Analysis
-
max time kernel
147s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-11-2024 04:19
Static task
static1
Behavioral task
behavioral1
Sample
a5de8ee506b355479796ab5ce467db22_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a5de8ee506b355479796ab5ce467db22_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a5de8ee506b355479796ab5ce467db22_JaffaCakes118.exe
-
Size
208KB
-
MD5
a5de8ee506b355479796ab5ce467db22
-
SHA1
09fc927ed73ef48bd36d3f809a9fd378db66d743
-
SHA256
b9640548b82f669d809d1e190016c9ca882578e0cdb350f896cdb7bd07906746
-
SHA512
8f005994d0a3dac469d624434bebfcbb3613873786ef09b743ebb90fe550d092efc6cef3796b91266f098fb1934b826a1529d9a0d9da01636080cd1e4b863f70
-
SSDEEP
6144:peCNPi1xvowBaxzsJM3tmXeLdIX4NwJN:peCBi1ewBaxAJM3tZNw
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2752 igfxcf32.exe -
Executes dropped EXE 28 IoCs
pid Process 2288 igfxcf32.exe 2752 igfxcf32.exe 1680 igfxcf32.exe 2900 igfxcf32.exe 1712 igfxcf32.exe 2680 igfxcf32.exe 264 igfxcf32.exe 2336 igfxcf32.exe 2388 igfxcf32.exe 700 igfxcf32.exe 2684 igfxcf32.exe 2044 igfxcf32.exe 2464 igfxcf32.exe 3008 igfxcf32.exe 1856 igfxcf32.exe 2784 igfxcf32.exe 2288 igfxcf32.exe 2648 igfxcf32.exe 2968 igfxcf32.exe 1612 igfxcf32.exe 2276 igfxcf32.exe 1132 igfxcf32.exe 1968 igfxcf32.exe 1812 igfxcf32.exe 916 igfxcf32.exe 1916 igfxcf32.exe 2528 igfxcf32.exe 1788 igfxcf32.exe -
Loads dropped DLL 56 IoCs
pid Process 2728 a5de8ee506b355479796ab5ce467db22_JaffaCakes118.exe 2728 a5de8ee506b355479796ab5ce467db22_JaffaCakes118.exe 2288 igfxcf32.exe 2288 igfxcf32.exe 2752 igfxcf32.exe 2752 igfxcf32.exe 1680 igfxcf32.exe 1680 igfxcf32.exe 2900 igfxcf32.exe 2900 igfxcf32.exe 1712 igfxcf32.exe 1712 igfxcf32.exe 2680 igfxcf32.exe 2680 igfxcf32.exe 264 igfxcf32.exe 264 igfxcf32.exe 2336 igfxcf32.exe 2336 igfxcf32.exe 2388 igfxcf32.exe 2388 igfxcf32.exe 700 igfxcf32.exe 700 igfxcf32.exe 2684 igfxcf32.exe 2684 igfxcf32.exe 2044 igfxcf32.exe 2044 igfxcf32.exe 2464 igfxcf32.exe 2464 igfxcf32.exe 3008 igfxcf32.exe 3008 igfxcf32.exe 1856 igfxcf32.exe 1856 igfxcf32.exe 2784 igfxcf32.exe 2784 igfxcf32.exe 2288 igfxcf32.exe 2288 igfxcf32.exe 2648 igfxcf32.exe 2648 igfxcf32.exe 2968 igfxcf32.exe 2968 igfxcf32.exe 1612 igfxcf32.exe 1612 igfxcf32.exe 2276 igfxcf32.exe 2276 igfxcf32.exe 1132 igfxcf32.exe 1132 igfxcf32.exe 1968 igfxcf32.exe 1968 igfxcf32.exe 1812 igfxcf32.exe 1812 igfxcf32.exe 916 igfxcf32.exe 916 igfxcf32.exe 1916 igfxcf32.exe 1916 igfxcf32.exe 2528 igfxcf32.exe 2528 igfxcf32.exe -
Maps connected drives based on registry 3 TTPs 30 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxcf32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxcf32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum a5de8ee506b355479796ab5ce467db22_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxcf32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxcf32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxcf32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxcf32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxcf32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxcf32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 a5de8ee506b355479796ab5ce467db22_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxcf32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxcf32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxcf32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxcf32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxcf32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxcf32.exe -
Drops file in System32 directory 42 IoCs
description ioc Process File created C:\Windows\SysWOW64\igfxcf32.exe igfxcf32.exe File created C:\Windows\SysWOW64\igfxcf32.exe igfxcf32.exe File opened for modification C:\Windows\SysWOW64\igfxcf32.exe igfxcf32.exe File opened for modification C:\Windows\SysWOW64\igfxcf32.exe igfxcf32.exe File created C:\Windows\SysWOW64\igfxcf32.exe igfxcf32.exe File opened for modification C:\Windows\SysWOW64\ a5de8ee506b355479796ab5ce467db22_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxcf32.exe a5de8ee506b355479796ab5ce467db22_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxcf32.exe igfxcf32.exe File created C:\Windows\SysWOW64\igfxcf32.exe igfxcf32.exe File opened for modification C:\Windows\SysWOW64\igfxcf32.exe igfxcf32.exe File opened for modification C:\Windows\SysWOW64\igfxcf32.exe igfxcf32.exe File opened for modification C:\Windows\SysWOW64\igfxcf32.exe igfxcf32.exe File opened for modification C:\Windows\SysWOW64\ igfxcf32.exe File opened for modification C:\Windows\SysWOW64\igfxcf32.exe igfxcf32.exe File opened for modification C:\Windows\SysWOW64\igfxcf32.exe igfxcf32.exe File opened for modification C:\Windows\SysWOW64\igfxcf32.exe igfxcf32.exe File opened for modification C:\Windows\SysWOW64\igfxcf32.exe igfxcf32.exe File opened for modification C:\Windows\SysWOW64\ igfxcf32.exe File opened for modification C:\Windows\SysWOW64\ igfxcf32.exe File created C:\Windows\SysWOW64\igfxcf32.exe igfxcf32.exe File created C:\Windows\SysWOW64\igfxcf32.exe igfxcf32.exe File created C:\Windows\SysWOW64\igfxcf32.exe igfxcf32.exe File created C:\Windows\SysWOW64\igfxcf32.exe igfxcf32.exe File opened for modification C:\Windows\SysWOW64\ igfxcf32.exe File opened for modification C:\Windows\SysWOW64\ igfxcf32.exe File opened for modification C:\Windows\SysWOW64\igfxcf32.exe igfxcf32.exe File opened for modification C:\Windows\SysWOW64\igfxcf32.exe igfxcf32.exe File created C:\Windows\SysWOW64\igfxcf32.exe igfxcf32.exe File opened for modification C:\Windows\SysWOW64\ igfxcf32.exe File opened for modification C:\Windows\SysWOW64\ igfxcf32.exe File opened for modification C:\Windows\SysWOW64\ igfxcf32.exe File opened for modification C:\Windows\SysWOW64\ igfxcf32.exe File created C:\Windows\SysWOW64\igfxcf32.exe igfxcf32.exe File opened for modification C:\Windows\SysWOW64\ igfxcf32.exe File created C:\Windows\SysWOW64\igfxcf32.exe igfxcf32.exe File created C:\Windows\SysWOW64\igfxcf32.exe igfxcf32.exe File created C:\Windows\SysWOW64\igfxcf32.exe igfxcf32.exe File opened for modification C:\Windows\SysWOW64\igfxcf32.exe igfxcf32.exe File created C:\Windows\SysWOW64\igfxcf32.exe a5de8ee506b355479796ab5ce467db22_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxcf32.exe File opened for modification C:\Windows\SysWOW64\ igfxcf32.exe File opened for modification C:\Windows\SysWOW64\ igfxcf32.exe -
Suspicious use of SetThreadContext 15 IoCs
description pid Process procid_target PID 1956 set thread context of 2728 1956 a5de8ee506b355479796ab5ce467db22_JaffaCakes118.exe 30 PID 2288 set thread context of 2752 2288 igfxcf32.exe 32 PID 1680 set thread context of 2900 1680 igfxcf32.exe 34 PID 1712 set thread context of 2680 1712 igfxcf32.exe 36 PID 264 set thread context of 2336 264 igfxcf32.exe 38 PID 2388 set thread context of 700 2388 igfxcf32.exe 40 PID 2684 set thread context of 2044 2684 igfxcf32.exe 42 PID 2464 set thread context of 3008 2464 igfxcf32.exe 45 PID 1856 set thread context of 2784 1856 igfxcf32.exe 47 PID 2288 set thread context of 2648 2288 igfxcf32.exe 49 PID 2968 set thread context of 1612 2968 igfxcf32.exe 51 PID 2276 set thread context of 1132 2276 igfxcf32.exe 53 PID 1968 set thread context of 1812 1968 igfxcf32.exe 55 PID 916 set thread context of 1916 916 igfxcf32.exe 57 PID 2528 set thread context of 1788 2528 igfxcf32.exe 59 -
resource yara_rule behavioral1/memory/2728-11-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2728-7-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2728-6-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2728-3-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2728-14-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2728-13-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2728-12-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2728-25-0x0000000003110000-0x000000000314B000-memory.dmp upx behavioral1/memory/2728-24-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2728-30-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2752-46-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2752-45-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2752-44-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2752-43-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2752-47-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2752-55-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2900-71-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2900-69-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2900-68-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2900-76-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2900-80-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2680-95-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2680-92-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2680-93-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2680-99-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2680-103-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2336-117-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2336-122-0x0000000003190000-0x00000000031CB000-memory.dmp upx behavioral1/memory/2336-120-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2336-126-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/700-140-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/700-146-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/700-150-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2044-163-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2044-168-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2044-173-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/3008-191-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/3008-198-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2784-210-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2784-213-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2784-221-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2288-231-0x0000000000230000-0x000000000026B000-memory.dmp upx behavioral1/memory/2648-239-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2648-244-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1612-255-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1612-257-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1612-261-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1132-273-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1132-276-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1812-286-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1812-288-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1812-291-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1916-300-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1916-303-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1916-306-0x0000000000400000-0x0000000000455000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 29 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a5de8ee506b355479796ab5ce467db22_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxcf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a5de8ee506b355479796ab5ce467db22_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxcf32.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 2728 a5de8ee506b355479796ab5ce467db22_JaffaCakes118.exe 2728 a5de8ee506b355479796ab5ce467db22_JaffaCakes118.exe 2752 igfxcf32.exe 2752 igfxcf32.exe 2900 igfxcf32.exe 2900 igfxcf32.exe 2680 igfxcf32.exe 2680 igfxcf32.exe 2336 igfxcf32.exe 2336 igfxcf32.exe 700 igfxcf32.exe 700 igfxcf32.exe 2044 igfxcf32.exe 2044 igfxcf32.exe 3008 igfxcf32.exe 3008 igfxcf32.exe 2784 igfxcf32.exe 2784 igfxcf32.exe 2648 igfxcf32.exe 2648 igfxcf32.exe 1612 igfxcf32.exe 1612 igfxcf32.exe 1132 igfxcf32.exe 1132 igfxcf32.exe 1812 igfxcf32.exe 1812 igfxcf32.exe 1916 igfxcf32.exe 1916 igfxcf32.exe 1788 igfxcf32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2728 1956 a5de8ee506b355479796ab5ce467db22_JaffaCakes118.exe 30 PID 1956 wrote to memory of 2728 1956 a5de8ee506b355479796ab5ce467db22_JaffaCakes118.exe 30 PID 1956 wrote to memory of 2728 1956 a5de8ee506b355479796ab5ce467db22_JaffaCakes118.exe 30 PID 1956 wrote to memory of 2728 1956 a5de8ee506b355479796ab5ce467db22_JaffaCakes118.exe 30 PID 1956 wrote to memory of 2728 1956 a5de8ee506b355479796ab5ce467db22_JaffaCakes118.exe 30 PID 1956 wrote to memory of 2728 1956 a5de8ee506b355479796ab5ce467db22_JaffaCakes118.exe 30 PID 1956 wrote to memory of 2728 1956 a5de8ee506b355479796ab5ce467db22_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2288 2728 a5de8ee506b355479796ab5ce467db22_JaffaCakes118.exe 31 PID 2728 wrote to memory of 2288 2728 a5de8ee506b355479796ab5ce467db22_JaffaCakes118.exe 31 PID 2728 wrote to memory of 2288 2728 a5de8ee506b355479796ab5ce467db22_JaffaCakes118.exe 31 PID 2728 wrote to memory of 2288 2728 a5de8ee506b355479796ab5ce467db22_JaffaCakes118.exe 31 PID 2288 wrote to memory of 2752 2288 igfxcf32.exe 32 PID 2288 wrote to memory of 2752 2288 igfxcf32.exe 32 PID 2288 wrote to memory of 2752 2288 igfxcf32.exe 32 PID 2288 wrote to memory of 2752 2288 igfxcf32.exe 32 PID 2288 wrote to memory of 2752 2288 igfxcf32.exe 32 PID 2288 wrote to memory of 2752 2288 igfxcf32.exe 32 PID 2288 wrote to memory of 2752 2288 igfxcf32.exe 32 PID 2752 wrote to memory of 1680 2752 igfxcf32.exe 33 PID 2752 wrote to memory of 1680 2752 igfxcf32.exe 33 PID 2752 wrote to memory of 1680 2752 igfxcf32.exe 33 PID 2752 wrote to memory of 1680 2752 igfxcf32.exe 33 PID 1680 wrote to memory of 2900 1680 igfxcf32.exe 34 PID 1680 wrote to memory of 2900 1680 igfxcf32.exe 34 PID 1680 wrote to memory of 2900 1680 igfxcf32.exe 34 PID 1680 wrote to memory of 2900 1680 igfxcf32.exe 34 PID 1680 wrote to memory of 2900 1680 igfxcf32.exe 34 PID 1680 wrote to memory of 2900 1680 igfxcf32.exe 34 PID 1680 wrote to memory of 2900 1680 igfxcf32.exe 34 PID 2900 wrote to memory of 1712 2900 igfxcf32.exe 35 PID 2900 wrote to memory of 1712 2900 igfxcf32.exe 35 PID 2900 wrote to memory of 1712 2900 igfxcf32.exe 35 PID 2900 wrote to memory of 1712 2900 igfxcf32.exe 35 PID 1712 wrote to memory of 2680 1712 igfxcf32.exe 36 PID 1712 wrote to memory of 2680 1712 igfxcf32.exe 36 PID 1712 wrote to memory of 2680 1712 igfxcf32.exe 36 PID 1712 wrote to memory of 2680 1712 igfxcf32.exe 36 PID 1712 wrote to memory of 2680 1712 igfxcf32.exe 36 PID 1712 wrote to memory of 2680 1712 igfxcf32.exe 36 PID 1712 wrote to memory of 2680 1712 igfxcf32.exe 36 PID 2680 wrote to memory of 264 2680 igfxcf32.exe 37 PID 2680 wrote to memory of 264 2680 igfxcf32.exe 37 PID 2680 wrote to memory of 264 2680 igfxcf32.exe 37 PID 2680 wrote to memory of 264 2680 igfxcf32.exe 37 PID 264 wrote to memory of 2336 264 igfxcf32.exe 38 PID 264 wrote to memory of 2336 264 igfxcf32.exe 38 PID 264 wrote to memory of 2336 264 igfxcf32.exe 38 PID 264 wrote to memory of 2336 264 igfxcf32.exe 38 PID 264 wrote to memory of 2336 264 igfxcf32.exe 38 PID 264 wrote to memory of 2336 264 igfxcf32.exe 38 PID 264 wrote to memory of 2336 264 igfxcf32.exe 38 PID 2336 wrote to memory of 2388 2336 igfxcf32.exe 39 PID 2336 wrote to memory of 2388 2336 igfxcf32.exe 39 PID 2336 wrote to memory of 2388 2336 igfxcf32.exe 39 PID 2336 wrote to memory of 2388 2336 igfxcf32.exe 39 PID 2388 wrote to memory of 700 2388 igfxcf32.exe 40 PID 2388 wrote to memory of 700 2388 igfxcf32.exe 40 PID 2388 wrote to memory of 700 2388 igfxcf32.exe 40 PID 2388 wrote to memory of 700 2388 igfxcf32.exe 40 PID 2388 wrote to memory of 700 2388 igfxcf32.exe 40 PID 2388 wrote to memory of 700 2388 igfxcf32.exe 40 PID 2388 wrote to memory of 700 2388 igfxcf32.exe 40 PID 700 wrote to memory of 2684 700 igfxcf32.exe 41 PID 700 wrote to memory of 2684 700 igfxcf32.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5de8ee506b355479796ab5ce467db22_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5de8ee506b355479796ab5ce467db22_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\a5de8ee506b355479796ab5ce467db22_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5de8ee506b355479796ab5ce467db22_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\igfxcf32.exe"C:\Windows\system32\igfxcf32.exe" C:\Users\Admin\AppData\Local\Temp\A5DE8E~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\igfxcf32.exe"C:\Windows\system32\igfxcf32.exe" C:\Users\Admin\AppData\Local\Temp\A5DE8E~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\igfxcf32.exe"C:\Windows\system32\igfxcf32.exe" C:\Windows\SysWOW64\igfxcf32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\igfxcf32.exe"C:\Windows\system32\igfxcf32.exe" C:\Windows\SysWOW64\igfxcf32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\igfxcf32.exe"C:\Windows\system32\igfxcf32.exe" C:\Windows\SysWOW64\igfxcf32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\igfxcf32.exe"C:\Windows\system32\igfxcf32.exe" C:\Windows\SysWOW64\igfxcf32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\igfxcf32.exe"C:\Windows\system32\igfxcf32.exe" C:\Windows\SysWOW64\igfxcf32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Windows\SysWOW64\igfxcf32.exe"C:\Windows\system32\igfxcf32.exe" C:\Windows\SysWOW64\igfxcf32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\igfxcf32.exe"C:\Windows\system32\igfxcf32.exe" C:\Windows\SysWOW64\igfxcf32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\igfxcf32.exe"C:\Windows\system32\igfxcf32.exe" C:\Windows\SysWOW64\igfxcf32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Windows\SysWOW64\igfxcf32.exe"C:\Windows\system32\igfxcf32.exe" C:\Windows\SysWOW64\igfxcf32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2684 -
C:\Windows\SysWOW64\igfxcf32.exe"C:\Windows\system32\igfxcf32.exe" C:\Windows\SysWOW64\igfxcf32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2044 -
C:\Windows\SysWOW64\igfxcf32.exe"C:\Windows\system32\igfxcf32.exe" C:\Windows\SysWOW64\igfxcf32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2464 -
C:\Windows\SysWOW64\igfxcf32.exe"C:\Windows\system32\igfxcf32.exe" C:\Windows\SysWOW64\igfxcf32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3008 -
C:\Windows\SysWOW64\igfxcf32.exe"C:\Windows\system32\igfxcf32.exe" C:\Windows\SysWOW64\igfxcf32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1856 -
C:\Windows\SysWOW64\igfxcf32.exe"C:\Windows\system32\igfxcf32.exe" C:\Windows\SysWOW64\igfxcf32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2784 -
C:\Windows\SysWOW64\igfxcf32.exe"C:\Windows\system32\igfxcf32.exe" C:\Windows\SysWOW64\igfxcf32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2288 -
C:\Windows\SysWOW64\igfxcf32.exe"C:\Windows\system32\igfxcf32.exe" C:\Windows\SysWOW64\igfxcf32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2648 -
C:\Windows\SysWOW64\igfxcf32.exe"C:\Windows\system32\igfxcf32.exe" C:\Windows\SysWOW64\igfxcf32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2968 -
C:\Windows\SysWOW64\igfxcf32.exe"C:\Windows\system32\igfxcf32.exe" C:\Windows\SysWOW64\igfxcf32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1612 -
C:\Windows\SysWOW64\igfxcf32.exe"C:\Windows\system32\igfxcf32.exe" C:\Windows\SysWOW64\igfxcf32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2276 -
C:\Windows\SysWOW64\igfxcf32.exe"C:\Windows\system32\igfxcf32.exe" C:\Windows\SysWOW64\igfxcf32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1132 -
C:\Windows\SysWOW64\igfxcf32.exe"C:\Windows\system32\igfxcf32.exe" C:\Windows\SysWOW64\igfxcf32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1968 -
C:\Windows\SysWOW64\igfxcf32.exe"C:\Windows\system32\igfxcf32.exe" C:\Windows\SysWOW64\igfxcf32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1812 -
C:\Windows\SysWOW64\igfxcf32.exe"C:\Windows\system32\igfxcf32.exe" C:\Windows\SysWOW64\igfxcf32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:916 -
C:\Windows\SysWOW64\igfxcf32.exe"C:\Windows\system32\igfxcf32.exe" C:\Windows\SysWOW64\igfxcf32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1916 -
C:\Windows\SysWOW64\igfxcf32.exe"C:\Windows\system32\igfxcf32.exe" C:\Windows\SysWOW64\igfxcf32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2528 -
C:\Windows\SysWOW64\igfxcf32.exe"C:\Windows\system32\igfxcf32.exe" C:\Windows\SysWOW64\igfxcf32.exe30⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:1788
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208KB
MD5a5de8ee506b355479796ab5ce467db22
SHA109fc927ed73ef48bd36d3f809a9fd378db66d743
SHA256b9640548b82f669d809d1e190016c9ca882578e0cdb350f896cdb7bd07906746
SHA5128f005994d0a3dac469d624434bebfcbb3613873786ef09b743ebb90fe550d092efc6cef3796b91266f098fb1934b826a1529d9a0d9da01636080cd1e4b863f70