe 35 PID 2744 wrote to memory of 2656 2744 igfxwl32.exe 35 PID 2744 wrote to memory of 2656 2744 igfxwl32.exe 35 PID 2656 wrote to memory of 2676 2656 igfxwl32.exe 36 PID 2656 wrote to memory of 2676 2656 igfxwl32.exe 36 PID 2656 wrote to memory of 2676 2656 igfxwl32.exe 36 PID 2656 wrote to memory of 2676 2656 igfxwl32.exe 36 PID 2656 wrote to memory of 2676 2656 igfxwl32.exe 36 PID 2656 wrote to memory of 2676 2656 igfxwl32.exe 36 PID 2656 wrote to memory of 2676 2656 igfxwl32.exe 36 PID 2676 wrote to memory of 664 2676 igfxwl32.exe 37 PID 2676 wrote to memory of 664 2676 igfxwl32.exe 37 PID 2676 wrote to memory of 664 2676 igfxwl32.exe 37 PID 2676 wrote to memory of 664 2676 igfxwl32.exe 37 PID 664 wrote to memory of 1044 664 igfxwl32.exe 38 PID 664 wrote to memory of 1044 664 igfxwl32.exe 38 PID 664 wrote to memory of 1044 664 igfxwl32.exe 38 PID 664 wrote to memory of 1044 664 igfxwl32.exe 38 PID 664 wrote to memory of 1044 664 igfxwl32.exe 38 PID 664 wrote to memory of 1044 664 igfxwl32.exe 38 PID 664 wrote to memory of 1044 664 igfxwl32.exe 38 PID 1044 wrote to memory of 1636 1044 igfxwl32.exe 39 PID 1044 wrote to memory of 1636 1044 igfxwl32.exe 39 PID 1044 wrote to memory of 1636 1044 igfxwl32.exe 39 PID 1044 wrote to memory of 1636 1044 igfxwl32.exe 39 PID 1636 wrote to memory of 320 1636 igfxwl32.exe 40 PID 1636 wrote to memory of 320 1636 igfxwl32.exe 40 PID 1636 wrote to memory of 320 1636 igfxwl32.exe 40 PID 1636 wrote to memory of 320 1636 igfxwl32.exe 40 PID 1636 wrote to memory of 320 1636 igfxwl32.exe 40 PID 1636 wrote to memory of 320 1636 igfxwl32.exe 40 PID 1636 wrote to memory of 320 1636 igfxwl32.exe 40 PID 320 wrote to memory of 316 320 igfxwl32.exe 41 PID 320 wrote to memory of 316 320 igfxwl32.exe 41 PID 320 wrote to memory of 316 320 igfxwl32.exe 41 PID 320 wrote to memory of 316 320 igfxwl32.exe 41 PID 316 wrote to memory of 2260 316 igfxwl32.exe 42 PID 316 wrote to memory of 2260 316 igfxwl32.exe 42 PID 316 wrote to memory of 2260 316 igfxwl32.exe 42 PID 316 wrote to memory of 2260 316 igfxwl32.exe 42 PID 316 wrote to memory of 2260 316 igfxwl32.exe 42 PID 316 wrote to memory of 2260 316 igfxwl32.exe 42 PID 316 wrote to memory of 2260 316 igfxwl32.exe 42 PID 2260 wrote to memory of 2540 2260 igfxwl32.exe 43 PID 2260 wrote to memory of 2540 2260 igfxwl32.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\edc3b2e52d165b6c7beb50d591cba878_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\edc3b2e52d165b6c7beb50d591cba878_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\edc3b2e52d165b6c7beb50d591cba878_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\edc3b2e52d165b6c7beb50d591cba878_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Users\Admin\AppData\Local\Temp\EDC3B2~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Users\Admin\AppData\Local\Temp\EDC3B2~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2540 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:740 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:940 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1504 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1732 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2120 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:340 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:876 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1600 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:780 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2320 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1436 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2636 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2640 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1820 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1112 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:304 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2032 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1756 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2964 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe33⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:688 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe34⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1420 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe35⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1388 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:604
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
170KB
MD5edc3b2e52d165b6c7beb50d591cba878
SHA11450e4f778dc6a68db89dd54c406dd8868d41f0a
SHA2563d68cd3cd94edb3d4cc248294be736efb4673254175a28db1f04e4751b1479ac
SHA51266cee0d2ca7613a4162db93e1f5e675a8972e5d73def01534b6272845bd64eec8f8408d7ca9cff7d34a332e539f2ea9a70af0b235ef8337ce8ea36188995f98d