Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 21:08
Static task
static1
Behavioral task
behavioral1
Sample
90aad654bffb645a3298b6145a6e6a7b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
90aad654bffb645a3298b6145a6e6a7b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
90aad654bffb645a3298b6145a6e6a7b_JaffaCakes118.exe
-
Size
220KB
-
MD5
90aad654bffb645a3298b6145a6e6a7b
-
SHA1
838ba86aea36f949fa4f7c625f6ef134ad3601ef
-
SHA256
3e93113a7d263633195cfb5f50d3448f0faee7279e79b1340b99cb7d6093ba1e
-
SHA512
7b04e336bfbc6e2b8cb75a70a5f61c0810c560875b080273d6eba880c8900500e38d6038c8065eb5ca32ef1644876f375e5a7ab970200fa56b677c615b32f735
-
SSDEEP
3072:V6pd+ERyLiaLX9dOtcNwCGo5IEN2/BIT1/6ZJWF4a3pyl0VuYI4:VOd+ERqLNNxGojN2E1/AJWF48pE0Vu94
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 15 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxrk32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxrk32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxrk32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxrk32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxrk32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 90aad654bffb645a3298b6145a6e6a7b_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxrk32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxrk32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxrk32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxrk32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxrk32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxrk32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxrk32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxrk32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxrk32.exe -
Deletes itself 1 IoCs
pid Process 5008 igfxrk32.exe -
Executes dropped EXE 30 IoCs
pid Process 2948 igfxrk32.exe 5008 igfxrk32.exe 1716 igfxrk32.exe 1064 igfxrk32.exe 960 igfxrk32.exe 1952 igfxrk32.exe 2252 igfxrk32.exe 4760 igfxrk32.exe 3080 igfxrk32.exe 1008 igfxrk32.exe 3084 igfxrk32.exe 4212 igfxrk32.exe 1164 igfxrk32.exe 4668 igfxrk32.exe 5032 igfxrk32.exe 4876 igfxrk32.exe 4272 igfxrk32.exe 452 igfxrk32.exe 1644 igfxrk32.exe 2060 igfxrk32.exe 4840 igfxrk32.exe 3484 igfxrk32.exe 64 igfxrk32.exe 3952 igfxrk32.exe 2880 igfxrk32.exe 2648 igfxrk32.exe 2788 igfxrk32.exe 2652 igfxrk32.exe 3508 igfxrk32.exe 3080 igfxrk32.exe -
Maps connected drives based on registry 3 TTPs 30 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 90aad654bffb645a3298b6145a6e6a7b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 90aad654bffb645a3298b6145a6e6a7b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrk32.exe -
Drops file in System32 directory 45 IoCs
description ioc Process File created C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File opened for modification C:\Windows\SysWOW64\ igfxrk32.exe File created C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File opened for modification C:\Windows\SysWOW64\ igfxrk32.exe File opened for modification C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File created C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File created C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File created C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File opened for modification C:\Windows\SysWOW64\ igfxrk32.exe File created C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File created C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File created C:\Windows\SysWOW64\igfxrk32.exe 90aad654bffb645a3298b6145a6e6a7b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxrk32.exe File opened for modification C:\Windows\SysWOW64\ 90aad654bffb645a3298b6145a6e6a7b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File opened for modification C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File created C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File opened for modification C:\Windows\SysWOW64\ igfxrk32.exe File created C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File opened for modification C:\Windows\SysWOW64\ igfxrk32.exe File created C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File created C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File created C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File opened for modification C:\Windows\SysWOW64\igfxrk32.exe 90aad654bffb645a3298b6145a6e6a7b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxrk32.exe File opened for modification C:\Windows\SysWOW64\ igfxrk32.exe File opened for modification C:\Windows\SysWOW64\ igfxrk32.exe File opened for modification C:\Windows\SysWOW64\ igfxrk32.exe File created C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File opened for modification C:\Windows\SysWOW64\ igfxrk32.exe File opened for modification C:\Windows\SysWOW64\ igfxrk32.exe File opened for modification C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File created C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File opened for modification C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File opened for modification C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File opened for modification C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File opened for modification C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File opened for modification C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File opened for modification C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File opened for modification C:\Windows\SysWOW64\ igfxrk32.exe File opened for modification C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File opened for modification C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File opened for modification C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File opened for modification C:\Windows\SysWOW64\ igfxrk32.exe File opened for modification C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe -
Suspicious use of SetThreadContext 16 IoCs
description pid Process procid_target PID 2384 set thread context of 5068 2384 90aad654bffb645a3298b6145a6e6a7b_JaffaCakes118.exe 82 PID 2948 set thread context of 5008 2948 igfxrk32.exe 89 PID 1716 set thread context of 1064 1716 igfxrk32.exe 93 PID 960 set thread context of 1952 960 igfxrk32.exe 97 PID 2252 set thread context of 4760 2252 igfxrk32.exe 99 PID 3080 set thread context of 1008 3080 igfxrk32.exe 101 PID 3084 set thread context of 4212 3084 igfxrk32.exe 103 PID 1164 set thread context of 4668 1164 igfxrk32.exe 105 PID 5032 set thread context of 4876 5032 igfxrk32.exe 107 PID 4272 set thread context of 452 4272 igfxrk32.exe 109 PID 1644 set thread context of 2060 1644 igfxrk32.exe 111 PID 4840 set thread context of 3484 4840 igfxrk32.exe 113 PID 64 set thread context of 3952 64 igfxrk32.exe 115 PID 2880 set thread context of 2648 2880 igfxrk32.exe 117 PID 2788 set thread context of 2652 2788 igfxrk32.exe 119 PID 3508 set thread context of 3080 3508 igfxrk32.exe 121 -
resource yara_rule behavioral2/memory/5068-0-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/5068-2-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/5068-3-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/5068-4-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/5068-22-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/5068-42-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/5008-47-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/5008-46-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/5008-48-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/5008-49-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/5008-54-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/1064-59-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/1064-61-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/1064-65-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/1952-74-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/1952-77-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/4760-82-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/1008-87-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/1008-91-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/1008-93-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/4212-99-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/4668-106-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/4876-114-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/4668-109-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/4876-118-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/452-129-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/2060-134-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/2060-137-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/3484-142-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/3952-150-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/2648-159-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/2648-163-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/2652-168-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/2652-172-0x0000000000400000-0x0000000000451000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 31 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 90aad654bffb645a3298b6145a6e6a7b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 90aad654bffb645a3298b6145a6e6a7b_JaffaCakes118.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 90aad654bffb645a3298b6145a6e6a7b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrk32.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 5068 90aad654bffb645a3298b6145a6e6a7b_JaffaCakes118.exe 5068 90aad654bffb645a3298b6145a6e6a7b_JaffaCakes118.exe 5068 90aad654bffb645a3298b6145a6e6a7b_JaffaCakes118.exe 5068 90aad654bffb645a3298b6145a6e6a7b_JaffaCakes118.exe 5008 igfxrk32.exe 5008 igfxrk32.exe 5008 igfxrk32.exe 5008 igfxrk32.exe 1064 igfxrk32.exe 1064 igfxrk32.exe 1064 igfxrk32.exe 1064 igfxrk32.exe 1952 igfxrk32.exe 1952 igfxrk32.exe 1952 igfxrk32.exe 1952 igfxrk32.exe 4760 igfxrk32.exe 4760 igfxrk32.exe 4760 igfxrk32.exe 4760 igfxrk32.exe 1008 igfxrk32.exe 1008 igfxrk32.exe 1008 igfxrk32.exe 1008 igfxrk32.exe 4212 igfxrk32.exe 4212 igfxrk32.exe 4212 igfxrk32.exe 4212 igfxrk32.exe 4668 igfxrk32.exe 4668 igfxrk32.exe 4668 igfxrk32.exe 4668 igfxrk32.exe 4876 igfxrk32.exe 4876 igfxrk32.exe 4876 igfxrk32.exe 4876 igfxrk32.exe 452 igfxrk32.exe 452 igfxrk32.exe 452 igfxrk32.exe 452 igfxrk32.exe 2060 igfxrk32.exe 2060 igfxrk32.exe 2060 igfxrk32.exe 2060 igfxrk32.exe 3484 igfxrk32.exe 3484 igfxrk32.exe 3484 igfxrk32.exe 3484 igfxrk32.exe 3952 igfxrk32.exe 3952 igfxrk32.exe 3952 igfxrk32.exe 3952 igfxrk32.exe 2648 igfxrk32.exe 2648 igfxrk32.exe 2648 igfxrk32.exe 2648 igfxrk32.exe 2652 igfxrk32.exe 2652 igfxrk32.exe 2652 igfxrk32.exe 2652 igfxrk32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2384 wrote to memory of 5068 2384 90aad654bffb645a3298b6145a6e6a7b_JaffaCakes118.exe 82 PID 2384 wrote to memory of 5068 2384 90aad654bffb645a3298b6145a6e6a7b_JaffaCakes118.exe 82 PID 2384 wrote to memory of 5068 2384 90aad654bffb645a3298b6145a6e6a7b_JaffaCakes118.exe 82 PID 2384 wrote to memory of 5068 2384 90aad654bffb645a3298b6145a6e6a7b_JaffaCakes118.exe 82 PID 2384 wrote to memory of 5068 2384 90aad654bffb645a3298b6145a6e6a7b_JaffaCakes118.exe 82 PID 2384 wrote to memory of 5068 2384 90aad654bffb645a3298b6145a6e6a7b_JaffaCakes118.exe 82 PID 2384 wrote to memory of 5068 2384 90aad654bffb645a3298b6145a6e6a7b_JaffaCakes118.exe 82 PID 5068 wrote to memory of 2948 5068 90aad654bffb645a3298b6145a6e6a7b_JaffaCakes118.exe 88 PID 5068 wrote to memory of 2948 5068 90aad654bffb645a3298b6145a6e6a7b_JaffaCakes118.exe 88 PID 5068 wrote to memory of 2948 5068 90aad654bffb645a3298b6145a6e6a7b_JaffaCakes118.exe 88 PID 2948 wrote to memory of 5008 2948 igfxrk32.exe 89 PID 2948 wrote to memory of 5008 2948 igfxrk32.exe 89 PID 2948 wrote to memory of 5008 2948 igfxrk32.exe 89 PID 2948 wrote to memory of 5008 2948 igfxrk32.exe 89 PID 2948 wrote to memory of 5008 2948 igfxrk32.exe 89 PID 2948 wrote to memory of 5008 2948 igfxrk32.exe 89 PID 2948 wrote to memory of 5008 2948 igfxrk32.exe 89 PID 5008 wrote to memory of 1716 5008 igfxrk32.exe 92 PID 5008 wrote to memory of 1716 5008 igfxrk32.exe 92 PID 5008 wrote to memory of 1716 5008 igfxrk32.exe 92 PID 1716 wrote to memory of 1064 1716 igfxrk32.exe 93 PID 1716 wrote to memory of 1064 1716 igfxrk32.exe 93 PID 1716 wrote to memory of 1064 1716 igfxrk32.exe 93 PID 1716 wrote to memory of 1064 1716 igfxrk32.exe 93 PID 1716 wrote to memory of 1064 1716 igfxrk32.exe 93 PID 1716 wrote to memory of 1064 1716 igfxrk32.exe 93 PID 1716 wrote to memory of 1064 1716 igfxrk32.exe 93 PID 1064 wrote to memory of 960 1064 igfxrk32.exe 95 PID 1064 wrote to memory of 960 1064 igfxrk32.exe 95 PID 1064 wrote to memory of 960 1064 igfxrk32.exe 95 PID 960 wrote to memory of 1952 960 igfxrk32.exe 97 PID 960 wrote to memory of 1952 960 igfxrk32.exe 97 PID 960 wrote to memory of 1952 960 igfxrk32.exe 97 PID 960 wrote to memory of 1952 960 igfxrk32.exe 97 PID 960 wrote to memory of 1952 960 igfxrk32.exe 97 PID 960 wrote to memory of 1952 960 igfxrk32.exe 97 PID 960 wrote to memory of 1952 960 igfxrk32.exe 97 PID 1952 wrote to memory of 2252 1952 igfxrk32.exe 98 PID 1952 wrote to memory of 2252 1952 igfxrk32.exe 98 PID 1952 wrote to memory of 2252 1952 igfxrk32.exe 98 PID 2252 wrote to memory of 4760 2252 igfxrk32.exe 99 PID 2252 wrote to memory of 4760 2252 igfxrk32.exe 99 PID 2252 wrote to memory of 4760 2252 igfxrk32.exe 99 PID 2252 wrote to memory of 4760 2252 igfxrk32.exe 99 PID 2252 wrote to memory of 4760 2252 igfxrk32.exe 99 PID 2252 wrote to memory of 4760 2252 igfxrk32.exe 99 PID 2252 wrote to memory of 4760 2252 igfxrk32.exe 99 PID 4760 wrote to memory of 3080 4760 igfxrk32.exe 100 PID 4760 wrote to memory of 3080 4760 igfxrk32.exe 100 PID 4760 wrote to memory of 3080 4760 igfxrk32.exe 100 PID 3080 wrote to memory of 1008 3080 igfxrk32.exe 101 PID 3080 wrote to memory of 1008 3080 igfxrk32.exe 101 PID 3080 wrote to memory of 1008 3080 igfxrk32.exe 101 PID 3080 wrote to memory of 1008 3080 igfxrk32.exe 101 PID 3080 wrote to memory of 1008 3080 igfxrk32.exe 101 PID 3080 wrote to memory of 1008 3080 igfxrk32.exe 101 PID 3080 wrote to memory of 1008 3080 igfxrk32.exe 101 PID 1008 wrote to memory of 3084 1008 igfxrk32.exe 102 PID 1008 wrote to memory of 3084 1008 igfxrk32.exe 102 PID 1008 wrote to memory of 3084 1008 igfxrk32.exe 102 PID 3084 wrote to memory of 4212 3084 igfxrk32.exe 103 PID 3084 wrote to memory of 4212 3084 igfxrk32.exe 103 PID 3084 wrote to memory of 4212 3084 igfxrk32.exe 103 PID 3084 wrote to memory of 4212 3084 igfxrk32.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\90aad654bffb645a3298b6145a6e6a7b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\90aad654bffb645a3298b6145a6e6a7b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\90aad654bffb645a3298b6145a6e6a7b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\90aad654bffb645a3298b6145a6e6a7b_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Users\Admin\AppData\Local\Temp\90AAD6~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Users\Admin\AppData\Local\Temp\90AAD6~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4212 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1164 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4668 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5032 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4876 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4272 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:452 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1644 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2060 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4840 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3484 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:64 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3952 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2880 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2648 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2788 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2652 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3508 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe32⤵
- Executes dropped EXE
PID:3080
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
220KB
MD590aad654bffb645a3298b6145a6e6a7b
SHA1838ba86aea36f949fa4f7c625f6ef134ad3601ef
SHA2563e93113a7d263633195cfb5f50d3448f0faee7279e79b1340b99cb7d6093ba1e
SHA5127b04e336bfbc6e2b8cb75a70a5f61c0810c560875b080273d6eba880c8900500e38d6038c8065eb5ca32ef1644876f375e5a7ab970200fa56b677c615b32f735