Analysis
-
max time kernel
148s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 06:58
Static task
static1
Behavioral task
behavioral1
Sample
a6827b8e9674e9d1c9126e6598b35b64_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a6827b8e9674e9d1c9126e6598b35b64_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a6827b8e9674e9d1c9126e6598b35b64_JaffaCakes118.exe
-
Size
212KB
-
MD5
a6827b8e9674e9d1c9126e6598b35b64
-
SHA1
66d3763f6954601959caeb0ca74e5526b41b43d4
-
SHA256
7dcf991ce532bc178b2d74465ec5ad3513473c15572a8955e4a1f737291d679d
-
SHA512
fedfe77daafc80cb7e701891cb3101dce86dd14121827d68c7f93d4daee3e5fb3d99ed0976cc3fd7055e5f2c39c1cb6bd933bdfb50e6d98b1d748f2f632a015c
-
SSDEEP
6144:1kvvmzUn7my0rVphHNAoQH1PDnbYV2Fhf:1kKImDrxHEPDbDFhf
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 14 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxwf32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxwf32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxwf32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxwf32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxwf32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxwf32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxwf32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxwf32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxwf32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxwf32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxwf32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation a6827b8e9674e9d1c9126e6598b35b64_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxwf32.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation igfxwf32.exe -
Deletes itself 1 IoCs
pid Process 4836 igfxwf32.exe -
Executes dropped EXE 27 IoCs
pid Process 228 igfxwf32.exe 4836 igfxwf32.exe 2720 igfxwf32.exe 3728 igfxwf32.exe 1272 igfxwf32.exe 4064 igfxwf32.exe 4048 igfxwf32.exe 3588 igfxwf32.exe 972 igfxwf32.exe 2148 igfxwf32.exe 4368 igfxwf32.exe 4152 igfxwf32.exe 1448 igfxwf32.exe 3076 igfxwf32.exe 4848 igfxwf32.exe 3192 igfxwf32.exe 3460 igfxwf32.exe 4180 igfxwf32.exe 4320 igfxwf32.exe 2944 igfxwf32.exe 5064 igfxwf32.exe 4512 igfxwf32.exe 4928 igfxwf32.exe 3104 igfxwf32.exe 1076 igfxwf32.exe 2908 igfxwf32.exe 1480 igfxwf32.exe -
Maps connected drives based on registry 3 TTPs 28 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwf32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwf32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum a6827b8e9674e9d1c9126e6598b35b64_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwf32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwf32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwf32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwf32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwf32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwf32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwf32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 a6827b8e9674e9d1c9126e6598b35b64_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwf32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwf32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwf32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwf32.exe -
Drops file in System32 directory 42 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxwf32.exe igfxwf32.exe File created C:\Windows\SysWOW64\igfxwf32.exe igfxwf32.exe File opened for modification C:\Windows\SysWOW64\ igfxwf32.exe File opened for modification C:\Windows\SysWOW64\ igfxwf32.exe File created C:\Windows\SysWOW64\igfxwf32.exe a6827b8e9674e9d1c9126e6598b35b64_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxwf32.exe File opened for modification C:\Windows\SysWOW64\igfxwf32.exe a6827b8e9674e9d1c9126e6598b35b64_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxwf32.exe igfxwf32.exe File opened for modification C:\Windows\SysWOW64\igfxwf32.exe igfxwf32.exe File opened for modification C:\Windows\SysWOW64\ igfxwf32.exe File opened for modification C:\Windows\SysWOW64\ igfxwf32.exe File opened for modification C:\Windows\SysWOW64\igfxwf32.exe igfxwf32.exe File opened for modification C:\Windows\SysWOW64\ igfxwf32.exe File opened for modification C:\Windows\SysWOW64\ a6827b8e9674e9d1c9126e6598b35b64_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxwf32.exe igfxwf32.exe File opened for modification C:\Windows\SysWOW64\igfxwf32.exe igfxwf32.exe File created C:\Windows\SysWOW64\igfxwf32.exe igfxwf32.exe File created C:\Windows\SysWOW64\igfxwf32.exe igfxwf32.exe File opened for modification C:\Windows\SysWOW64\igfxwf32.exe igfxwf32.exe File created C:\Windows\SysWOW64\igfxwf32.exe igfxwf32.exe File opened for modification C:\Windows\SysWOW64\ igfxwf32.exe File created C:\Windows\SysWOW64\igfxwf32.exe igfxwf32.exe File opened for modification C:\Windows\SysWOW64\igfxwf32.exe igfxwf32.exe File created C:\Windows\SysWOW64\igfxwf32.exe igfxwf32.exe File opened for modification C:\Windows\SysWOW64\igfxwf32.exe igfxwf32.exe File created C:\Windows\SysWOW64\igfxwf32.exe igfxwf32.exe File opened for modification C:\Windows\SysWOW64\igfxwf32.exe igfxwf32.exe File created C:\Windows\SysWOW64\igfxwf32.exe igfxwf32.exe File opened for modification C:\Windows\SysWOW64\igfxwf32.exe igfxwf32.exe File opened for modification C:\Windows\SysWOW64\igfxwf32.exe igfxwf32.exe File opened for modification C:\Windows\SysWOW64\ igfxwf32.exe File opened for modification C:\Windows\SysWOW64\ igfxwf32.exe File opened for modification C:\Windows\SysWOW64\ igfxwf32.exe File opened for modification C:\Windows\SysWOW64\igfxwf32.exe igfxwf32.exe File opened for modification C:\Windows\SysWOW64\ igfxwf32.exe File opened for modification C:\Windows\SysWOW64\igfxwf32.exe igfxwf32.exe File opened for modification C:\Windows\SysWOW64\ igfxwf32.exe File created C:\Windows\SysWOW64\igfxwf32.exe igfxwf32.exe File opened for modification C:\Windows\SysWOW64\ igfxwf32.exe File opened for modification C:\Windows\SysWOW64\igfxwf32.exe igfxwf32.exe File created C:\Windows\SysWOW64\igfxwf32.exe igfxwf32.exe File created C:\Windows\SysWOW64\igfxwf32.exe igfxwf32.exe -
Suspicious use of SetThreadContext 14 IoCs
description pid Process procid_target PID 4988 set thread context of 5020 4988 a6827b8e9674e9d1c9126e6598b35b64_JaffaCakes118.exe 92 PID 228 set thread context of 4836 228 igfxwf32.exe 98 PID 2720 set thread context of 3728 2720 igfxwf32.exe 102 PID 1272 set thread context of 4064 1272 igfxwf32.exe 105 PID 4048 set thread context of 3588 4048 igfxwf32.exe 107 PID 972 set thread context of 2148 972 igfxwf32.exe 109 PID 4368 set thread context of 4152 4368 igfxwf32.exe 111 PID 1448 set thread context of 3076 1448 igfxwf32.exe 113 PID 4848 set thread context of 3192 4848 igfxwf32.exe 115 PID 3460 set thread context of 4180 3460 igfxwf32.exe 117 PID 4320 set thread context of 2944 4320 igfxwf32.exe 119 PID 5064 set thread context of 4512 5064 igfxwf32.exe 121 PID 4928 set thread context of 3104 4928 igfxwf32.exe 123 PID 1076 set thread context of 2908 1076 igfxwf32.exe 125 -
resource yara_rule behavioral2/memory/5020-0-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/5020-2-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/5020-3-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/5020-4-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/5020-38-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4836-45-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4836-46-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3728-54-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4064-61-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3588-69-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2148-76-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4152-83-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3076-90-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3192-97-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4180-105-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2944-112-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4512-118-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3104-128-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2908-136-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 28 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6827b8e9674e9d1c9126e6598b35b64_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6827b8e9674e9d1c9126e6598b35b64_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwf32.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ a6827b8e9674e9d1c9126e6598b35b64_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwf32.exe -
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 5020 a6827b8e9674e9d1c9126e6598b35b64_JaffaCakes118.exe 5020 a6827b8e9674e9d1c9126e6598b35b64_JaffaCakes118.exe 5020 a6827b8e9674e9d1c9126e6598b35b64_JaffaCakes118.exe 5020 a6827b8e9674e9d1c9126e6598b35b64_JaffaCakes118.exe 4836 igfxwf32.exe 4836 igfxwf32.exe 4836 igfxwf32.exe 4836 igfxwf32.exe 3728 igfxwf32.exe 3728 igfxwf32.exe 3728 igfxwf32.exe 3728 igfxwf32.exe 4064 igfxwf32.exe 4064 igfxwf32.exe 4064 igfxwf32.exe 4064 igfxwf32.exe 3588 igfxwf32.exe 3588 igfxwf32.exe 3588 igfxwf32.exe 3588 igfxwf32.exe 2148 igfxwf32.exe 2148 igfxwf32.exe 2148 igfxwf32.exe 2148 igfxwf32.exe 4152 igfxwf32.exe 4152 igfxwf32.exe 4152 igfxwf32.exe 4152 igfxwf32.exe 3076 igfxwf32.exe 3076 igfxwf32.exe 3076 igfxwf32.exe 3076 igfxwf32.exe 3192 igfxwf32.exe 3192 igfxwf32.exe 3192 igfxwf32.exe 3192 igfxwf32.exe 4180 igfxwf32.exe 4180 igfxwf32.exe 4180 igfxwf32.exe 4180 igfxwf32.exe 2944 igfxwf32.exe 2944 igfxwf32.exe 2944 igfxwf32.exe 2944 igfxwf32.exe 4512 igfxwf32.exe 4512 igfxwf32.exe 4512 igfxwf32.exe 4512 igfxwf32.exe 3104 igfxwf32.exe 3104 igfxwf32.exe 3104 igfxwf32.exe 3104 igfxwf32.exe 2908 igfxwf32.exe 2908 igfxwf32.exe 2908 igfxwf32.exe 2908 igfxwf32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4988 wrote to memory of 5020 4988 a6827b8e9674e9d1c9126e6598b35b64_JaffaCakes118.exe 92 PID 4988 wrote to memory of 5020 4988 a6827b8e9674e9d1c9126e6598b35b64_JaffaCakes118.exe 92 PID 4988 wrote to memory of 5020 4988 a6827b8e9674e9d1c9126e6598b35b64_JaffaCakes118.exe 92 PID 4988 wrote to memory of 5020 4988 a6827b8e9674e9d1c9126e6598b35b64_JaffaCakes118.exe 92 PID 4988 wrote to memory of 5020 4988 a6827b8e9674e9d1c9126e6598b35b64_JaffaCakes118.exe 92 PID 4988 wrote to memory of 5020 4988 a6827b8e9674e9d1c9126e6598b35b64_JaffaCakes118.exe 92 PID 4988 wrote to memory of 5020 4988 a6827b8e9674e9d1c9126e6598b35b64_JaffaCakes118.exe 92 PID 5020 wrote to memory of 228 5020 a6827b8e9674e9d1c9126e6598b35b64_JaffaCakes118.exe 97 PID 5020 wrote to memory of 228 5020 a6827b8e9674e9d1c9126e6598b35b64_JaffaCakes118.exe 97 PID 5020 wrote to memory of 228 5020 a6827b8e9674e9d1c9126e6598b35b64_JaffaCakes118.exe 97 PID 228 wrote to memory of 4836 228 igfxwf32.exe 98 PID 228 wrote to memory of 4836 228 igfxwf32.exe 98 PID 228 wrote to memory of 4836 228 igfxwf32.exe 98 PID 228 wrote to memory of 4836 228 igfxwf32.exe 98 PID 228 wrote to memory of 4836 228 igfxwf32.exe 98 PID 228 wrote to memory of 4836 228 igfxwf32.exe 98 PID 228 wrote to memory of 4836 228 igfxwf32.exe 98 PID 4836 wrote to memory of 2720 4836 igfxwf32.exe 99 PID 4836 wrote to memory of 2720 4836 igfxwf32.exe 99 PID 4836 wrote to memory of 2720 4836 igfxwf32.exe 99 PID 2720 wrote to memory of 3728 2720 igfxwf32.exe 102 PID 2720 wrote to memory of 3728 2720 igfxwf32.exe 102 PID 2720 wrote to memory of 3728 2720 igfxwf32.exe 102 PID 2720 wrote to memory of 3728 2720 igfxwf32.exe 102 PID 2720 wrote to memory of 3728 2720 igfxwf32.exe 102 PID 2720 wrote to memory of 3728 2720 igfxwf32.exe 102 PID 2720 wrote to memory of 3728 2720 igfxwf32.exe 102 PID 3728 wrote to memory of 1272 3728 igfxwf32.exe 104 PID 3728 wrote to memory of 1272 3728 igfxwf32.exe 104 PID 3728 wrote to memory of 1272 3728 igfxwf32.exe 104 PID 1272 wrote to memory of 4064 1272 igfxwf32.exe 105 PID 1272 wrote to memory of 4064 1272 igfxwf32.exe 105 PID 1272 wrote to memory of 4064 1272 igfxwf32.exe 105 PID 1272 wrote to memory of 4064 1272 igfxwf32.exe 105 PID 1272 wrote to memory of 4064 1272 igfxwf32.exe 105 PID 1272 wrote to memory of 4064 1272 igfxwf32.exe 105 PID 1272 wrote to memory of 4064 1272 igfxwf32.exe 105 PID 4064 wrote to memory of 4048 4064 igfxwf32.exe 106 PID 4064 wrote to memory of 4048 4064 igfxwf32.exe 106 PID 4064 wrote to memory of 4048 4064 igfxwf32.exe 106 PID 4048 wrote to memory of 3588 4048 igfxwf32.exe 107 PID 4048 wrote to memory of 3588 4048 igfxwf32.exe 107 PID 4048 wrote to memory of 3588 4048 igfxwf32.exe 107 PID 4048 wrote to memory of 3588 4048 igfxwf32.exe 107 PID 4048 wrote to memory of 3588 4048 igfxwf32.exe 107 PID 4048 wrote to memory of 3588 4048 igfxwf32.exe 107 PID 4048 wrote to memory of 3588 4048 igfxwf32.exe 107 PID 3588 wrote to memory of 972 3588 igfxwf32.exe 108 PID 3588 wrote to memory of 972 3588 igfxwf32.exe 108 PID 3588 wrote to memory of 972 3588 igfxwf32.exe 108 PID 972 wrote to memory of 2148 972 igfxwf32.exe 109 PID 972 wrote to memory of 2148 972 igfxwf32.exe 109 PID 972 wrote to memory of 2148 972 igfxwf32.exe 109 PID 972 wrote to memory of 2148 972 igfxwf32.exe 109 PID 972 wrote to memory of 2148 972 igfxwf32.exe 109 PID 972 wrote to memory of 2148 972 igfxwf32.exe 109 PID 972 wrote to memory of 2148 972 igfxwf32.exe 109 PID 2148 wrote to memory of 4368 2148 igfxwf32.exe 110 PID 2148 wrote to memory of 4368 2148 igfxwf32.exe 110 PID 2148 wrote to memory of 4368 2148 igfxwf32.exe 110 PID 4368 wrote to memory of 4152 4368 igfxwf32.exe 111 PID 4368 wrote to memory of 4152 4368 igfxwf32.exe 111 PID 4368 wrote to memory of 4152 4368 igfxwf32.exe 111 PID 4368 wrote to memory of 4152 4368 igfxwf32.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6827b8e9674e9d1c9126e6598b35b64_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a6827b8e9674e9d1c9126e6598b35b64_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\a6827b8e9674e9d1c9126e6598b35b64_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a6827b8e9674e9d1c9126e6598b35b64_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\igfxwf32.exe"C:\Windows\system32\igfxwf32.exe" C:\Users\Admin\AppData\Local\Temp\A6827B~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SysWOW64\igfxwf32.exe"C:\Windows\system32\igfxwf32.exe" C:\Users\Admin\AppData\Local\Temp\A6827B~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\SysWOW64\igfxwf32.exe"C:\Windows\system32\igfxwf32.exe" C:\Windows\SysWOW64\igfxwf32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\igfxwf32.exe"C:\Windows\system32\igfxwf32.exe" C:\Windows\SysWOW64\igfxwf32.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\SysWOW64\igfxwf32.exe"C:\Windows\system32\igfxwf32.exe" C:\Windows\SysWOW64\igfxwf32.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\igfxwf32.exe"C:\Windows\system32\igfxwf32.exe" C:\Windows\SysWOW64\igfxwf32.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\SysWOW64\igfxwf32.exe"C:\Windows\system32\igfxwf32.exe" C:\Windows\SysWOW64\igfxwf32.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Windows\SysWOW64\igfxwf32.exe"C:\Windows\system32\igfxwf32.exe" C:\Windows\SysWOW64\igfxwf32.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\SysWOW64\igfxwf32.exe"C:\Windows\system32\igfxwf32.exe" C:\Windows\SysWOW64\igfxwf32.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\SysWOW64\igfxwf32.exe"C:\Windows\system32\igfxwf32.exe" C:\Windows\SysWOW64\igfxwf32.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\igfxwf32.exe"C:\Windows\system32\igfxwf32.exe" C:\Windows\SysWOW64\igfxwf32.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\SysWOW64\igfxwf32.exe"C:\Windows\system32\igfxwf32.exe" C:\Windows\SysWOW64\igfxwf32.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4152 -
C:\Windows\SysWOW64\igfxwf32.exe"C:\Windows\system32\igfxwf32.exe" C:\Windows\SysWOW64\igfxwf32.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1448 -
C:\Windows\SysWOW64\igfxwf32.exe"C:\Windows\system32\igfxwf32.exe" C:\Windows\SysWOW64\igfxwf32.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3076 -
C:\Windows\SysWOW64\igfxwf32.exe"C:\Windows\system32\igfxwf32.exe" C:\Windows\SysWOW64\igfxwf32.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4848 -
C:\Windows\SysWOW64\igfxwf32.exe"C:\Windows\system32\igfxwf32.exe" C:\Windows\SysWOW64\igfxwf32.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3192 -
C:\Windows\SysWOW64\igfxwf32.exe"C:\Windows\system32\igfxwf32.exe" C:\Windows\SysWOW64\igfxwf32.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3460 -
C:\Windows\SysWOW64\igfxwf32.exe"C:\Windows\system32\igfxwf32.exe" C:\Windows\SysWOW64\igfxwf32.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4180 -
C:\Windows\SysWOW64\igfxwf32.exe"C:\Windows\system32\igfxwf32.exe" C:\Windows\SysWOW64\igfxwf32.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4320 -
C:\Windows\SysWOW64\igfxwf32.exe"C:\Windows\system32\igfxwf32.exe" C:\Windows\SysWOW64\igfxwf32.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2944 -
C:\Windows\SysWOW64\igfxwf32.exe"C:\Windows\system32\igfxwf32.exe" C:\Windows\SysWOW64\igfxwf32.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5064 -
C:\Windows\SysWOW64\igfxwf32.exe"C:\Windows\system32\igfxwf32.exe" C:\Windows\SysWOW64\igfxwf32.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4512 -
C:\Windows\SysWOW64\igfxwf32.exe"C:\Windows\system32\igfxwf32.exe" C:\Windows\SysWOW64\igfxwf32.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4928 -
C:\Windows\SysWOW64\igfxwf32.exe"C:\Windows\system32\igfxwf32.exe" C:\Windows\SysWOW64\igfxwf32.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3104 -
C:\Windows\SysWOW64\igfxwf32.exe"C:\Windows\system32\igfxwf32.exe" C:\Windows\SysWOW64\igfxwf32.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1076 -
C:\Windows\SysWOW64\igfxwf32.exe"C:\Windows\system32\igfxwf32.exe" C:\Windows\SysWOW64\igfxwf32.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2908 -
C:\Windows\SysWOW64\igfxwf32.exe"C:\Windows\system32\igfxwf32.exe" C:\Windows\SysWOW64\igfxwf32.exe29⤵
- Executes dropped EXE
PID:1480
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD5a6827b8e9674e9d1c9126e6598b35b64
SHA166d3763f6954601959caeb0ca74e5526b41b43d4
SHA2567dcf991ce532bc178b2d74465ec5ad3513473c15572a8955e4a1f737291d679d
SHA512fedfe77daafc80cb7e701891cb3101dce86dd14121827d68c7f93d4daee3e5fb3d99ed0976cc3fd7055e5f2c39c1cb6bd933bdfb50e6d98b1d748f2f632a015c