Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26/09/2024, 15:35
Static task
static1
Behavioral task
behavioral1
Sample
f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe
-
Size
174KB
-
MD5
f8ae3d04134db63bf814f3165944bdef
-
SHA1
c702c34f97cc79b37c61add307997ab9250dd8f3
-
SHA256
c563f1f45275a004ab9c038692b371b7369ffa0a98fb689b2a8a5ce0d6d51701
-
SHA512
2f6d2abf50847f65a505754d67946cb13ad3fcafd00563569b12f5904169942a934fea809681f345641dca29aa98a141382a23af48d12bdb26b27e94af3c88ac
-
SSDEEP
3072:q6UHMux55t76czZuVf6mm2fWTFphvIPKOcmZN8IjSPhZSeaOjA9/OX:BuT76KGFm28hvIPcmN5IhZSJ9/OX
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings 2 TTPs 15 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation igfxwd32.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation igfxwd32.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation igfxwd32.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation igfxwd32.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation igfxwd32.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation igfxwd32.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation igfxwd32.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation igfxwd32.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation igfxwd32.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation igfxwd32.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation igfxwd32.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation igfxwd32.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation igfxwd32.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation igfxwd32.exe -
Deletes itself 1 IoCs
pid Process 772 igfxwd32.exe -
Executes dropped EXE 29 IoCs
pid Process 1620 igfxwd32.exe 772 igfxwd32.exe 3544 igfxwd32.exe 3972 igfxwd32.exe 3580 igfxwd32.exe 3620 igfxwd32.exe 892 igfxwd32.exe 4524 igfxwd32.exe 456 igfxwd32.exe 4276 igfxwd32.exe 3540 igfxwd32.exe 3232 igfxwd32.exe 1208 igfxwd32.exe 3532 igfxwd32.exe 2292 igfxwd32.exe 4356 igfxwd32.exe 4136 igfxwd32.exe 4080 igfxwd32.exe 4424 igfxwd32.exe 2020 igfxwd32.exe 3384 igfxwd32.exe 4640 igfxwd32.exe 1476 igfxwd32.exe 1656 igfxwd32.exe 1600 igfxwd32.exe 2584 igfxwd32.exe 2920 igfxwd32.exe 1144 igfxwd32.exe 1088 igfxwd32.exe -
Maps connected drives based on registry 3 TTPs 30 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe -
Drops file in System32 directory 45 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe -
Suspicious use of SetThreadContext 15 IoCs
description pid Process procid_target PID 4916 set thread context of 1688 4916 f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe 82 PID 1620 set thread context of 772 1620 igfxwd32.exe 91 PID 3544 set thread context of 3972 3544 igfxwd32.exe 93 PID 3580 set thread context of 3620 3580 igfxwd32.exe 97 PID 892 set thread context of 4524 892 igfxwd32.exe 99 PID 456 set thread context of 4276 456 igfxwd32.exe 101 PID 3540 set thread context of 3232 3540 igfxwd32.exe 103 PID 1208 set thread context of 3532 1208 igfxwd32.exe 105 PID 2292 set thread context of 4356 2292 igfxwd32.exe 107 PID 4136 set thread context of 4080 4136 igfxwd32.exe 109 PID 4424 set thread context of 2020 4424 igfxwd32.exe 111 PID 3384 set thread context of 4640 3384 igfxwd32.exe 113 PID 1476 set thread context of 1656 1476 igfxwd32.exe 115 PID 1600 set thread context of 2584 1600 igfxwd32.exe 117 PID 2920 set thread context of 1144 2920 igfxwd32.exe 119 -
resource yara_rule behavioral2/memory/1688-0-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1688-2-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1688-3-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1688-4-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1688-38-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/772-43-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/772-45-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/772-44-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/772-47-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3972-53-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3972-55-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3620-62-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4524-69-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4276-76-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3232-83-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3532-91-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4356-98-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4080-106-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2020-112-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4640-120-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1656-124-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1656-129-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2584-137-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1144-145-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 30 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwd32.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 1688 f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe 1688 f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe 1688 f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe 1688 f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe 772 igfxwd32.exe 772 igfxwd32.exe 772 igfxwd32.exe 772 igfxwd32.exe 3972 igfxwd32.exe 3972 igfxwd32.exe 3972 igfxwd32.exe 3972 igfxwd32.exe 3620 igfxwd32.exe 3620 igfxwd32.exe 3620 igfxwd32.exe 3620 igfxwd32.exe 4524 igfxwd32.exe 4524 igfxwd32.exe 4524 igfxwd32.exe 4524 igfxwd32.exe 4276 igfxwd32.exe 4276 igfxwd32.exe 4276 igfxwd32.exe 4276 igfxwd32.exe 3232 igfxwd32.exe 3232 igfxwd32.exe 3232 igfxwd32.exe 3232 igfxwd32.exe 3532 igfxwd32.exe 3532 igfxwd32.exe 3532 igfxwd32.exe 3532 igfxwd32.exe 4356 igfxwd32.exe 4356 igfxwd32.exe 4356 igfxwd32.exe 4356 igfxwd32.exe 4080 igfxwd32.exe 4080 igfxwd32.exe 4080 igfxwd32.exe 4080 igfxwd32.exe 2020 igfxwd32.exe 2020 igfxwd32.exe 2020 igfxwd32.exe 2020 igfxwd32.exe 4640 igfxwd32.exe 4640 igfxwd32.exe 4640 igfxwd32.exe 4640 igfxwd32.exe 1656 igfxwd32.exe 1656 igfxwd32.exe 1656 igfxwd32.exe 1656 igfxwd32.exe 2584 igfxwd32.exe 2584 igfxwd32.exe 2584 igfxwd32.exe 2584 igfxwd32.exe 1144 igfxwd32.exe 1144 igfxwd32.exe 1144 igfxwd32.exe 1144 igfxwd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4916 wrote to memory of 1688 4916 f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe 82 PID 4916 wrote to memory of 1688 4916 f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe 82 PID 4916 wrote to memory of 1688 4916 f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe 82 PID 4916 wrote to memory of 1688 4916 f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe 82 PID 4916 wrote to memory of 1688 4916 f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe 82 PID 4916 wrote to memory of 1688 4916 f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe 82 PID 4916 wrote to memory of 1688 4916 f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe 82 PID 1688 wrote to memory of 1620 1688 f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe 87 PID 1688 wrote to memory of 1620 1688 f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe 87 PID 1688 wrote to memory of 1620 1688 f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe 87 PID 1620 wrote to memory of 772 1620 igfxwd32.exe 91 PID 1620 wrote to memory of 772 1620 igfxwd32.exe 91 PID 1620 wrote to memory of 772 1620 igfxwd32.exe 91 PID 1620 wrote to memory of 772 1620 igfxwd32.exe 91 PID 1620 wrote to memory of 772 1620 igfxwd32.exe 91 PID 1620 wrote to memory of 772 1620 igfxwd32.exe 91 PID 1620 wrote to memory of 772 1620 igfxwd32.exe 91 PID 772 wrote to memory of 3544 772 igfxwd32.exe 92 PID 772 wrote to memory of 3544 772 igfxwd32.exe 92 PID 772 wrote to memory of 3544 772 igfxwd32.exe 92 PID 3544 wrote to memory of 3972 3544 igfxwd32.exe 93 PID 3544 wrote to memory of 3972 3544 igfxwd32.exe 93 PID 3544 wrote to memory of 3972 3544 igfxwd32.exe 93 PID 3544 wrote to memory of 3972 3544 igfxwd32.exe 93 PID 3544 wrote to memory of 3972 3544 igfxwd32.exe 93 PID 3544 wrote to memory of 3972 3544 igfxwd32.exe 93 PID 3544 wrote to memory of 3972 3544 igfxwd32.exe 93 PID 3972 wrote to memory of 3580 3972 igfxwd32.exe 95 PID 3972 wrote to memory of 3580 3972 igfxwd32.exe 95 PID 3972 wrote to memory of 3580 3972 igfxwd32.exe 95 PID 3580 wrote to memory of 3620 3580 igfxwd32.exe 97 PID 3580 wrote to memory of 3620 3580 igfxwd32.exe 97 PID 3580 wrote to memory of 3620 3580 igfxwd32.exe 97 PID 3580 wrote to memory of 3620 3580 igfxwd32.exe 97 PID 3580 wrote to memory of 3620 3580 igfxwd32.exe 97 PID 3580 wrote to memory of 3620 3580 igfxwd32.exe 97 PID 3580 wrote to memory of 3620 3580 igfxwd32.exe 97 PID 3620 wrote to memory of 892 3620 igfxwd32.exe 98 PID 3620 wrote to memory of 892 3620 igfxwd32.exe 98 PID 3620 wrote to memory of 892 3620 igfxwd32.exe 98 PID 892 wrote to memory of 4524 892 igfxwd32.exe 99 PID 892 wrote to memory of 4524 892 igfxwd32.exe 99 PID 892 wrote to memory of 4524 892 igfxwd32.exe 99 PID 892 wrote to memory of 4524 892 igfxwd32.exe 99 PID 892 wrote to memory of 4524 892 igfxwd32.exe 99 PID 892 wrote to memory of 4524 892 igfxwd32.exe 99 PID 892 wrote to memory of 4524 892 igfxwd32.exe 99 PID 4524 wrote to memory of 456 4524 igfxwd32.exe 100 PID 4524 wrote to memory of 456 4524 igfxwd32.exe 100 PID 4524 wrote to memory of 456 4524 igfxwd32.exe 100 PID 456 wrote to memory of 4276 456 igfxwd32.exe 101 PID 456 wrote to memory of 4276 456 igfxwd32.exe 101 PID 456 wrote to memory of 4276 456 igfxwd32.exe 101 PID 456 wrote to memory of 4276 456 igfxwd32.exe 101 PID 456 wrote to memory of 4276 456 igfxwd32.exe 101 PID 456 wrote to memory of 4276 456 igfxwd32.exe 101 PID 456 wrote to memory of 4276 456 igfxwd32.exe 101 PID 4276 wrote to memory of 3540 4276 igfxwd32.exe 102 PID 4276 wrote to memory of 3540 4276 igfxwd32.exe 102 PID 4276 wrote to memory of 3540 4276 igfxwd32.exe 102 PID 3540 wrote to memory of 3232 3540 igfxwd32.exe 103 PID 3540 wrote to memory of 3232 3540 igfxwd32.exe 103 PID 3540 wrote to memory of 3232 3540 igfxwd32.exe 103 PID 3540 wrote to memory of 3232 3540 igfxwd32.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f8ae3d04134db63bf814f3165944bdef_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Users\Admin\AppData\Local\Temp\F8AE3D~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Users\Admin\AppData\Local\Temp\F8AE3D~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3232 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1208 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3532 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2292 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4356 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4136 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4080 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4424 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2020 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3384 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4640 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1476 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1656 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1600 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2584 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2920 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1144 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe31⤵
- Executes dropped EXE
PID:1088
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
174KB
MD5f8ae3d04134db63bf814f3165944bdef
SHA1c702c34f97cc79b37c61add307997ab9250dd8f3
SHA256c563f1f45275a004ab9c038692b371b7369ffa0a98fb689b2a8a5ce0d6d51701
SHA5122f6d2abf50847f65a505754d67946cb13ad3fcafd00563569b12f5904169942a934fea809681f345641dca29aa98a141382a23af48d12bdb26b27e94af3c88ac