Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 01:12
Static task
static1
Behavioral task
behavioral1
Sample
8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe
-
Size
172KB
-
MD5
8e6a5d2c1b4aad1715259f4fa34f2100
-
SHA1
d69b077fbaf8df7c3f129a0adc058344fe9bf1ea
-
SHA256
36d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3
-
SHA512
9a24afd494dcb4a03ad0638928da5efcc84f83629f2e01582f65a5e5cd9b274664dea2fa555d0c32e75fdb7f8dc3da9247a44b3b5593914641fea020a13fb9e8
-
SSDEEP
3072:oSZh+mB1+HuhQjuyoN+ke4HBFhbag6N72w1Tzsy6Haoa8UAERxkj:rntwqQju9vzW+Kd8Ulq
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 16 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation igfxwl32.exe -
Deletes itself 1 IoCs
pid Process 632 igfxwl32.exe -
Executes dropped EXE 30 IoCs
pid Process 2884 igfxwl32.exe 632 igfxwl32.exe 4988 igfxwl32.exe 5112 igfxwl32.exe 2076 igfxwl32.exe 3600 igfxwl32.exe 2952 igfxwl32.exe 3032 igfxwl32.exe 2372 igfxwl32.exe 2152 igfxwl32.exe 1096 igfxwl32.exe 4012 igfxwl32.exe 2652 igfxwl32.exe 3216 igfxwl32.exe 3512 igfxwl32.exe 3484 igfxwl32.exe 4104 igfxwl32.exe 4244 igfxwl32.exe 2924 igfxwl32.exe 3036 igfxwl32.exe 4288 igfxwl32.exe 3808 igfxwl32.exe 4808 igfxwl32.exe 1020 igfxwl32.exe 844 igfxwl32.exe 732 igfxwl32.exe 4724 igfxwl32.exe 2764 igfxwl32.exe 1980 igfxwl32.exe 3744 igfxwl32.exe -
Maps connected drives based on registry 3 TTPs 32 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe -
Drops file in System32 directory 48 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe -
Suspicious use of SetThreadContext 16 IoCs
description pid Process procid_target PID 1576 set thread context of 3612 1576 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe 93 PID 2884 set thread context of 632 2884 igfxwl32.exe 98 PID 4988 set thread context of 5112 4988 igfxwl32.exe 100 PID 2076 set thread context of 3600 2076 igfxwl32.exe 106 PID 2952 set thread context of 3032 2952 igfxwl32.exe 108 PID 2372 set thread context of 2152 2372 igfxwl32.exe 110 PID 1096 set thread context of 4012 1096 igfxwl32.exe 112 PID 2652 set thread context of 3216 2652 igfxwl32.exe 115 PID 3512 set thread context of 3484 3512 igfxwl32.exe 117 PID 4104 set thread context of 4244 4104 igfxwl32.exe 119 PID 2924 set thread context of 3036 2924 igfxwl32.exe 126 PID 4288 set thread context of 3808 4288 igfxwl32.exe 132 PID 4808 set thread context of 1020 4808 igfxwl32.exe 134 PID 844 set thread context of 732 844 igfxwl32.exe 136 PID 4724 set thread context of 2764 4724 igfxwl32.exe 141 PID 1980 set thread context of 3744 1980 igfxwl32.exe 143 -
resource yara_rule behavioral2/memory/3612-1-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3612-4-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3612-6-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3612-5-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3612-40-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/632-46-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/632-47-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/632-48-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/632-49-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/5112-59-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3600-68-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3032-77-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2152-85-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4012-95-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3216-103-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3484-112-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4244-121-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3036-128-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3036-131-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3808-139-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1020-151-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/732-160-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2764-171-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3744-181-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 32 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe -
Modifies registry class 16 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3612 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe 3612 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe 3612 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe 3612 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe 632 igfxwl32.exe 632 igfxwl32.exe 632 igfxwl32.exe 632 igfxwl32.exe 5112 igfxwl32.exe 5112 igfxwl32.exe 5112 igfxwl32.exe 5112 igfxwl32.exe 3600 igfxwl32.exe 3600 igfxwl32.exe 3600 igfxwl32.exe 3600 igfxwl32.exe 3032 igfxwl32.exe 3032 igfxwl32.exe 3032 igfxwl32.exe 3032 igfxwl32.exe 2152 igfxwl32.exe 2152 igfxwl32.exe 2152 igfxwl32.exe 2152 igfxwl32.exe 4012 igfxwl32.exe 4012 igfxwl32.exe 4012 igfxwl32.exe 4012 igfxwl32.exe 3216 igfxwl32.exe 3216 igfxwl32.exe 3216 igfxwl32.exe 3216 igfxwl32.exe 3484 igfxwl32.exe 3484 igfxwl32.exe 3484 igfxwl32.exe 3484 igfxwl32.exe 4244 igfxwl32.exe 4244 igfxwl32.exe 4244 igfxwl32.exe 4244 igfxwl32.exe 3036 igfxwl32.exe 3036 igfxwl32.exe 3036 igfxwl32.exe 3036 igfxwl32.exe 3808 igfxwl32.exe 3808 igfxwl32.exe 3808 igfxwl32.exe 3808 igfxwl32.exe 1020 igfxwl32.exe 1020 igfxwl32.exe 1020 igfxwl32.exe 1020 igfxwl32.exe 732 igfxwl32.exe 732 igfxwl32.exe 732 igfxwl32.exe 732 igfxwl32.exe 2764 igfxwl32.exe 2764 igfxwl32.exe 2764 igfxwl32.exe 2764 igfxwl32.exe 3744 igfxwl32.exe 3744 igfxwl32.exe 3744 igfxwl32.exe 3744 igfxwl32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1576 wrote to memory of 3612 1576 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe 93 PID 1576 wrote to memory of 3612 1576 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe 93 PID 1576 wrote to memory of 3612 1576 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe 93 PID 1576 wrote to memory of 3612 1576 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe 93 PID 1576 wrote to memory of 3612 1576 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe 93 PID 1576 wrote to memory of 3612 1576 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe 93 PID 1576 wrote to memory of 3612 1576 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe 93 PID 3612 wrote to memory of 2884 3612 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe 97 PID 3612 wrote to memory of 2884 3612 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe 97 PID 3612 wrote to memory of 2884 3612 8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe 97 PID 2884 wrote to memory of 632 2884 igfxwl32.exe 98 PID 2884 wrote to memory of 632 2884 igfxwl32.exe 98 PID 2884 wrote to memory of 632 2884 igfxwl32.exe 98 PID 2884 wrote to memory of 632 2884 igfxwl32.exe 98 PID 2884 wrote to memory of 632 2884 igfxwl32.exe 98 PID 2884 wrote to memory of 632 2884 igfxwl32.exe 98 PID 2884 wrote to memory of 632 2884 igfxwl32.exe 98 PID 632 wrote to memory of 4988 632 igfxwl32.exe 99 PID 632 wrote to memory of 4988 632 igfxwl32.exe 99 PID 632 wrote to memory of 4988 632 igfxwl32.exe 99 PID 4988 wrote to memory of 5112 4988 igfxwl32.exe 100 PID 4988 wrote to memory of 5112 4988 igfxwl32.exe 100 PID 4988 wrote to memory of 5112 4988 igfxwl32.exe 100 PID 4988 wrote to memory of 5112 4988 igfxwl32.exe 100 PID 4988 wrote to memory of 5112 4988 igfxwl32.exe 100 PID 4988 wrote to memory of 5112 4988 igfxwl32.exe 100 PID 4988 wrote to memory of 5112 4988 igfxwl32.exe 100 PID 5112 wrote to memory of 2076 5112 igfxwl32.exe 101 PID 5112 wrote to memory of 2076 5112 igfxwl32.exe 101 PID 5112 wrote to memory of 2076 5112 igfxwl32.exe 101 PID 2076 wrote to memory of 3600 2076 igfxwl32.exe 106 PID 2076 wrote to memory of 3600 2076 igfxwl32.exe 106 PID 2076 wrote to memory of 3600 2076 igfxwl32.exe 106 PID 2076 wrote to memory of 3600 2076 igfxwl32.exe 106 PID 2076 wrote to memory of 3600 2076 igfxwl32.exe 106 PID 2076 wrote to memory of 3600 2076 igfxwl32.exe 106 PID 2076 wrote to memory of 3600 2076 igfxwl32.exe 106 PID 3600 wrote to memory of 2952 3600 igfxwl32.exe 107 PID 3600 wrote to memory of 2952 3600 igfxwl32.exe 107 PID 3600 wrote to memory of 2952 3600 igfxwl32.exe 107 PID 2952 wrote to memory of 3032 2952 igfxwl32.exe 108 PID 2952 wrote to memory of 3032 2952 igfxwl32.exe 108 PID 2952 wrote to memory of 3032 2952 igfxwl32.exe 108 PID 2952 wrote to memory of 3032 2952 igfxwl32.exe 108 PID 2952 wrote to memory of 3032 2952 igfxwl32.exe 108 PID 2952 wrote to memory of 3032 2952 igfxwl32.exe 108 PID 2952 wrote to memory of 3032 2952 igfxwl32.exe 108 PID 3032 wrote to memory of 2372 3032 igfxwl32.exe 109 PID 3032 wrote to memory of 2372 3032 igfxwl32.exe 109 PID 3032 wrote to memory of 2372 3032 igfxwl32.exe 109 PID 2372 wrote to memory of 2152 2372 igfxwl32.exe 110 PID 2372 wrote to memory of 2152 2372 igfxwl32.exe 110 PID 2372 wrote to memory of 2152 2372 igfxwl32.exe 110 PID 2372 wrote to memory of 2152 2372 igfxwl32.exe 110 PID 2372 wrote to memory of 2152 2372 igfxwl32.exe 110 PID 2372 wrote to memory of 2152 2372 igfxwl32.exe 110 PID 2372 wrote to memory of 2152 2372 igfxwl32.exe 110 PID 2152 wrote to memory of 1096 2152 igfxwl32.exe 111 PID 2152 wrote to memory of 1096 2152 igfxwl32.exe 111 PID 2152 wrote to memory of 1096 2152 igfxwl32.exe 111 PID 1096 wrote to memory of 4012 1096 igfxwl32.exe 112 PID 1096 wrote to memory of 4012 1096 igfxwl32.exe 112 PID 1096 wrote to memory of 4012 1096 igfxwl32.exe 112 PID 1096 wrote to memory of 4012 1096 igfxwl32.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8e6a5d2c1b4aad1715259f4fa34f2100_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Users\Admin\AppData\Local\Temp\8E6A5D~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Users\Admin\AppData\Local\Temp\8E6A5D~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4012 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2652 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3216 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3512 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3484 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4104 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4244 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2924 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3036 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4288 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3808 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4808 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1020 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:844 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:732 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4724 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2764 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1980 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe32⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3744 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe33⤵PID:3624
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD58e6a5d2c1b4aad1715259f4fa34f2100
SHA1d69b077fbaf8df7c3f129a0adc058344fe9bf1ea
SHA25636d4b1a93eb843d9475f0cd55d1f3775ad327fad7244eb8e9d11baafca9cc7e3
SHA5129a24afd494dcb4a03ad0638928da5efcc84f83629f2e01582f65a5e5cd9b274664dea2fa555d0c32e75fdb7f8dc3da9247a44b3b5593914641fea020a13fb9e8