Analysis
-
max time kernel
143s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 23:23
Static task
static1
Behavioral task
behavioral1
Sample
b4026bdd4f6ac3acaaa25586d841754b_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
b4026bdd4f6ac3acaaa25586d841754b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
b4026bdd4f6ac3acaaa25586d841754b_JaffaCakes118.exe
-
Size
174KB
-
MD5
b4026bdd4f6ac3acaaa25586d841754b
-
SHA1
2f4582c027227db8577daaf5fcbf2e62773bd06c
-
SHA256
8a5716a47e0214114cb439151f84b6202906b8141468d7f81de88801ed308428
-
SHA512
06a41752df04ffebf5f06b158bfc9b02a8ee56e5eb789e2b9cfaa8274e7e4c18e2b0de254e15ab2de3ae98d174f5efbae0e2d2519e370ac42a115903f0d9910f
-
SSDEEP
3072:w6V2H12f5grMRaHfci2uM+hDUcTLb2YLh8rkscx:WH1xf6E/nDsW
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 15 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxwd32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxwd32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxwd32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxwd32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxwd32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxwd32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxwd32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxwd32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation b4026bdd4f6ac3acaaa25586d841754b_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxwd32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxwd32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxwd32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxwd32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxwd32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation igfxwd32.exe -
Deletes itself 1 IoCs
pid Process 4036 igfxwd32.exe -
Executes dropped EXE 29 IoCs
pid Process 1228 igfxwd32.exe 4036 igfxwd32.exe 3520 igfxwd32.exe 3200 igfxwd32.exe 2944 igfxwd32.exe 3248 igfxwd32.exe 5092 igfxwd32.exe 1480 igfxwd32.exe 2852 igfxwd32.exe 628 igfxwd32.exe 3240 igfxwd32.exe 2244 igfxwd32.exe 592 igfxwd32.exe 2100 igfxwd32.exe 2804 igfxwd32.exe 4932 igfxwd32.exe 1764 igfxwd32.exe 5068 igfxwd32.exe 2180 igfxwd32.exe 1200 igfxwd32.exe 3420 igfxwd32.exe 3336 igfxwd32.exe 212 igfxwd32.exe 4144 igfxwd32.exe 1648 igfxwd32.exe 3624 igfxwd32.exe 3616 igfxwd32.exe 4516 igfxwd32.exe 5092 igfxwd32.exe -
Maps connected drives based on registry 3 TTPs 30 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum b4026bdd4f6ac3acaaa25586d841754b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 b4026bdd4f6ac3acaaa25586d841754b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwd32.exe -
Drops file in System32 directory 45 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe b4026bdd4f6ac3acaaa25586d841754b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File created C:\Windows\SysWOW64\igfxwd32.exe igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe File opened for modification C:\Windows\SysWOW64\ b4026bdd4f6ac3acaaa25586d841754b_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxwd32.exe b4026bdd4f6ac3acaaa25586d841754b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxwd32.exe -
Suspicious use of SetThreadContext 15 IoCs
description pid Process procid_target PID 1640 set thread context of 1248 1640 b4026bdd4f6ac3acaaa25586d841754b_JaffaCakes118.exe 84 PID 1228 set thread context of 4036 1228 igfxwd32.exe 97 PID 3520 set thread context of 3200 3520 igfxwd32.exe 99 PID 2944 set thread context of 3248 2944 igfxwd32.exe 104 PID 5092 set thread context of 1480 5092 igfxwd32.exe 106 PID 2852 set thread context of 628 2852 igfxwd32.exe 108 PID 3240 set thread context of 2244 3240 igfxwd32.exe 110 PID 592 set thread context of 2100 592 igfxwd32.exe 112 PID 2804 set thread context of 4932 2804 igfxwd32.exe 114 PID 1764 set thread context of 5068 1764 igfxwd32.exe 116 PID 2180 set thread context of 1200 2180 igfxwd32.exe 118 PID 3420 set thread context of 3336 3420 igfxwd32.exe 120 PID 212 set thread context of 4144 212 igfxwd32.exe 122 PID 1648 set thread context of 3624 1648 igfxwd32.exe 124 PID 3616 set thread context of 4516 3616 igfxwd32.exe 126 -
resource yara_rule behavioral2/memory/1248-0-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1248-2-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1248-3-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1248-4-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1248-38-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4036-43-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4036-44-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4036-45-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4036-47-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3200-55-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3248-62-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1480-69-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/628-76-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2244-83-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2100-90-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4932-97-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/5068-103-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1200-111-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3336-117-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4144-127-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3624-135-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4516-144-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 30 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4026bdd4f6ac3acaaa25586d841754b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4026bdd4f6ac3acaaa25586d841754b_JaffaCakes118.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ b4026bdd4f6ac3acaaa25586d841754b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwd32.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 1248 b4026bdd4f6ac3acaaa25586d841754b_JaffaCakes118.exe 1248 b4026bdd4f6ac3acaaa25586d841754b_JaffaCakes118.exe 1248 b4026bdd4f6ac3acaaa25586d841754b_JaffaCakes118.exe 1248 b4026bdd4f6ac3acaaa25586d841754b_JaffaCakes118.exe 4036 igfxwd32.exe 4036 igfxwd32.exe 4036 igfxwd32.exe 4036 igfxwd32.exe 3200 igfxwd32.exe 3200 igfxwd32.exe 3200 igfxwd32.exe 3200 igfxwd32.exe 3248 igfxwd32.exe 3248 igfxwd32.exe 3248 igfxwd32.exe 3248 igfxwd32.exe 1480 igfxwd32.exe 1480 igfxwd32.exe 1480 igfxwd32.exe 1480 igfxwd32.exe 628 igfxwd32.exe 628 igfxwd32.exe 628 igfxwd32.exe 628 igfxwd32.exe 2244 igfxwd32.exe 2244 igfxwd32.exe 2244 igfxwd32.exe 2244 igfxwd32.exe 2100 igfxwd32.exe 2100 igfxwd32.exe 2100 igfxwd32.exe 2100 igfxwd32.exe 4932 igfxwd32.exe 4932 igfxwd32.exe 4932 igfxwd32.exe 4932 igfxwd32.exe 5068 igfxwd32.exe 5068 igfxwd32.exe 5068 igfxwd32.exe 5068 igfxwd32.exe 1200 igfxwd32.exe 1200 igfxwd32.exe 1200 igfxwd32.exe 1200 igfxwd32.exe 3336 igfxwd32.exe 3336 igfxwd32.exe 3336 igfxwd32.exe 3336 igfxwd32.exe 4144 igfxwd32.exe 4144 igfxwd32.exe 4144 igfxwd32.exe 4144 igfxwd32.exe 3624 igfxwd32.exe 3624 igfxwd32.exe 3624 igfxwd32.exe 3624 igfxwd32.exe 4516 igfxwd32.exe 4516 igfxwd32.exe 4516 igfxwd32.exe 4516 igfxwd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1640 wrote to memory of 1248 1640 b4026bdd4f6ac3acaaa25586d841754b_JaffaCakes118.exe 84 PID 1640 wrote to memory of 1248 1640 b4026bdd4f6ac3acaaa25586d841754b_JaffaCakes118.exe 84 PID 1640 wrote to memory of 1248 1640 b4026bdd4f6ac3acaaa25586d841754b_JaffaCakes118.exe 84 PID 1640 wrote to memory of 1248 1640 b4026bdd4f6ac3acaaa25586d841754b_JaffaCakes118.exe 84 PID 1640 wrote to memory of 1248 1640 b4026bdd4f6ac3acaaa25586d841754b_JaffaCakes118.exe 84 PID 1640 wrote to memory of 1248 1640 b4026bdd4f6ac3acaaa25586d841754b_JaffaCakes118.exe 84 PID 1640 wrote to memory of 1248 1640 b4026bdd4f6ac3acaaa25586d841754b_JaffaCakes118.exe 84 PID 1248 wrote to memory of 1228 1248 b4026bdd4f6ac3acaaa25586d841754b_JaffaCakes118.exe 87 PID 1248 wrote to memory of 1228 1248 b4026bdd4f6ac3acaaa25586d841754b_JaffaCakes118.exe 87 PID 1248 wrote to memory of 1228 1248 b4026bdd4f6ac3acaaa25586d841754b_JaffaCakes118.exe 87 PID 1228 wrote to memory of 4036 1228 igfxwd32.exe 97 PID 1228 wrote to memory of 4036 1228 igfxwd32.exe 97 PID 1228 wrote to memory of 4036 1228 igfxwd32.exe 97 PID 1228 wrote to memory of 4036 1228 igfxwd32.exe 97 PID 1228 wrote to memory of 4036 1228 igfxwd32.exe 97 PID 1228 wrote to memory of 4036 1228 igfxwd32.exe 97 PID 1228 wrote to memory of 4036 1228 igfxwd32.exe 97 PID 4036 wrote to memory of 3520 4036 igfxwd32.exe 98 PID 4036 wrote to memory of 3520 4036 igfxwd32.exe 98 PID 4036 wrote to memory of 3520 4036 igfxwd32.exe 98 PID 3520 wrote to memory of 3200 3520 igfxwd32.exe 99 PID 3520 wrote to memory of 3200 3520 igfxwd32.exe 99 PID 3520 wrote to memory of 3200 3520 igfxwd32.exe 99 PID 3520 wrote to memory of 3200 3520 igfxwd32.exe 99 PID 3520 wrote to memory of 3200 3520 igfxwd32.exe 99 PID 3520 wrote to memory of 3200 3520 igfxwd32.exe 99 PID 3520 wrote to memory of 3200 3520 igfxwd32.exe 99 PID 3200 wrote to memory of 2944 3200 igfxwd32.exe 100 PID 3200 wrote to memory of 2944 3200 igfxwd32.exe 100 PID 3200 wrote to memory of 2944 3200 igfxwd32.exe 100 PID 2944 wrote to memory of 3248 2944 igfxwd32.exe 104 PID 2944 wrote to memory of 3248 2944 igfxwd32.exe 104 PID 2944 wrote to memory of 3248 2944 igfxwd32.exe 104 PID 2944 wrote to memory of 3248 2944 igfxwd32.exe 104 PID 2944 wrote to memory of 3248 2944 igfxwd32.exe 104 PID 2944 wrote to memory of 3248 2944 igfxwd32.exe 104 PID 2944 wrote to memory of 3248 2944 igfxwd32.exe 104 PID 3248 wrote to memory of 5092 3248 igfxwd32.exe 105 PID 3248 wrote to memory of 5092 3248 igfxwd32.exe 105 PID 3248 wrote to memory of 5092 3248 igfxwd32.exe 105 PID 5092 wrote to memory of 1480 5092 igfxwd32.exe 106 PID 5092 wrote to memory of 1480 5092 igfxwd32.exe 106 PID 5092 wrote to memory of 1480 5092 igfxwd32.exe 106 PID 5092 wrote to memory of 1480 5092 igfxwd32.exe 106 PID 5092 wrote to memory of 1480 5092 igfxwd32.exe 106 PID 5092 wrote to memory of 1480 5092 igfxwd32.exe 106 PID 5092 wrote to memory of 1480 5092 igfxwd32.exe 106 PID 1480 wrote to memory of 2852 1480 igfxwd32.exe 107 PID 1480 wrote to memory of 2852 1480 igfxwd32.exe 107 PID 1480 wrote to memory of 2852 1480 igfxwd32.exe 107 PID 2852 wrote to memory of 628 2852 igfxwd32.exe 108 PID 2852 wrote to memory of 628 2852 igfxwd32.exe 108 PID 2852 wrote to memory of 628 2852 igfxwd32.exe 108 PID 2852 wrote to memory of 628 2852 igfxwd32.exe 108 PID 2852 wrote to memory of 628 2852 igfxwd32.exe 108 PID 2852 wrote to memory of 628 2852 igfxwd32.exe 108 PID 2852 wrote to memory of 628 2852 igfxwd32.exe 108 PID 628 wrote to memory of 3240 628 igfxwd32.exe 109 PID 628 wrote to memory of 3240 628 igfxwd32.exe 109 PID 628 wrote to memory of 3240 628 igfxwd32.exe 109 PID 3240 wrote to memory of 2244 3240 igfxwd32.exe 110 PID 3240 wrote to memory of 2244 3240 igfxwd32.exe 110 PID 3240 wrote to memory of 2244 3240 igfxwd32.exe 110 PID 3240 wrote to memory of 2244 3240 igfxwd32.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4026bdd4f6ac3acaaa25586d841754b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b4026bdd4f6ac3acaaa25586d841754b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\b4026bdd4f6ac3acaaa25586d841754b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b4026bdd4f6ac3acaaa25586d841754b_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Users\Admin\AppData\Local\Temp\B4026B~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Users\Admin\AppData\Local\Temp\B4026B~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2244 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:592 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2100 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2804 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4932 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1764 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5068 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2180 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1200 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3420 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3336 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:212 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4144 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1648 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3624 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3616 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4516 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe31⤵
- Executes dropped EXE
PID:5092
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
174KB
MD5b4026bdd4f6ac3acaaa25586d841754b
SHA12f4582c027227db8577daaf5fcbf2e62773bd06c
SHA2568a5716a47e0214114cb439151f84b6202906b8141468d7f81de88801ed308428
SHA51206a41752df04ffebf5f06b158bfc9b02a8ee56e5eb789e2b9cfaa8274e7e4c18e2b0de254e15ab2de3ae98d174f5efbae0e2d2519e370ac42a115903f0d9910f