Analysis
-
max time kernel
148s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 03:37
Static task
static1
Behavioral task
behavioral1
Sample
aea5c46775cf3f83e4e59c834e0a0e75_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
aea5c46775cf3f83e4e59c834e0a0e75_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
aea5c46775cf3f83e4e59c834e0a0e75_JaffaCakes118.exe
-
Size
168KB
-
MD5
aea5c46775cf3f83e4e59c834e0a0e75
-
SHA1
b2588697f14f29cd2d01097bba10f1fdb878781c
-
SHA256
bbe9f08291de25b7f9ee900c82af261cae5cd85bb1621c4b0cdec13626d7c180
-
SHA512
5bd24daa7cc3f41475dd798a9b87e840c196de51f6c43c51f93e354f69b6bb8174dfe34a56eb1b66d9f321e07bb8a1234e5eb71494f76b5d58607200da2439e9
-
SSDEEP
3072:eDT4TB1Tft65E89XQXHB5ZfG0UT8azDBFxXOHOYkb4dmgG3XsjP+T3B:s4B1TfkoHhOhT/NukEdsHsjPOB
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2688 igfxwk32.exe -
Executes dropped EXE 30 IoCs
pid Process 316 igfxwk32.exe 2688 igfxwk32.exe 2616 igfxwk32.exe 2632 igfxwk32.exe 2628 igfxwk32.exe 1640 igfxwk32.exe 2804 igfxwk32.exe 484 igfxwk32.exe 2928 igfxwk32.exe 2368 igfxwk32.exe 304 igfxwk32.exe 2992 igfxwk32.exe 552 igfxwk32.exe 1936 igfxwk32.exe 1528 igfxwk32.exe 2280 igfxwk32.exe 984 igfxwk32.exe 892 igfxwk32.exe 1056 igfxwk32.exe 2304 igfxwk32.exe 2856 igfxwk32.exe 2748 igfxwk32.exe 2672 igfxwk32.exe 2788 igfxwk32.exe 536 igfxwk32.exe 1820 igfxwk32.exe 2816 igfxwk32.exe 2900 igfxwk32.exe 2468 igfxwk32.exe 1240 igfxwk32.exe -
Loads dropped DLL 30 IoCs
pid Process 2088 aea5c46775cf3f83e4e59c834e0a0e75_JaffaCakes118.exe 316 igfxwk32.exe 2688 igfxwk32.exe 2616 igfxwk32.exe 2632 igfxwk32.exe 2628 igfxwk32.exe 1640 igfxwk32.exe 2804 igfxwk32.exe 484 igfxwk32.exe 2928 igfxwk32.exe 2368 igfxwk32.exe 304 igfxwk32.exe 2992 igfxwk32.exe 552 igfxwk32.exe 1936 igfxwk32.exe 1528 igfxwk32.exe 2280 igfxwk32.exe 984 igfxwk32.exe 892 igfxwk32.exe 1056 igfxwk32.exe 2304 igfxwk32.exe 2856 igfxwk32.exe 2748 igfxwk32.exe 2672 igfxwk32.exe 2788 igfxwk32.exe 536 igfxwk32.exe 1820 igfxwk32.exe 2816 igfxwk32.exe 2900 igfxwk32.exe 2468 igfxwk32.exe -
Maps connected drives based on registry 3 TTPs 32 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum aea5c46775cf3f83e4e59c834e0a0e75_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 aea5c46775cf3f83e4e59c834e0a0e75_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe -
Drops file in System32 directory 45 IoCs
description ioc Process File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ aea5c46775cf3f83e4e59c834e0a0e75_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxwk32.exe aea5c46775cf3f83e4e59c834e0a0e75_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe aea5c46775cf3f83e4e59c834e0a0e75_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe -
Suspicious use of SetThreadContext 16 IoCs
description pid Process procid_target PID 2084 set thread context of 2088 2084 aea5c46775cf3f83e4e59c834e0a0e75_JaffaCakes118.exe 31 PID 316 set thread context of 2688 316 igfxwk32.exe 33 PID 2616 set thread context of 2632 2616 igfxwk32.exe 35 PID 2628 set thread context of 1640 2628 igfxwk32.exe 37 PID 2804 set thread context of 484 2804 igfxwk32.exe 39 PID 2928 set thread context of 2368 2928 igfxwk32.exe 41 PID 304 set thread context of 2992 304 igfxwk32.exe 43 PID 552 set thread context of 1936 552 igfxwk32.exe 45 PID 1528 set thread context of 2280 1528 igfxwk32.exe 47 PID 984 set thread context of 892 984 igfxwk32.exe 49 PID 1056 set thread context of 2304 1056 igfxwk32.exe 51 PID 2856 set thread context of 2748 2856 igfxwk32.exe 54 PID 2672 set thread context of 2788 2672 igfxwk32.exe 56 PID 536 set thread context of 1820 536 igfxwk32.exe 58 PID 2816 set thread context of 2900 2816 igfxwk32.exe 60 PID 2468 set thread context of 1240 2468 igfxwk32.exe 62 -
resource yara_rule behavioral1/memory/2088-2-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2088-8-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2088-9-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2088-7-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2088-6-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2088-4-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2088-3-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2088-19-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2688-35-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2688-34-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2688-33-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2688-32-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2688-31-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2688-40-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2632-52-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2632-50-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2632-51-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2632-56-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1640-68-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1640-69-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1640-67-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1640-75-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/484-85-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/484-86-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/484-87-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/484-92-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2368-104-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2368-108-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2992-121-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2992-126-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1936-139-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1936-144-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2280-156-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2280-160-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/892-173-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/892-177-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2304-190-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2304-196-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2748-212-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2788-229-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1820-239-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1820-246-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2900-256-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2900-260-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1240-269-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 31 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aea5c46775cf3f83e4e59c834e0a0e75_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aea5c46775cf3f83e4e59c834e0a0e75_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2088 aea5c46775cf3f83e4e59c834e0a0e75_JaffaCakes118.exe 2088 aea5c46775cf3f83e4e59c834e0a0e75_JaffaCakes118.exe 2688 igfxwk32.exe 2688 igfxwk32.exe 2632 igfxwk32.exe 2632 igfxwk32.exe 1640 igfxwk32.exe 1640 igfxwk32.exe 484 igfxwk32.exe 484 igfxwk32.exe 2368 igfxwk32.exe 2368 igfxwk32.exe 2992 igfxwk32.exe 2992 igfxwk32.exe 1936 igfxwk32.exe 1936 igfxwk32.exe 2280 igfxwk32.exe 2280 igfxwk32.exe 892 igfxwk32.exe 892 igfxwk32.exe 2304 igfxwk32.exe 2304 igfxwk32.exe 2748 igfxwk32.exe 2748 igfxwk32.exe 2788 igfxwk32.exe 2788 igfxwk32.exe 1820 igfxwk32.exe 1820 igfxwk32.exe 2900 igfxwk32.exe 2900 igfxwk32.exe 1240 igfxwk32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2088 2084 aea5c46775cf3f83e4e59c834e0a0e75_JaffaCakes118.exe 31 PID 2084 wrote to memory of 2088 2084 aea5c46775cf3f83e4e59c834e0a0e75_JaffaCakes118.exe 31 PID 2084 wrote to memory of 2088 2084 aea5c46775cf3f83e4e59c834e0a0e75_JaffaCakes118.exe 31 PID 2084 wrote to memory of 2088 2084 aea5c46775cf3f83e4e59c834e0a0e75_JaffaCakes118.exe 31 PID 2084 wrote to memory of 2088 2084 aea5c46775cf3f83e4e59c834e0a0e75_JaffaCakes118.exe 31 PID 2084 wrote to memory of 2088 2084 aea5c46775cf3f83e4e59c834e0a0e75_JaffaCakes118.exe 31 PID 2084 wrote to memory of 2088 2084 aea5c46775cf3f83e4e59c834e0a0e75_JaffaCakes118.exe 31 PID 2088 wrote to memory of 316 2088 aea5c46775cf3f83e4e59c834e0a0e75_JaffaCakes118.exe 32 PID 2088 wrote to memory of 316 2088 aea5c46775cf3f83e4e59c834e0a0e75_JaffaCakes118.exe 32 PID 2088 wrote to memory of 316 2088 aea5c46775cf3f83e4e59c834e0a0e75_JaffaCakes118.exe 32 PID 2088 wrote to memory of 316 2088 aea5c46775cf3f83e4e59c834e0a0e75_JaffaCakes118.exe 32 PID 316 wrote to memory of 2688 316 igfxwk32.exe 33 PID 316 wrote to memory of 2688 316 igfxwk32.exe 33 PID 316 wrote to memory of 2688 316 igfxwk32.exe 33 PID 316 wrote to memory of 2688 316 igfxwk32.exe 33 PID 316 wrote to memory of 2688 316 igfxwk32.exe 33 PID 316 wrote to memory of 2688 316 igfxwk32.exe 33 PID 316 wrote to memory of 2688 316 igfxwk32.exe 33 PID 2688 wrote to memory of 2616 2688 igfxwk32.exe 34 PID 2688 wrote to memory of 2616 2688 igfxwk32.exe 34 PID 2688 wrote to memory of 2616 2688 igfxwk32.exe 34 PID 2688 wrote to memory of 2616 2688 igfxwk32.exe 34 PID 2616 wrote to memory of 2632 2616 igfxwk32.exe 35 PID 2616 wrote to memory of 2632 2616 igfxwk32.exe 35 PID 2616 wrote to memory of 2632 2616 igfxwk32.exe 35 PID 2616 wrote to memory of 2632 2616 igfxwk32.exe 35 PID 2616 wrote to memory of 2632 2616 igfxwk32.exe 35 PID 2616 wrote to memory of 2632 2616 igfxwk32.exe 35 PID 2616 wrote to memory of 2632 2616 igfxwk32.exe 35 PID 2632 wrote to memory of 2628 2632 igfxwk32.exe 36 PID 2632 wrote to memory of 2628 2632 igfxwk32.exe 36 PID 2632 wrote to memory of 2628 2632 igfxwk32.exe 36 PID 2632 wrote to memory of 2628 2632 igfxwk32.exe 36 PID 2628 wrote to memory of 1640 2628 igfxwk32.exe 37 PID 2628 wrote to memory of 1640 2628 igfxwk32.exe 37 PID 2628 wrote to memory of 1640 2628 igfxwk32.exe 37 PID 2628 wrote to memory of 1640 2628 igfxwk32.exe 37 PID 2628 wrote to memory of 1640 2628 igfxwk32.exe 37 PID 2628 wrote to memory of 1640 2628 igfxwk32.exe 37 PID 2628 wrote to memory of 1640 2628 igfxwk32.exe 37 PID 1640 wrote to memory of 2804 1640 igfxwk32.exe 38 PID 1640 wrote to memory of 2804 1640 igfxwk32.exe 38 PID 1640 wrote to memory of 2804 1640 igfxwk32.exe 38 PID 1640 wrote to memory of 2804 1640 igfxwk32.exe 38 PID 2804 wrote to memory of 484 2804 igfxwk32.exe 39 PID 2804 wrote to memory of 484 2804 igfxwk32.exe 39 PID 2804 wrote to memory of 484 2804 igfxwk32.exe 39 PID 2804 wrote to memory of 484 2804 igfxwk32.exe 39 PID 2804 wrote to memory of 484 2804 igfxwk32.exe 39 PID 2804 wrote to memory of 484 2804 igfxwk32.exe 39 PID 2804 wrote to memory of 484 2804 igfxwk32.exe 39 PID 484 wrote to memory of 2928 484 igfxwk32.exe 40 PID 484 wrote to memory of 2928 484 igfxwk32.exe 40 PID 484 wrote to memory of 2928 484 igfxwk32.exe 40 PID 484 wrote to memory of 2928 484 igfxwk32.exe 40 PID 2928 wrote to memory of 2368 2928 igfxwk32.exe 41 PID 2928 wrote to memory of 2368 2928 igfxwk32.exe 41 PID 2928 wrote to memory of 2368 2928 igfxwk32.exe 41 PID 2928 wrote to memory of 2368 2928 igfxwk32.exe 41 PID 2928 wrote to memory of 2368 2928 igfxwk32.exe 41 PID 2928 wrote to memory of 2368 2928 igfxwk32.exe 41 PID 2928 wrote to memory of 2368 2928 igfxwk32.exe 41 PID 2368 wrote to memory of 304 2368 igfxwk32.exe 42 PID 2368 wrote to memory of 304 2368 igfxwk32.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\aea5c46775cf3f83e4e59c834e0a0e75_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aea5c46775cf3f83e4e59c834e0a0e75_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\aea5c46775cf3f83e4e59c834e0a0e75_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aea5c46775cf3f83e4e59c834e0a0e75_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Users\Admin\AppData\Local\Temp\AEA5C4~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Users\Admin\AppData\Local\Temp\AEA5C4~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:304 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2992 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:552 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1936 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1528 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2280 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:984 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:892 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1056 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2304 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2856 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2748 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2672 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2788 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:536 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1820 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2816 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2900 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2468 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe32⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:1240
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5aea5c46775cf3f83e4e59c834e0a0e75
SHA1b2588697f14f29cd2d01097bba10f1fdb878781c
SHA256bbe9f08291de25b7f9ee900c82af261cae5cd85bb1621c4b0cdec13626d7c180
SHA5125bd24daa7cc3f41475dd798a9b87e840c196de51f6c43c51f93e354f69b6bb8174dfe34a56eb1b66d9f321e07bb8a1234e5eb71494f76b5d58607200da2439e9