Analysis
-
max time kernel
144s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/09/2024, 13:39
Static task
static1
Behavioral task
behavioral1
Sample
f87d227c239f2153debe2ed82b791af4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f87d227c239f2153debe2ed82b791af4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f87d227c239f2153debe2ed82b791af4_JaffaCakes118.exe
-
Size
184KB
-
MD5
f87d227c239f2153debe2ed82b791af4
-
SHA1
86b7ca4b65925fe8c34346824e7514dec9bc4dc9
-
SHA256
0e3bd9a2273d23017ac49410da451bd01b9972f14a6fbac0551dc45a77e86da5
-
SHA512
cf5fd3e38a2bb4115949cc609c63f436c18538a32986c0b1b314b8c73c86454b2a3a76f9d9b440d31f4176ceb9d924e590a696c06b1030825656140649aeeb51
-
SSDEEP
3072:42cek9K+k7JeRFr/mt+YrxLbaQrhnUn0NwSsSaD6wtADYzaiFw9Rykw9sQ4SKRfk:42cekCqJzQLbd9p28i2dEsVSI8
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2592 igfxpk32.exe -
Executes dropped EXE 33 IoCs
pid Process 2956 igfxpk32.exe 2592 igfxpk32.exe 1580 igfxpk32.exe 1260 igfxpk32.exe 2984 igfxpk32.exe 1132 igfxpk32.exe 2280 igfxpk32.exe 2188 igfxpk32.exe 1272 igfxpk32.exe 2372 igfxpk32.exe 2140 igfxpk32.exe 1652 igfxpk32.exe 2304 igfxpk32.exe 1664 igfxpk32.exe 1656 igfxpk32.exe 548 igfxpk32.exe 820 igfxpk32.exe 2428 igfxpk32.exe 2380 igfxpk32.exe 2736 igfxpk32.exe 2032 igfxpk32.exe 3028 igfxpk32.exe 1572 igfxpk32.exe 1492 igfxpk32.exe 2536 igfxpk32.exe 2868 igfxpk32.exe 2644 igfxpk32.exe 2280 igfxpk32.exe 692 igfxpk32.exe 2292 igfxpk32.exe 2344 igfxpk32.exe 1364 igfxpk32.exe 1344 igfxpk32.exe -
Loads dropped DLL 17 IoCs
pid Process 2704 f87d227c239f2153debe2ed82b791af4_JaffaCakes118.exe 2592 igfxpk32.exe 1260 igfxpk32.exe 1132 igfxpk32.exe 2188 igfxpk32.exe 2372 igfxpk32.exe 1652 igfxpk32.exe 1664 igfxpk32.exe 548 igfxpk32.exe 2428 igfxpk32.exe 2736 igfxpk32.exe 3028 igfxpk32.exe 1492 igfxpk32.exe 2868 igfxpk32.exe 2280 igfxpk32.exe 2292 igfxpk32.exe 1364 igfxpk32.exe -
Maps connected drives based on registry 3 TTPs 34 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum f87d227c239f2153debe2ed82b791af4_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 f87d227c239f2153debe2ed82b791af4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe -
Drops file in System32 directory 51 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\ igfxpk32.exe File opened for modification C:\Windows\SysWOW64\ igfxpk32.exe File created C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\ igfxpk32.exe File opened for modification C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File created C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File created C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\ igfxpk32.exe File opened for modification C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File created C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File created C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File created C:\Windows\SysWOW64\igfxpk32.exe f87d227c239f2153debe2ed82b791af4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File created C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\ igfxpk32.exe File opened for modification C:\Windows\SysWOW64\ igfxpk32.exe File opened for modification C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\ igfxpk32.exe File created C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File created C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\ igfxpk32.exe File created C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\ igfxpk32.exe File created C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File created C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\ igfxpk32.exe File opened for modification C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File created C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\ f87d227c239f2153debe2ed82b791af4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxpk32.exe f87d227c239f2153debe2ed82b791af4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxpk32.exe File created C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File created C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File created C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File created C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\ igfxpk32.exe File opened for modification C:\Windows\SysWOW64\ igfxpk32.exe File opened for modification C:\Windows\SysWOW64\ igfxpk32.exe File opened for modification C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\ igfxpk32.exe File opened for modification C:\Windows\SysWOW64\ igfxpk32.exe -
Suspicious use of SetThreadContext 17 IoCs
description pid Process procid_target PID 2176 set thread context of 2704 2176 f87d227c239f2153debe2ed82b791af4_JaffaCakes118.exe 30 PID 2956 set thread context of 2592 2956 igfxpk32.exe 32 PID 1580 set thread context of 1260 1580 igfxpk32.exe 34 PID 2984 set thread context of 1132 2984 igfxpk32.exe 36 PID 2280 set thread context of 2188 2280 igfxpk32.exe 38 PID 1272 set thread context of 2372 1272 igfxpk32.exe 40 PID 2140 set thread context of 1652 2140 igfxpk32.exe 42 PID 2304 set thread context of 1664 2304 igfxpk32.exe 44 PID 1656 set thread context of 548 1656 igfxpk32.exe 47 PID 820 set thread context of 2428 820 igfxpk32.exe 49 PID 2380 set thread context of 2736 2380 igfxpk32.exe 51 PID 2032 set thread context of 3028 2032 igfxpk32.exe 53 PID 1572 set thread context of 1492 1572 igfxpk32.exe 55 PID 2536 set thread context of 2868 2536 igfxpk32.exe 57 PID 2644 set thread context of 2280 2644 igfxpk32.exe 59 PID 692 set thread context of 2292 692 igfxpk32.exe 61 PID 2344 set thread context of 1364 2344 igfxpk32.exe 63 -
resource yara_rule behavioral1/memory/2704-9-0x0000000037170000-0x00000000371D5000-memory.dmp upx behavioral1/memory/2704-8-0x0000000037170000-0x00000000371D5000-memory.dmp upx behavioral1/memory/2704-7-0x0000000037170000-0x00000000371D5000-memory.dmp upx behavioral1/memory/2704-4-0x0000000037170000-0x00000000371D5000-memory.dmp upx behavioral1/memory/2704-3-0x0000000037170000-0x00000000371D5000-memory.dmp upx behavioral1/memory/2704-2-0x0000000037170000-0x00000000371D5000-memory.dmp upx behavioral1/memory/2704-19-0x0000000037170000-0x00000000371D5000-memory.dmp upx behavioral1/memory/2592-28-0x0000000037170000-0x00000000371D5000-memory.dmp upx behavioral1/memory/2592-31-0x0000000037170000-0x00000000371D5000-memory.dmp upx behavioral1/memory/2592-30-0x0000000037170000-0x00000000371D5000-memory.dmp upx behavioral1/memory/2592-29-0x0000000037170000-0x00000000371D5000-memory.dmp upx behavioral1/memory/2592-37-0x0000000037170000-0x00000000371D5000-memory.dmp upx behavioral1/memory/1260-48-0x0000000037170000-0x00000000371D5000-memory.dmp upx behavioral1/memory/1260-47-0x0000000037170000-0x00000000371D5000-memory.dmp upx behavioral1/memory/1260-46-0x0000000037170000-0x00000000371D5000-memory.dmp upx behavioral1/memory/1260-51-0x0000000037170000-0x00000000371D5000-memory.dmp upx behavioral1/memory/1132-63-0x0000000037170000-0x00000000371D5000-memory.dmp upx behavioral1/memory/1132-62-0x0000000037170000-0x00000000371D5000-memory.dmp upx behavioral1/memory/1132-61-0x0000000037170000-0x00000000371D5000-memory.dmp upx behavioral1/memory/1132-69-0x0000000037170000-0x00000000371D5000-memory.dmp upx behavioral1/memory/2188-80-0x0000000037170000-0x00000000371D5000-memory.dmp upx behavioral1/memory/2188-83-0x0000000037170000-0x00000000371D5000-memory.dmp upx behavioral1/memory/2372-95-0x0000000037170000-0x00000000371D5000-memory.dmp upx behavioral1/memory/2372-100-0x0000000037170000-0x00000000371D5000-memory.dmp upx behavioral1/memory/1652-111-0x0000000037170000-0x00000000371D5000-memory.dmp upx behavioral1/memory/1652-117-0x0000000037170000-0x00000000371D5000-memory.dmp upx behavioral1/memory/1664-128-0x0000000037170000-0x00000000371D5000-memory.dmp upx behavioral1/memory/1664-133-0x0000000037170000-0x00000000371D5000-memory.dmp upx behavioral1/memory/548-142-0x0000000037170000-0x00000000371D5000-memory.dmp upx behavioral1/memory/548-149-0x0000000037170000-0x00000000371D5000-memory.dmp upx behavioral1/memory/2428-158-0x0000000037170000-0x00000000371D5000-memory.dmp upx behavioral1/memory/2428-165-0x0000000037170000-0x00000000371D5000-memory.dmp upx behavioral1/memory/2736-174-0x0000000037170000-0x00000000371D5000-memory.dmp upx behavioral1/memory/2736-181-0x0000000037170000-0x00000000371D5000-memory.dmp upx behavioral1/memory/3028-196-0x0000000037170000-0x00000000371D5000-memory.dmp upx behavioral1/memory/1492-211-0x0000000037170000-0x00000000371D5000-memory.dmp upx behavioral1/memory/2868-226-0x0000000037170000-0x00000000371D5000-memory.dmp upx behavioral1/memory/2280-236-0x0000000037170000-0x00000000371D5000-memory.dmp upx behavioral1/memory/2280-242-0x0000000037170000-0x00000000371D5000-memory.dmp upx behavioral1/memory/2292-251-0x0000000037170000-0x00000000371D5000-memory.dmp upx behavioral1/memory/2292-258-0x0000000037170000-0x00000000371D5000-memory.dmp upx behavioral1/memory/1364-273-0x0000000037170000-0x00000000371D5000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 34 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f87d227c239f2153debe2ed82b791af4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f87d227c239f2153debe2ed82b791af4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 2704 f87d227c239f2153debe2ed82b791af4_JaffaCakes118.exe 2704 f87d227c239f2153debe2ed82b791af4_JaffaCakes118.exe 2592 igfxpk32.exe 2592 igfxpk32.exe 1260 igfxpk32.exe 1260 igfxpk32.exe 1132 igfxpk32.exe 1132 igfxpk32.exe 2188 igfxpk32.exe 2188 igfxpk32.exe 2372 igfxpk32.exe 2372 igfxpk32.exe 1652 igfxpk32.exe 1652 igfxpk32.exe 1664 igfxpk32.exe 1664 igfxpk32.exe 548 igfxpk32.exe 548 igfxpk32.exe 2428 igfxpk32.exe 2428 igfxpk32.exe 2736 igfxpk32.exe 2736 igfxpk32.exe 3028 igfxpk32.exe 3028 igfxpk32.exe 1492 igfxpk32.exe 1492 igfxpk32.exe 2868 igfxpk32.exe 2868 igfxpk32.exe 2280 igfxpk32.exe 2280 igfxpk32.exe 2292 igfxpk32.exe 2292 igfxpk32.exe 1364 igfxpk32.exe 1364 igfxpk32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2704 2176 f87d227c239f2153debe2ed82b791af4_JaffaCakes118.exe 30 PID 2176 wrote to memory of 2704 2176 f87d227c239f2153debe2ed82b791af4_JaffaCakes118.exe 30 PID 2176 wrote to memory of 2704 2176 f87d227c239f2153debe2ed82b791af4_JaffaCakes118.exe 30 PID 2176 wrote to memory of 2704 2176 f87d227c239f2153debe2ed82b791af4_JaffaCakes118.exe 30 PID 2176 wrote to memory of 2704 2176 f87d227c239f2153debe2ed82b791af4_JaffaCakes118.exe 30 PID 2176 wrote to memory of 2704 2176 f87d227c239f2153debe2ed82b791af4_JaffaCakes118.exe 30 PID 2176 wrote to memory of 2704 2176 f87d227c239f2153debe2ed82b791af4_JaffaCakes118.exe 30 PID 2704 wrote to memory of 2956 2704 f87d227c239f2153debe2ed82b791af4_JaffaCakes118.exe 31 PID 2704 wrote to memory of 2956 2704 f87d227c239f2153debe2ed82b791af4_JaffaCakes118.exe 31 PID 2704 wrote to memory of 2956 2704 f87d227c239f2153debe2ed82b791af4_JaffaCakes118.exe 31 PID 2704 wrote to memory of 2956 2704 f87d227c239f2153debe2ed82b791af4_JaffaCakes118.exe 31 PID 2956 wrote to memory of 2592 2956 igfxpk32.exe 32 PID 2956 wrote to memory of 2592 2956 igfxpk32.exe 32 PID 2956 wrote to memory of 2592 2956 igfxpk32.exe 32 PID 2956 wrote to memory of 2592 2956 igfxpk32.exe 32 PID 2956 wrote to memory of 2592 2956 igfxpk32.exe 32 PID 2956 wrote to memory of 2592 2956 igfxpk32.exe 32 PID 2956 wrote to memory of 2592 2956 igfxpk32.exe 32 PID 2592 wrote to memory of 1580 2592 igfxpk32.exe 33 PID 2592 wrote to memory of 1580 2592 igfxpk32.exe 33 PID 2592 wrote to memory of 1580 2592 igfxpk32.exe 33 PID 2592 wrote to memory of 1580 2592 igfxpk32.exe 33 PID 1580 wrote to memory of 1260 1580 igfxpk32.exe 34 PID 1580 wrote to memory of 1260 1580 igfxpk32.exe 34 PID 1580 wrote to memory of 1260 1580 igfxpk32.exe 34 PID 1580 wrote to memory of 1260 1580 igfxpk32.exe 34 PID 1580 wrote to memory of 1260 1580 igfxpk32.exe 34 PID 1580 wrote to memory of 1260 1580 igfxpk32.exe 34 PID 1580 wrote to memory of 1260 1580 igfxpk32.exe 34 PID 1260 wrote to memory of 2984 1260 igfxpk32.exe 35 PID 1260 wrote to memory of 2984 1260 igfxpk32.exe 35 PID 1260 wrote to memory of 2984 1260 igfxpk32.exe 35 PID 1260 wrote to memory of 2984 1260 igfxpk32.exe 35 PID 2984 wrote to memory of 1132 2984 igfxpk32.exe 36 PID 2984 wrote to memory of 1132 2984 igfxpk32.exe 36 PID 2984 wrote to memory of 1132 2984 igfxpk32.exe 36 PID 2984 wrote to memory of 1132 2984 igfxpk32.exe 36 PID 2984 wrote to memory of 1132 2984 igfxpk32.exe 36 PID 2984 wrote to memory of 1132 2984 igfxpk32.exe 36 PID 2984 wrote to memory of 1132 2984 igfxpk32.exe 36 PID 1132 wrote to memory of 2280 1132 igfxpk32.exe 37 PID 1132 wrote to memory of 2280 1132 igfxpk32.exe 37 PID 1132 wrote to memory of 2280 1132 igfxpk32.exe 37 PID 1132 wrote to memory of 2280 1132 igfxpk32.exe 37 PID 2280 wrote to memory of 2188 2280 igfxpk32.exe 38 PID 2280 wrote to memory of 2188 2280 igfxpk32.exe 38 PID 2280 wrote to memory of 2188 2280 igfxpk32.exe 38 PID 2280 wrote to memory of 2188 2280 igfxpk32.exe 38 PID 2280 wrote to memory of 2188 2280 igfxpk32.exe 38 PID 2280 wrote to memory of 2188 2280 igfxpk32.exe 38 PID 2280 wrote to memory of 2188 2280 igfxpk32.exe 38 PID 2188 wrote to memory of 1272 2188 igfxpk32.exe 39 PID 2188 wrote to memory of 1272 2188 igfxpk32.exe 39 PID 2188 wrote to memory of 1272 2188 igfxpk32.exe 39 PID 2188 wrote to memory of 1272 2188 igfxpk32.exe 39 PID 1272 wrote to memory of 2372 1272 igfxpk32.exe 40 PID 1272 wrote to memory of 2372 1272 igfxpk32.exe 40 PID 1272 wrote to memory of 2372 1272 igfxpk32.exe 40 PID 1272 wrote to memory of 2372 1272 igfxpk32.exe 40 PID 1272 wrote to memory of 2372 1272 igfxpk32.exe 40 PID 1272 wrote to memory of 2372 1272 igfxpk32.exe 40 PID 1272 wrote to memory of 2372 1272 igfxpk32.exe 40 PID 2372 wrote to memory of 2140 2372 igfxpk32.exe 41 PID 2372 wrote to memory of 2140 2372 igfxpk32.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\f87d227c239f2153debe2ed82b791af4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f87d227c239f2153debe2ed82b791af4_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\f87d227c239f2153debe2ed82b791af4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f87d227c239f2153debe2ed82b791af4_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Users\Admin\AppData\Local\Temp\F87D22~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\SysWOW64\igfxpk32.exe" C:\Users\Admin\AppData\Local\Temp\F87D22~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\SysWOW64\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\SysWOW64\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\SysWOW64\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\SysWOW64\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2140 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\SysWOW64\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1652 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2304 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\SysWOW64\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1664 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1656 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\SysWOW64\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:548 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:820 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\SysWOW64\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2428 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2380 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\SysWOW64\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2736 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2032 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\SysWOW64\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3028 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1572 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\SysWOW64\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1492 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2536 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\SysWOW64\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2868 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2644 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\SysWOW64\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2280 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:692 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\SysWOW64\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2292 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2344 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\SysWOW64\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe34⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1364 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe35⤵
- Executes dropped EXE
PID:1344
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD5f87d227c239f2153debe2ed82b791af4
SHA186b7ca4b65925fe8c34346824e7514dec9bc4dc9
SHA2560e3bd9a2273d23017ac49410da451bd01b9972f14a6fbac0551dc45a77e86da5
SHA512cf5fd3e38a2bb4115949cc609c63f436c18538a32986c0b1b314b8c73c86454b2a3a76f9d9b440d31f4176ceb9d924e590a696c06b1030825656140649aeeb51