Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 08:10
Static task
static1
Behavioral task
behavioral1
Sample
9379e4dd4395e4d2ffb830f67b7ce372_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9379e4dd4395e4d2ffb830f67b7ce372_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
9379e4dd4395e4d2ffb830f67b7ce372_JaffaCakes118.exe
-
Size
220KB
-
MD5
9379e4dd4395e4d2ffb830f67b7ce372
-
SHA1
6ece4a645b5ef91b090650a9c266c219c15dc8c0
-
SHA256
fadc8946fcdbaddfe31ab48968e84da81d9ed0f403ad49e533dafb2907b97373
-
SHA512
e2f484d69e7189d5817706f5bc8377e081fee8a77a8c04c894131d95eb1b6c0c60c4eca84561221d06cc248a9e8c2a93dedcf750f1ea617fa2f1563d0d8be1c7
-
SSDEEP
3072:SEweV9Lijj7mO9tOrvgKplY6hR0Q3RIRlF13jFA4mrtPp:SEweRgMlY67dh6P1zW4mb
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2380 igfxvsd32.exe -
Executes dropped EXE 24 IoCs
pid Process 1080 igfxvsd32.exe 2380 igfxvsd32.exe 2896 igfxvsd32.exe 2696 igfxvsd32.exe 2956 igfxvsd32.exe 756 igfxvsd32.exe 1176 igfxvsd32.exe 1484 igfxvsd32.exe 2296 igfxvsd32.exe 2312 igfxvsd32.exe 972 igfxvsd32.exe 1476 igfxvsd32.exe 568 igfxvsd32.exe 1116 igfxvsd32.exe 2284 igfxvsd32.exe 1600 igfxvsd32.exe 2760 igfxvsd32.exe 2780 igfxvsd32.exe 1564 igfxvsd32.exe 2800 igfxvsd32.exe 2612 igfxvsd32.exe 2300 igfxvsd32.exe 2968 igfxvsd32.exe 1128 igfxvsd32.exe -
Loads dropped DLL 48 IoCs
pid Process 2052 9379e4dd4395e4d2ffb830f67b7ce372_JaffaCakes118.exe 2052 9379e4dd4395e4d2ffb830f67b7ce372_JaffaCakes118.exe 1080 igfxvsd32.exe 1080 igfxvsd32.exe 2380 igfxvsd32.exe 2380 igfxvsd32.exe 2896 igfxvsd32.exe 2896 igfxvsd32.exe 2696 igfxvsd32.exe 2696 igfxvsd32.exe 2956 igfxvsd32.exe 2956 igfxvsd32.exe 756 igfxvsd32.exe 756 igfxvsd32.exe 1176 igfxvsd32.exe 1176 igfxvsd32.exe 1484 igfxvsd32.exe 1484 igfxvsd32.exe 2296 igfxvsd32.exe 2296 igfxvsd32.exe 2312 igfxvsd32.exe 2312 igfxvsd32.exe 972 igfxvsd32.exe 972 igfxvsd32.exe 1476 igfxvsd32.exe 1476 igfxvsd32.exe 568 igfxvsd32.exe 568 igfxvsd32.exe 1116 igfxvsd32.exe 1116 igfxvsd32.exe 2284 igfxvsd32.exe 2284 igfxvsd32.exe 1600 igfxvsd32.exe 1600 igfxvsd32.exe 2760 igfxvsd32.exe 2760 igfxvsd32.exe 2780 igfxvsd32.exe 2780 igfxvsd32.exe 1564 igfxvsd32.exe 1564 igfxvsd32.exe 2800 igfxvsd32.exe 2800 igfxvsd32.exe 2612 igfxvsd32.exe 2612 igfxvsd32.exe 2300 igfxvsd32.exe 2300 igfxvsd32.exe 2968 igfxvsd32.exe 2968 igfxvsd32.exe -
Maps connected drives based on registry 3 TTPs 26 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxvsd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxvsd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxvsd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxvsd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxvsd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxvsd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxvsd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxvsd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxvsd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxvsd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxvsd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxvsd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxvsd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxvsd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 9379e4dd4395e4d2ffb830f67b7ce372_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxvsd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxvsd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxvsd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxvsd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxvsd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxvsd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxvsd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxvsd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxvsd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxvsd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 9379e4dd4395e4d2ffb830f67b7ce372_JaffaCakes118.exe -
Drops file in System32 directory 36 IoCs
description ioc Process File created C:\Windows\SysWOW64\igfxvsd32.exe igfxvsd32.exe File opened for modification C:\Windows\SysWOW64\ igfxvsd32.exe File opened for modification C:\Windows\SysWOW64\igfxvsd32.exe igfxvsd32.exe File opened for modification C:\Windows\SysWOW64\ igfxvsd32.exe File opened for modification C:\Windows\SysWOW64\igfxvsd32.exe igfxvsd32.exe File opened for modification C:\Windows\SysWOW64\igfxvsd32.exe igfxvsd32.exe File opened for modification C:\Windows\SysWOW64\igfxvsd32.exe 9379e4dd4395e4d2ffb830f67b7ce372_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxvsd32.exe File created C:\Windows\SysWOW64\igfxvsd32.exe igfxvsd32.exe File created C:\Windows\SysWOW64\igfxvsd32.exe igfxvsd32.exe File opened for modification C:\Windows\SysWOW64\igfxvsd32.exe igfxvsd32.exe File opened for modification C:\Windows\SysWOW64\igfxvsd32.exe igfxvsd32.exe File opened for modification C:\Windows\SysWOW64\ igfxvsd32.exe File created C:\Windows\SysWOW64\igfxvsd32.exe igfxvsd32.exe File opened for modification C:\Windows\SysWOW64\ igfxvsd32.exe File opened for modification C:\Windows\SysWOW64\igfxvsd32.exe igfxvsd32.exe File opened for modification C:\Windows\SysWOW64\ igfxvsd32.exe File opened for modification C:\Windows\SysWOW64\igfxvsd32.exe igfxvsd32.exe File created C:\Windows\SysWOW64\igfxvsd32.exe igfxvsd32.exe File opened for modification C:\Windows\SysWOW64\igfxvsd32.exe igfxvsd32.exe File opened for modification C:\Windows\SysWOW64\igfxvsd32.exe igfxvsd32.exe File opened for modification C:\Windows\SysWOW64\igfxvsd32.exe igfxvsd32.exe File opened for modification C:\Windows\SysWOW64\ 9379e4dd4395e4d2ffb830f67b7ce372_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxvsd32.exe 9379e4dd4395e4d2ffb830f67b7ce372_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxvsd32.exe igfxvsd32.exe File opened for modification C:\Windows\SysWOW64\ igfxvsd32.exe File created C:\Windows\SysWOW64\igfxvsd32.exe igfxvsd32.exe File created C:\Windows\SysWOW64\igfxvsd32.exe igfxvsd32.exe File opened for modification C:\Windows\SysWOW64\ igfxvsd32.exe File opened for modification C:\Windows\SysWOW64\ igfxvsd32.exe File created C:\Windows\SysWOW64\igfxvsd32.exe igfxvsd32.exe File opened for modification C:\Windows\SysWOW64\ igfxvsd32.exe File created C:\Windows\SysWOW64\igfxvsd32.exe igfxvsd32.exe File opened for modification C:\Windows\SysWOW64\ igfxvsd32.exe File created C:\Windows\SysWOW64\igfxvsd32.exe igfxvsd32.exe File created C:\Windows\SysWOW64\igfxvsd32.exe igfxvsd32.exe -
Suspicious use of SetThreadContext 13 IoCs
description pid Process procid_target PID 2552 set thread context of 2052 2552 9379e4dd4395e4d2ffb830f67b7ce372_JaffaCakes118.exe 31 PID 1080 set thread context of 2380 1080 igfxvsd32.exe 33 PID 2896 set thread context of 2696 2896 igfxvsd32.exe 35 PID 2956 set thread context of 756 2956 igfxvsd32.exe 37 PID 1176 set thread context of 1484 1176 igfxvsd32.exe 39 PID 2296 set thread context of 2312 2296 igfxvsd32.exe 41 PID 972 set thread context of 1476 972 igfxvsd32.exe 43 PID 568 set thread context of 1116 568 igfxvsd32.exe 45 PID 2284 set thread context of 1600 2284 igfxvsd32.exe 47 PID 2760 set thread context of 2780 2760 igfxvsd32.exe 49 PID 1564 set thread context of 2800 1564 igfxvsd32.exe 51 PID 2612 set thread context of 2300 2612 igfxvsd32.exe 53 PID 2968 set thread context of 1128 2968 igfxvsd32.exe 55 -
resource yara_rule behavioral1/memory/2052-2-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2052-5-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2052-9-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2052-8-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2052-7-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2052-4-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2052-10-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2052-11-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2052-14-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2052-26-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2380-42-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2380-41-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2380-40-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2380-39-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2380-38-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2380-43-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2380-50-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2696-61-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2696-62-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2696-63-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2696-69-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/756-83-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/756-90-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/1484-102-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/1484-101-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/1484-103-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/1484-109-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2312-123-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2312-130-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/1476-144-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/1476-150-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/1116-164-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/1116-171-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/1600-185-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/1600-191-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2780-205-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2780-211-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2800-223-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2800-226-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2300-237-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2300-240-0x0000000000400000-0x0000000000451000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxvsd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxvsd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxvsd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxvsd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxvsd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxvsd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxvsd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9379e4dd4395e4d2ffb830f67b7ce372_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9379e4dd4395e4d2ffb830f67b7ce372_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxvsd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxvsd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxvsd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxvsd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxvsd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxvsd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxvsd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxvsd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxvsd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxvsd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxvsd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxvsd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxvsd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxvsd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxvsd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxvsd32.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2052 9379e4dd4395e4d2ffb830f67b7ce372_JaffaCakes118.exe 2052 9379e4dd4395e4d2ffb830f67b7ce372_JaffaCakes118.exe 2380 igfxvsd32.exe 2380 igfxvsd32.exe 2696 igfxvsd32.exe 2696 igfxvsd32.exe 756 igfxvsd32.exe 756 igfxvsd32.exe 1484 igfxvsd32.exe 1484 igfxvsd32.exe 2312 igfxvsd32.exe 2312 igfxvsd32.exe 1476 igfxvsd32.exe 1476 igfxvsd32.exe 1116 igfxvsd32.exe 1116 igfxvsd32.exe 1600 igfxvsd32.exe 1600 igfxvsd32.exe 2780 igfxvsd32.exe 2780 igfxvsd32.exe 2800 igfxvsd32.exe 2800 igfxvsd32.exe 2300 igfxvsd32.exe 2300 igfxvsd32.exe 1128 igfxvsd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2052 2552 9379e4dd4395e4d2ffb830f67b7ce372_JaffaCakes118.exe 31 PID 2552 wrote to memory of 2052 2552 9379e4dd4395e4d2ffb830f67b7ce372_JaffaCakes118.exe 31 PID 2552 wrote to memory of 2052 2552 9379e4dd4395e4d2ffb830f67b7ce372_JaffaCakes118.exe 31 PID 2552 wrote to memory of 2052 2552 9379e4dd4395e4d2ffb830f67b7ce372_JaffaCakes118.exe 31 PID 2552 wrote to memory of 2052 2552 9379e4dd4395e4d2ffb830f67b7ce372_JaffaCakes118.exe 31 PID 2552 wrote to memory of 2052 2552 9379e4dd4395e4d2ffb830f67b7ce372_JaffaCakes118.exe 31 PID 2552 wrote to memory of 2052 2552 9379e4dd4395e4d2ffb830f67b7ce372_JaffaCakes118.exe 31 PID 2052 wrote to memory of 1080 2052 9379e4dd4395e4d2ffb830f67b7ce372_JaffaCakes118.exe 32 PID 2052 wrote to memory of 1080 2052 9379e4dd4395e4d2ffb830f67b7ce372_JaffaCakes118.exe 32 PID 2052 wrote to memory of 1080 2052 9379e4dd4395e4d2ffb830f67b7ce372_JaffaCakes118.exe 32 PID 2052 wrote to memory of 1080 2052 9379e4dd4395e4d2ffb830f67b7ce372_JaffaCakes118.exe 32 PID 1080 wrote to memory of 2380 1080 igfxvsd32.exe 33 PID 1080 wrote to memory of 2380 1080 igfxvsd32.exe 33 PID 1080 wrote to memory of 2380 1080 igfxvsd32.exe 33 PID 1080 wrote to memory of 2380 1080 igfxvsd32.exe 33 PID 1080 wrote to memory of 2380 1080 igfxvsd32.exe 33 PID 1080 wrote to memory of 2380 1080 igfxvsd32.exe 33 PID 1080 wrote to memory of 2380 1080 igfxvsd32.exe 33 PID 2380 wrote to memory of 2896 2380 igfxvsd32.exe 34 PID 2380 wrote to memory of 2896 2380 igfxvsd32.exe 34 PID 2380 wrote to memory of 2896 2380 igfxvsd32.exe 34 PID 2380 wrote to memory of 2896 2380 igfxvsd32.exe 34 PID 2896 wrote to memory of 2696 2896 igfxvsd32.exe 35 PID 2896 wrote to memory of 2696 2896 igfxvsd32.exe 35 PID 2896 wrote to memory of 2696 2896 igfxvsd32.exe 35 PID 2896 wrote to memory of 2696 2896 igfxvsd32.exe 35 PID 2896 wrote to memory of 2696 2896 igfxvsd32.exe 35 PID 2896 wrote to memory of 2696 2896 igfxvsd32.exe 35 PID 2896 wrote to memory of 2696 2896 igfxvsd32.exe 35 PID 2696 wrote to memory of 2956 2696 igfxvsd32.exe 36 PID 2696 wrote to memory of 2956 2696 igfxvsd32.exe 36 PID 2696 wrote to memory of 2956 2696 igfxvsd32.exe 36 PID 2696 wrote to memory of 2956 2696 igfxvsd32.exe 36 PID 2956 wrote to memory of 756 2956 igfxvsd32.exe 37 PID 2956 wrote to memory of 756 2956 igfxvsd32.exe 37 PID 2956 wrote to memory of 756 2956 igfxvsd32.exe 37 PID 2956 wrote to memory of 756 2956 igfxvsd32.exe 37 PID 2956 wrote to memory of 756 2956 igfxvsd32.exe 37 PID 2956 wrote to memory of 756 2956 igfxvsd32.exe 37 PID 2956 wrote to memory of 756 2956 igfxvsd32.exe 37 PID 756 wrote to memory of 1176 756 igfxvsd32.exe 38 PID 756 wrote to memory of 1176 756 igfxvsd32.exe 38 PID 756 wrote to memory of 1176 756 igfxvsd32.exe 38 PID 756 wrote to memory of 1176 756 igfxvsd32.exe 38 PID 1176 wrote to memory of 1484 1176 igfxvsd32.exe 39 PID 1176 wrote to memory of 1484 1176 igfxvsd32.exe 39 PID 1176 wrote to memory of 1484 1176 igfxvsd32.exe 39 PID 1176 wrote to memory of 1484 1176 igfxvsd32.exe 39 PID 1176 wrote to memory of 1484 1176 igfxvsd32.exe 39 PID 1176 wrote to memory of 1484 1176 igfxvsd32.exe 39 PID 1176 wrote to memory of 1484 1176 igfxvsd32.exe 39 PID 1484 wrote to memory of 2296 1484 igfxvsd32.exe 40 PID 1484 wrote to memory of 2296 1484 igfxvsd32.exe 40 PID 1484 wrote to memory of 2296 1484 igfxvsd32.exe 40 PID 1484 wrote to memory of 2296 1484 igfxvsd32.exe 40 PID 2296 wrote to memory of 2312 2296 igfxvsd32.exe 41 PID 2296 wrote to memory of 2312 2296 igfxvsd32.exe 41 PID 2296 wrote to memory of 2312 2296 igfxvsd32.exe 41 PID 2296 wrote to memory of 2312 2296 igfxvsd32.exe 41 PID 2296 wrote to memory of 2312 2296 igfxvsd32.exe 41 PID 2296 wrote to memory of 2312 2296 igfxvsd32.exe 41 PID 2296 wrote to memory of 2312 2296 igfxvsd32.exe 41 PID 2312 wrote to memory of 972 2312 igfxvsd32.exe 42 PID 2312 wrote to memory of 972 2312 igfxvsd32.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\9379e4dd4395e4d2ffb830f67b7ce372_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9379e4dd4395e4d2ffb830f67b7ce372_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\9379e4dd4395e4d2ffb830f67b7ce372_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9379e4dd4395e4d2ffb830f67b7ce372_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\igfxvsd32.exe"C:\Windows\system32\igfxvsd32.exe" C:\Users\Admin\AppData\Local\Temp\9379E4~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\igfxvsd32.exe"C:\Windows\system32\igfxvsd32.exe" C:\Users\Admin\AppData\Local\Temp\9379E4~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\igfxvsd32.exe"C:\Windows\system32\igfxvsd32.exe" C:\Windows\SysWOW64\IGFXVS~1.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\igfxvsd32.exe"C:\Windows\system32\igfxvsd32.exe" C:\Windows\SysWOW64\IGFXVS~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\igfxvsd32.exe"C:\Windows\system32\igfxvsd32.exe" C:\Windows\SysWOW64\IGFXVS~1.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\igfxvsd32.exe"C:\Windows\system32\igfxvsd32.exe" C:\Windows\SysWOW64\IGFXVS~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\SysWOW64\igfxvsd32.exe"C:\Windows\system32\igfxvsd32.exe" C:\Windows\SysWOW64\IGFXVS~1.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\SysWOW64\igfxvsd32.exe"C:\Windows\system32\igfxvsd32.exe" C:\Windows\SysWOW64\IGFXVS~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\igfxvsd32.exe"C:\Windows\system32\igfxvsd32.exe" C:\Windows\SysWOW64\IGFXVS~1.EXE11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\igfxvsd32.exe"C:\Windows\system32\igfxvsd32.exe" C:\Windows\SysWOW64\IGFXVS~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\igfxvsd32.exe"C:\Windows\system32\igfxvsd32.exe" C:\Windows\SysWOW64\IGFXVS~1.EXE13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:972 -
C:\Windows\SysWOW64\igfxvsd32.exe"C:\Windows\system32\igfxvsd32.exe" C:\Windows\SysWOW64\IGFXVS~1.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1476 -
C:\Windows\SysWOW64\igfxvsd32.exe"C:\Windows\system32\igfxvsd32.exe" C:\Windows\SysWOW64\IGFXVS~1.EXE15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:568 -
C:\Windows\SysWOW64\igfxvsd32.exe"C:\Windows\system32\igfxvsd32.exe" C:\Windows\SysWOW64\IGFXVS~1.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1116 -
C:\Windows\SysWOW64\igfxvsd32.exe"C:\Windows\system32\igfxvsd32.exe" C:\Windows\SysWOW64\IGFXVS~1.EXE17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2284 -
C:\Windows\SysWOW64\igfxvsd32.exe"C:\Windows\system32\igfxvsd32.exe" C:\Windows\SysWOW64\IGFXVS~1.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1600 -
C:\Windows\SysWOW64\igfxvsd32.exe"C:\Windows\system32\igfxvsd32.exe" C:\Windows\SysWOW64\IGFXVS~1.EXE19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2760 -
C:\Windows\SysWOW64\igfxvsd32.exe"C:\Windows\system32\igfxvsd32.exe" C:\Windows\SysWOW64\IGFXVS~1.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2780 -
C:\Windows\SysWOW64\igfxvsd32.exe"C:\Windows\system32\igfxvsd32.exe" C:\Windows\SysWOW64\IGFXVS~1.EXE21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1564 -
C:\Windows\SysWOW64\igfxvsd32.exe"C:\Windows\system32\igfxvsd32.exe" C:\Windows\SysWOW64\IGFXVS~1.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2800 -
C:\Windows\SysWOW64\igfxvsd32.exe"C:\Windows\system32\igfxvsd32.exe" C:\Windows\SysWOW64\IGFXVS~1.EXE23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2612 -
C:\Windows\SysWOW64\igfxvsd32.exe"C:\Windows\system32\igfxvsd32.exe" C:\Windows\SysWOW64\IGFXVS~1.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2300 -
C:\Windows\SysWOW64\igfxvsd32.exe"C:\Windows\system32\igfxvsd32.exe" C:\Windows\SysWOW64\IGFXVS~1.EXE25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2968 -
C:\Windows\SysWOW64\igfxvsd32.exe"C:\Windows\system32\igfxvsd32.exe" C:\Windows\SysWOW64\IGFXVS~1.EXE26⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:1128
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
220KB
MD59379e4dd4395e4d2ffb830f67b7ce372
SHA16ece4a645b5ef91b090650a9c266c219c15dc8c0
SHA256fadc8946fcdbaddfe31ab48968e84da81d9ed0f403ad49e533dafb2907b97373
SHA512e2f484d69e7189d5817706f5bc8377e081fee8a77a8c04c894131d95eb1b6c0c60c4eca84561221d06cc248a9e8c2a93dedcf750f1ea617fa2f1563d0d8be1c7