Analysis
-
max time kernel
146s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 14:48
Static task
static1
Behavioral task
behavioral1
Sample
b1f22338c895ddf752dc3c7937307905_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b1f22338c895ddf752dc3c7937307905_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
b1f22338c895ddf752dc3c7937307905_JaffaCakes118.exe
-
Size
168KB
-
MD5
b1f22338c895ddf752dc3c7937307905
-
SHA1
2b0a00a2e3a2620e734e4f6c214b6a88b9316d49
-
SHA256
84973bcfe5f36f50458c26b2249761a2747fbdba8a8cb68469edbc7a340bfbae
-
SHA512
90c620bdf5d1ce0ffc3a7e25e0a1153483e3216787159aca0515eac2628b80bb17fd1077e51a56100ddd7cda5b56aa0f845c5493a3c23df0348052bd55fedd69
-
SSDEEP
3072:Sj5WFs4k11DfuQ5BulW2yeeRSz5BgpExadlytEx+IiX9OHI5UnNs:+5V11DfxGbESz5kFlyOxsXgHII2
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2584 igfxwk32.exe -
Executes dropped EXE 31 IoCs
pid Process 2468 igfxwk32.exe 2584 igfxwk32.exe 2624 igfxwk32.exe 2628 igfxwk32.exe 1932 igfxwk32.exe 2332 igfxwk32.exe 1632 igfxwk32.exe 1508 igfxwk32.exe 1740 igfxwk32.exe 2220 igfxwk32.exe 1812 igfxwk32.exe 3024 igfxwk32.exe 1080 igfxwk32.exe 2064 igfxwk32.exe 1096 igfxwk32.exe 2204 igfxwk32.exe 1884 igfxwk32.exe 2340 igfxwk32.exe 2288 igfxwk32.exe 2688 igfxwk32.exe 2468 igfxwk32.exe 2712 igfxwk32.exe 2592 igfxwk32.exe 1676 igfxwk32.exe 2800 igfxwk32.exe 2112 igfxwk32.exe 2564 igfxwk32.exe 1960 igfxwk32.exe 2672 igfxwk32.exe 1492 igfxwk32.exe 1928 igfxwk32.exe -
Loads dropped DLL 31 IoCs
pid Process 2384 b1f22338c895ddf752dc3c7937307905_JaffaCakes118.exe 2468 igfxwk32.exe 2584 igfxwk32.exe 2624 igfxwk32.exe 2628 igfxwk32.exe 1932 igfxwk32.exe 2332 igfxwk32.exe 1632 igfxwk32.exe 1508 igfxwk32.exe 1740 igfxwk32.exe 2220 igfxwk32.exe 1812 igfxwk32.exe 3024 igfxwk32.exe 1080 igfxwk32.exe 2064 igfxwk32.exe 1096 igfxwk32.exe 2204 igfxwk32.exe 1884 igfxwk32.exe 2340 igfxwk32.exe 2288 igfxwk32.exe 2688 igfxwk32.exe 2468 igfxwk32.exe 2712 igfxwk32.exe 2592 igfxwk32.exe 1676 igfxwk32.exe 2800 igfxwk32.exe 2112 igfxwk32.exe 2564 igfxwk32.exe 1960 igfxwk32.exe 2672 igfxwk32.exe 1492 igfxwk32.exe -
Maps connected drives based on registry 3 TTPs 32 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 b1f22338c895ddf752dc3c7937307905_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum b1f22338c895ddf752dc3c7937307905_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe -
Drops file in System32 directory 45 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe b1f22338c895ddf752dc3c7937307905_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe b1f22338c895ddf752dc3c7937307905_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ b1f22338c895ddf752dc3c7937307905_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe -
Suspicious use of SetThreadContext 16 IoCs
description pid Process procid_target PID 2388 set thread context of 2384 2388 b1f22338c895ddf752dc3c7937307905_JaffaCakes118.exe 31 PID 2468 set thread context of 2584 2468 igfxwk32.exe 33 PID 2624 set thread context of 2628 2624 igfxwk32.exe 35 PID 1932 set thread context of 2332 1932 igfxwk32.exe 37 PID 1632 set thread context of 1508 1632 igfxwk32.exe 39 PID 1740 set thread context of 2220 1740 igfxwk32.exe 41 PID 1812 set thread context of 3024 1812 igfxwk32.exe 43 PID 1080 set thread context of 2064 1080 igfxwk32.exe 45 PID 1096 set thread context of 2204 1096 igfxwk32.exe 47 PID 1884 set thread context of 2340 1884 igfxwk32.exe 49 PID 2288 set thread context of 2688 2288 igfxwk32.exe 51 PID 2468 set thread context of 2712 2468 igfxwk32.exe 53 PID 2592 set thread context of 1676 2592 igfxwk32.exe 55 PID 2800 set thread context of 2112 2800 igfxwk32.exe 57 PID 2564 set thread context of 1960 2564 igfxwk32.exe 59 PID 2672 set thread context of 1492 2672 igfxwk32.exe 61 -
resource yara_rule behavioral1/memory/2384-7-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2384-9-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2384-8-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2384-4-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2384-3-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2384-2-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2384-19-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2584-31-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2584-32-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2584-30-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2584-29-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2584-37-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2628-48-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2628-54-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2332-70-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1508-81-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1508-80-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1508-85-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2220-96-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2220-102-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/3024-118-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2064-136-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2204-146-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2204-152-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2340-170-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2688-188-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2712-199-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2712-204-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1676-222-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2112-238-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1960-251-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1492-259-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1492-264-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 32 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1f22338c895ddf752dc3c7937307905_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1f22338c895ddf752dc3c7937307905_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2384 b1f22338c895ddf752dc3c7937307905_JaffaCakes118.exe 2384 b1f22338c895ddf752dc3c7937307905_JaffaCakes118.exe 2584 igfxwk32.exe 2584 igfxwk32.exe 2628 igfxwk32.exe 2628 igfxwk32.exe 2332 igfxwk32.exe 2332 igfxwk32.exe 1508 igfxwk32.exe 1508 igfxwk32.exe 2220 igfxwk32.exe 2220 igfxwk32.exe 3024 igfxwk32.exe 3024 igfxwk32.exe 2064 igfxwk32.exe 2064 igfxwk32.exe 2204 igfxwk32.exe 2204 igfxwk32.exe 2688 igfxwk32.exe 2688 igfxwk32.exe 2712 igfxwk32.exe 2712 igfxwk32.exe 1676 igfxwk32.exe 1676 igfxwk32.exe 2112 igfxwk32.exe 2112 igfxwk32.exe 1960 igfxwk32.exe 1960 igfxwk32.exe 1492 igfxwk32.exe 1492 igfxwk32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2384 2388 b1f22338c895ddf752dc3c7937307905_JaffaCakes118.exe 31 PID 2388 wrote to memory of 2384 2388 b1f22338c895ddf752dc3c7937307905_JaffaCakes118.exe 31 PID 2388 wrote to memory of 2384 2388 b1f22338c895ddf752dc3c7937307905_JaffaCakes118.exe 31 PID 2388 wrote to memory of 2384 2388 b1f22338c895ddf752dc3c7937307905_JaffaCakes118.exe 31 PID 2388 wrote to memory of 2384 2388 b1f22338c895ddf752dc3c7937307905_JaffaCakes118.exe 31 PID 2388 wrote to memory of 2384 2388 b1f22338c895ddf752dc3c7937307905_JaffaCakes118.exe 31 PID 2388 wrote to memory of 2384 2388 b1f22338c895ddf752dc3c7937307905_JaffaCakes118.exe 31 PID 2384 wrote to memory of 2468 2384 b1f22338c895ddf752dc3c7937307905_JaffaCakes118.exe 32 PID 2384 wrote to memory of 2468 2384 b1f22338c895ddf752dc3c7937307905_JaffaCakes118.exe 32 PID 2384 wrote to memory of 2468 2384 b1f22338c895ddf752dc3c7937307905_JaffaCakes118.exe 32 PID 2384 wrote to memory of 2468 2384 b1f22338c895ddf752dc3c7937307905_JaffaCakes118.exe 32 PID 2468 wrote to memory of 2584 2468 igfxwk32.exe 33 PID 2468 wrote to memory of 2584 2468 igfxwk32.exe 33 PID 2468 wrote to memory of 2584 2468 igfxwk32.exe 33 PID 2468 wrote to memory of 2584 2468 igfxwk32.exe 33 PID 2468 wrote to memory of 2584 2468 igfxwk32.exe 33 PID 2468 wrote to memory of 2584 2468 igfxwk32.exe 33 PID 2468 wrote to memory of 2584 2468 igfxwk32.exe 33 PID 2584 wrote to memory of 2624 2584 igfxwk32.exe 34 PID 2584 wrote to memory of 2624 2584 igfxwk32.exe 34 PID 2584 wrote to memory of 2624 2584 igfxwk32.exe 34 PID 2584 wrote to memory of 2624 2584 igfxwk32.exe 34 PID 2624 wrote to memory of 2628 2624 igfxwk32.exe 35 PID 2624 wrote to memory of 2628 2624 igfxwk32.exe 35 PID 2624 wrote to memory of 2628 2624 igfxwk32.exe 35 PID 2624 wrote to memory of 2628 2624 igfxwk32.exe 35 PID 2624 wrote to memory of 2628 2624 igfxwk32.exe 35 PID 2624 wrote to memory of 2628 2624 igfxwk32.exe 35 PID 2624 wrote to memory of 2628 2624 igfxwk32.exe 35 PID 2628 wrote to memory of 1932 2628 igfxwk32.exe 36 PID 2628 wrote to memory of 1932 2628 igfxwk32.exe 36 PID 2628 wrote to memory of 1932 2628 igfxwk32.exe 36 PID 2628 wrote to memory of 1932 2628 igfxwk32.exe 36 PID 1932 wrote to memory of 2332 1932 igfxwk32.exe 37 PID 1932 wrote to memory of 2332 1932 igfxwk32.exe 37 PID 1932 wrote to memory of 2332 1932 igfxwk32.exe 37 PID 1932 wrote to memory of 2332 1932 igfxwk32.exe 37 PID 1932 wrote to memory of 2332 1932 igfxwk32.exe 37 PID 1932 wrote to memory of 2332 1932 igfxwk32.exe 37 PID 1932 wrote to memory of 2332 1932 igfxwk32.exe 37 PID 2332 wrote to memory of 1632 2332 igfxwk32.exe 38 PID 2332 wrote to memory of 1632 2332 igfxwk32.exe 38 PID 2332 wrote to memory of 1632 2332 igfxwk32.exe 38 PID 2332 wrote to memory of 1632 2332 igfxwk32.exe 38 PID 1632 wrote to memory of 1508 1632 igfxwk32.exe 39 PID 1632 wrote to memory of 1508 1632 igfxwk32.exe 39 PID 1632 wrote to memory of 1508 1632 igfxwk32.exe 39 PID 1632 wrote to memory of 1508 1632 igfxwk32.exe 39 PID 1632 wrote to memory of 1508 1632 igfxwk32.exe 39 PID 1632 wrote to memory of 1508 1632 igfxwk32.exe 39 PID 1632 wrote to memory of 1508 1632 igfxwk32.exe 39 PID 1508 wrote to memory of 1740 1508 igfxwk32.exe 40 PID 1508 wrote to memory of 1740 1508 igfxwk32.exe 40 PID 1508 wrote to memory of 1740 1508 igfxwk32.exe 40 PID 1508 wrote to memory of 1740 1508 igfxwk32.exe 40 PID 1740 wrote to memory of 2220 1740 igfxwk32.exe 41 PID 1740 wrote to memory of 2220 1740 igfxwk32.exe 41 PID 1740 wrote to memory of 2220 1740 igfxwk32.exe 41 PID 1740 wrote to memory of 2220 1740 igfxwk32.exe 41 PID 1740 wrote to memory of 2220 1740 igfxwk32.exe 41 PID 1740 wrote to memory of 2220 1740 igfxwk32.exe 41 PID 1740 wrote to memory of 2220 1740 igfxwk32.exe 41 PID 2220 wrote to memory of 1812 2220 igfxwk32.exe 42 PID 2220 wrote to memory of 1812 2220 igfxwk32.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1f22338c895ddf752dc3c7937307905_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b1f22338c895ddf752dc3c7937307905_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\b1f22338c895ddf752dc3c7937307905_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b1f22338c895ddf752dc3c7937307905_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Users\Admin\AppData\Local\Temp\B1F223~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Users\Admin\AppData\Local\Temp\B1F223~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1812 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3024 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1080 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2064 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1096 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2204 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1884 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2340 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2288 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2688 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2468 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2712 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2592 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1676 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2800 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2112 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2564 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1960 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2672 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1492 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe33⤵
- Executes dropped EXE
PID:1928
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5b1f22338c895ddf752dc3c7937307905
SHA12b0a00a2e3a2620e734e4f6c214b6a88b9316d49
SHA25684973bcfe5f36f50458c26b2249761a2747fbdba8a8cb68469edbc7a340bfbae
SHA51290c620bdf5d1ce0ffc3a7e25e0a1153483e3216787159aca0515eac2628b80bb17fd1077e51a56100ddd7cda5b56aa0f845c5493a3c23df0348052bd55fedd69