Analysis
-
max time kernel
144s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-11-2024 01:12
Static task
static1
Behavioral task
behavioral1
Sample
8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe
-
Size
172KB
-
MD5
8e6a5d2c1b4aad1715259f4fa34f2100
-
SHA1
d69b077fbaf8df7c3f129a0adc058344fe9bf1ea
-
SHA256
36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3
-
SHA512
9a24afd494dcb4a03ad0638928da5efcc84f83629f2e01582f65a5e5cd9b274664dea2fa555d0c32e75fdb7f8dc3da9247a44b3b5593914641fea020a13fb9e8
-
SSDEEP
3072:oSZh+mB1+HuhQjuyoN+ke4HBFhbag6N72w1Tzsy6Haoa8UAERxkj:rntwqQju9vzW+Kd8Ulq
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2536 igfxwl32.exe -
Executes dropped EXE 33 IoCs
pid Process 2676 igfxwl32.exe 2536 igfxwl32.exe 2780 igfxwl32.exe 236 igfxwl32.exe 2016 igfxwl32.exe 1264 igfxwl32.exe 1780 igfxwl32.exe 2292 igfxwl32.exe 2316 igfxwl32.exe 2504 igfxwl32.exe 1840 igfxwl32.exe 2060 igfxwl32.exe 1368 igfxwl32.exe 1532 igfxwl32.exe 700 igfxwl32.exe 1696 igfxwl32.exe 2456 igfxwl32.exe 2924 igfxwl32.exe 2700 igfxwl32.exe 2192 igfxwl32.exe 3044 igfxwl32.exe 264 igfxwl32.exe 3060 igfxwl32.exe 2228 igfxwl32.exe 1736 igfxwl32.exe 352 igfxwl32.exe 1612 igfxwl32.exe 2076 igfxwl32.exe 2172 igfxwl32.exe 2512 igfxwl32.exe 1092 igfxwl32.exe 976 igfxwl32.exe 2380 igfxwl32.exe -
Loads dropped DLL 33 IoCs
pid Process 2220 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe 2676 igfxwl32.exe 2536 igfxwl32.exe 2780 igfxwl32.exe 236 igfxwl32.exe 2016 igfxwl32.exe 1264 igfxwl32.exe 1780 igfxwl32.exe 2292 igfxwl32.exe 2316 igfxwl32.exe 2504 igfxwl32.exe 1840 igfxwl32.exe 2060 igfxwl32.exe 1368 igfxwl32.exe 1532 igfxwl32.exe 700 igfxwl32.exe 1696 igfxwl32.exe 2456 igfxwl32.exe 2924 igfxwl32.exe 2700 igfxwl32.exe 2192 igfxwl32.exe 3044 igfxwl32.exe 264 igfxwl32.exe 3060 igfxwl32.exe 2228 igfxwl32.exe 1736 igfxwl32.exe 352 igfxwl32.exe 1612 igfxwl32.exe 2076 igfxwl32.exe 2172 igfxwl32.exe 2512 igfxwl32.exe 1092 igfxwl32.exe 976 igfxwl32.exe -
Maps connected drives based on registry 3 TTPs 34 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe -
Drops file in System32 directory 51 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxwl32.exe 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe -
Suspicious use of SetThreadContext 17 IoCs
description pid Process procid_target PID 2440 set thread context of 2220 2440 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe 30 PID 2676 set thread context of 2536 2676 igfxwl32.exe 32 PID 2780 set thread context of 236 2780 igfxwl32.exe 34 PID 2016 set thread context of 1264 2016 igfxwl32.exe 37 PID 1780 set thread context of 2292 1780 igfxwl32.exe 39 PID 2316 set thread context of 2504 2316 igfxwl32.exe 41 PID 1840 set thread context of 2060 1840 igfxwl32.exe 43 PID 1368 set thread context of 1532 1368 igfxwl32.exe 45 PID 700 set thread context of 1696 700 igfxwl32.exe 47 PID 2456 set thread context of 2924 2456 igfxwl32.exe 49 PID 2700 set thread context of 2192 2700 igfxwl32.exe 51 PID 3044 set thread context of 264 3044 igfxwl32.exe 53 PID 3060 set thread context of 2228 3060 igfxwl32.exe 55 PID 1736 set thread context of 352 1736 igfxwl32.exe 57 PID 1612 set thread context of 2076 1612 igfxwl32.exe 59 PID 2172 set thread context of 2512 2172 igfxwl32.exe 61 PID 1092 set thread context of 976 1092 igfxwl32.exe 63 -
resource yara_rule behavioral1/memory/2220-3-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2220-10-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2220-9-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2220-11-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2220-6-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2220-5-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2220-12-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2220-22-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2536-34-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2536-35-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2536-36-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2536-37-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2536-42-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2780-52-0x00000000002C0000-0x00000000002F5000-memory.dmp upx behavioral1/memory/236-61-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1264-72-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1264-80-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2292-91-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2292-99-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2504-111-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2504-118-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2060-138-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1532-150-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1532-154-0x0000000003230000-0x0000000003265000-memory.dmp upx behavioral1/memory/1532-157-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1696-175-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2924-194-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2192-214-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/264-233-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2228-252-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/352-271-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2076-288-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2512-297-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2512-302-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/976-317-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 34 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 2220 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe 2220 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe 2536 igfxwl32.exe 2536 igfxwl32.exe 236 igfxwl32.exe 236 igfxwl32.exe 1264 igfxwl32.exe 1264 igfxwl32.exe 2292 igfxwl32.exe 2292 igfxwl32.exe 2504 igfxwl32.exe 2504 igfxwl32.exe 2060 igfxwl32.exe 2060 igfxwl32.exe 1532 igfxwl32.exe 1532 igfxwl32.exe 1696 igfxwl32.exe 1696 igfxwl32.exe 2924 igfxwl32.exe 2924 igfxwl32.exe 2192 igfxwl32.exe 2192 igfxwl32.exe 264 igfxwl32.exe 264 igfxwl32.exe 2228 igfxwl32.exe 2228 igfxwl32.exe 352 igfxwl32.exe 352 igfxwl32.exe 2076 igfxwl32.exe 2076 igfxwl32.exe 2512 igfxwl32.exe 2512 igfxwl32.exe 976 igfxwl32.exe 976 igfxwl32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2220 2440 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe 30 PID 2440 wrote to memory of 2220 2440 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe 30 PID 2440 wrote to memory of 2220 2440 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe 30 PID 2440 wrote to memory of 2220 2440 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe 30 PID 2440 wrote to memory of 2220 2440 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe 30 PID 2440 wrote to memory of 2220 2440 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe 30 PID 2440 wrote to memory of 2220 2440 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe 30 PID 2220 wrote to memory of 2676 2220 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe 31 PID 2220 wrote to memory of 2676 2220 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe 31 PID 2220 wrote to memory of 2676 2220 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe 31 PID 2220 wrote to memory of 2676 2220 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe 31 PID 2676 wrote to memory of 2536 2676 igfxwl32.exe 32 PID 2676 wrote to memory of 2536 2676 igfxwl32.exe 32 PID 2676 wrote to memory of 2536 2676 igfxwl32.exe 32 PID 2676 wrote to memory of 2536 2676 igfxwl32.exe 32 PID 2676 wrote to memory of 2536 2676 igfxwl32.exe 32 PID 2676 wrote to memory of 2536 2676 igfxwl32.exe 32 PID 2676 wrote to memory of 2536 2676 igfxwl32.exe 32 PID 2536 wrote to memory of 2780 2536 igfxwl32.exe 33 PID 2536 wrote to memory of 2780 2536 igfxwl32.exe 33 PID 2536 wrote to memory of 2780 2536 igfxwl32.exe 33 PID 2536 wrote to memory of 2780 2536 igfxwl32.exe 33 PID 2780 wrote to memory of 236 2780 igfxwl32.exe 34 PID 2780 wrote to memory of 236 2780 igfxwl32.exe 34 PID 2780 wrote to memory of 236 2780 igfxwl32.exe 34 PID 2780 wrote to memory of 236 2780 igfxwl32.exe 34 PID 2780 wrote to memory of 236 2780 igfxwl32.exe 34 PID 2780 wrote to memory of 236 2780 igfxwl32.exe 34 PID 2780 wrote to memory of 236 2780 igfxwl32.exe 34 PID 236 wrote to memory of 2016 236 igfxwl32.exe 35 PID 236 wrote to memory of 2016 236 igfxwl32.exe 35 PID 236 wrote to memory of 2016 236 igfxwl32.exe 35 PID 236 wrote to memory of 2016 236 igfxwl32.exe 35 PID 2016 wrote to memory of 1264 2016 igfxwl32.exe 37 PID 2016 wrote to memory of 1264 2016 igfxwl32.exe 37 PID 2016 wrote to memory of 1264 2016 igfxwl32.exe 37 PID 2016 wrote to memory of 1264 2016 igfxwl32.exe 37 PID 2016 wrote to memory of 1264 2016 igfxwl32.exe 37 PID 2016 wrote to memory of 1264 2016 igfxwl32.exe 37 PID 2016 wrote to memory of 1264 2016 igfxwl32.exe 37 PID 1264 wrote to memory of 1780 1264 igfxwl32.exe 38 PID 1264 wrote to memory of 1780 1264 igfxwl32.exe 38 PID 1264 wrote to memory of 1780 1264 igfxwl32.exe 38 PID 1264 wrote to memory of 1780 1264 igfxwl32.exe 38 PID 1780 wrote to memory of 2292 1780 igfxwl32.exe 39 PID 1780 wrote to memory of 2292 1780 igfxwl32.exe 39 PID 1780 wrote to memory of 2292 1780 igfxwl32.exe 39 PID 1780 wrote to memory of 2292 1780 igfxwl32.exe 39 PID 1780 wrote to memory of 2292 1780 igfxwl32.exe 39 PID 1780 wrote to memory of 2292 1780 igfxwl32.exe 39 PID 1780 wrote to memory of 2292 1780 igfxwl32.exe 39 PID 2292 wrote to memory of 2316 2292 igfxwl32.exe 40 PID 2292 wrote to memory of 2316 2292 igfxwl32.exe 40 PID 2292 wrote to memory of 2316 2292 igfxwl32.exe 40 PID 2292 wrote to memory of 2316 2292 igfxwl32.exe 40 PID 2316 wrote to memory of 2504 2316 igfxwl32.exe 41 PID 2316 wrote to memory of 2504 2316 igfxwl32.exe 41 PID 2316 wrote to memory of 2504 2316 igfxwl32.exe 41 PID 2316 wrote to memory of 2504 2316 igfxwl32.exe 41 PID 2316 wrote to memory of 2504 2316 igfxwl32.exe 41 PID 2316 wrote to memory of 2504 2316 igfxwl32.exe 41 PID 2316 wrote to memory of 2504 2316 igfxwl32.exe 41 PID 2504 wrote to memory of 1840 2504 igfxwl32.exe 42 PID 2504 wrote to memory of 1840 2504 igfxwl32.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Users\Admin\AppData\Local\Temp\8E6A5D~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Users\Admin\AppData\Local\Temp\8E6A5D~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:236 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1840 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2060 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1368 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1532 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:700 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1696 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2456 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2924 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2700 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2192 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3044 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:264 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3060 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2228 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1736 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:352 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1612 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2076 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2172 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2512 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe33⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1092 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe34⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:976 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe35⤵
- Executes dropped EXE
PID:2380
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD58e6a5d2c1b4aad1715259f4fa34f2100
SHA1d69b077fbaf8df7c3f129a0adc058344fe9bf1ea
SHA25636d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3
SHA5129a24afd494dcb4a03ad0638928da5efcc84f83629f2e01582f65a5e5cd9b274664dea2fa555d0c32e75fdb7f8dc3da9247a44b3b5593914641fea020a13fb9e8