Analysis
-
max time kernel
147s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
04-12-2024 23:40
Static task
static1
Behavioral task
behavioral1
Sample
c4de5fbe065ee8ec7e4b246406a518c4_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
c4de5fbe065ee8ec7e4b246406a518c4_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
c4de5fbe065ee8ec7e4b246406a518c4_JaffaCakes118.exe
-
Size
168KB
-
MD5
c4de5fbe065ee8ec7e4b246406a518c4
-
SHA1
f870a88a4a14dcc2c1bd2e70a10a5d9ff05ce617
-
SHA256
44d220c4ac4e76dba37b482f6e210989f01295ba6de4b1c395a0b64412279b04
-
SHA512
1484ba460d5d186ace27332679071b956270f08ff7188296a1d1c88a622f934844b10bfda16dffda3bba8600231df2aad2decd94a7f2cf5c09df99330652804f
-
SSDEEP
3072:838Nmr19fQK5/RCe77VP9lXl+gMzF7mNslgiJ3le74PhcIv8gVq8io1G:Ar19fPR977VPrEhmEjpzNVw
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 1004 igfxwk32.exe -
Executes dropped EXE 31 IoCs
pid Process 2920 igfxwk32.exe 1004 igfxwk32.exe 1776 igfxwk32.exe 3040 igfxwk32.exe 1264 igfxwk32.exe 2968 igfxwk32.exe 1880 igfxwk32.exe 2044 igfxwk32.exe 1960 igfxwk32.exe 780 igfxwk32.exe 2176 igfxwk32.exe 840 igfxwk32.exe 1192 igfxwk32.exe 1056 igfxwk32.exe 1736 igfxwk32.exe 712 igfxwk32.exe 2976 igfxwk32.exe 884 igfxwk32.exe 1800 igfxwk32.exe 2868 igfxwk32.exe 2920 igfxwk32.exe 2664 igfxwk32.exe 796 igfxwk32.exe 3036 igfxwk32.exe 2476 igfxwk32.exe 1264 igfxwk32.exe 2100 igfxwk32.exe 2992 igfxwk32.exe 1284 igfxwk32.exe 536 igfxwk32.exe 2132 igfxwk32.exe -
Loads dropped DLL 31 IoCs
pid Process 2312 c4de5fbe065ee8ec7e4b246406a518c4_JaffaCakes118.exe 2920 igfxwk32.exe 1004 igfxwk32.exe 1776 igfxwk32.exe 3040 igfxwk32.exe 1264 igfxwk32.exe 2968 igfxwk32.exe 1880 igfxwk32.exe 2044 igfxwk32.exe 1960 igfxwk32.exe 780 igfxwk32.exe 2176 igfxwk32.exe 840 igfxwk32.exe 1192 igfxwk32.exe 1056 igfxwk32.exe 1736 igfxwk32.exe 712 igfxwk32.exe 2976 igfxwk32.exe 884 igfxwk32.exe 1800 igfxwk32.exe 2868 igfxwk32.exe 2920 igfxwk32.exe 2664 igfxwk32.exe 796 igfxwk32.exe 3036 igfxwk32.exe 2476 igfxwk32.exe 1264 igfxwk32.exe 2100 igfxwk32.exe 2992 igfxwk32.exe 1284 igfxwk32.exe 536 igfxwk32.exe -
Maps connected drives based on registry 3 TTPs 32 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 c4de5fbe065ee8ec7e4b246406a518c4_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum c4de5fbe065ee8ec7e4b246406a518c4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe -
Drops file in System32 directory 48 IoCs
description ioc Process File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ c4de5fbe065ee8ec7e4b246406a518c4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe c4de5fbe065ee8ec7e4b246406a518c4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe c4de5fbe065ee8ec7e4b246406a518c4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe -
Suspicious use of SetThreadContext 16 IoCs
description pid Process procid_target PID 1800 set thread context of 2312 1800 c4de5fbe065ee8ec7e4b246406a518c4_JaffaCakes118.exe 30 PID 2920 set thread context of 1004 2920 igfxwk32.exe 32 PID 1776 set thread context of 3040 1776 igfxwk32.exe 35 PID 1264 set thread context of 2968 1264 igfxwk32.exe 37 PID 1880 set thread context of 2044 1880 igfxwk32.exe 39 PID 1960 set thread context of 780 1960 igfxwk32.exe 41 PID 2176 set thread context of 840 2176 igfxwk32.exe 43 PID 1192 set thread context of 1056 1192 igfxwk32.exe 45 PID 1736 set thread context of 712 1736 igfxwk32.exe 47 PID 2976 set thread context of 884 2976 igfxwk32.exe 49 PID 1800 set thread context of 2868 1800 igfxwk32.exe 51 PID 2920 set thread context of 2664 2920 igfxwk32.exe 53 PID 796 set thread context of 3036 796 igfxwk32.exe 55 PID 2476 set thread context of 1264 2476 igfxwk32.exe 57 PID 2100 set thread context of 2992 2100 igfxwk32.exe 59 PID 1284 set thread context of 536 1284 igfxwk32.exe 61 -
resource yara_rule behavioral1/memory/2312-3-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2312-7-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2312-6-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2312-4-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2312-2-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2312-9-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2312-8-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2312-19-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1004-30-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1004-29-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1004-32-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1004-31-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1004-38-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/3040-49-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/3040-55-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2968-65-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2968-67-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2968-66-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2968-73-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2044-89-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/780-99-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/780-107-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/840-118-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/840-124-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1056-141-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/712-151-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/712-158-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/884-174-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2868-190-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2664-206-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/3036-222-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1264-233-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1264-239-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2992-251-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/536-260-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/536-264-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 32 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c4de5fbe065ee8ec7e4b246406a518c4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c4de5fbe065ee8ec7e4b246406a518c4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2312 c4de5fbe065ee8ec7e4b246406a518c4_JaffaCakes118.exe 2312 c4de5fbe065ee8ec7e4b246406a518c4_JaffaCakes118.exe 1004 igfxwk32.exe 1004 igfxwk32.exe 3040 igfxwk32.exe 3040 igfxwk32.exe 2968 igfxwk32.exe 2968 igfxwk32.exe 2044 igfxwk32.exe 2044 igfxwk32.exe 780 igfxwk32.exe 780 igfxwk32.exe 840 igfxwk32.exe 840 igfxwk32.exe 1056 igfxwk32.exe 1056 igfxwk32.exe 712 igfxwk32.exe 712 igfxwk32.exe 884 igfxwk32.exe 884 igfxwk32.exe 2868 igfxwk32.exe 2868 igfxwk32.exe 2664 igfxwk32.exe 2664 igfxwk32.exe 3036 igfxwk32.exe 3036 igfxwk32.exe 1264 igfxwk32.exe 1264 igfxwk32.exe 2992 igfxwk32.exe 2992 igfxwk32.exe 536 igfxwk32.exe 536 igfxwk32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1800 wrote to memory of 2312 1800 c4de5fbe065ee8ec7e4b246406a518c4_JaffaCakes118.exe 30 PID 1800 wrote to memory of 2312 1800 c4de5fbe065ee8ec7e4b246406a518c4_JaffaCakes118.exe 30 PID 1800 wrote to memory of 2312 1800 c4de5fbe065ee8ec7e4b246406a518c4_JaffaCakes118.exe 30 PID 1800 wrote to memory of 2312 1800 c4de5fbe065ee8ec7e4b246406a518c4_JaffaCakes118.exe 30 PID 1800 wrote to memory of 2312 1800 c4de5fbe065ee8ec7e4b246406a518c4_JaffaCakes118.exe 30 PID 1800 wrote to memory of 2312 1800 c4de5fbe065ee8ec7e4b246406a518c4_JaffaCakes118.exe 30 PID 1800 wrote to memory of 2312 1800 c4de5fbe065ee8ec7e4b246406a518c4_JaffaCakes118.exe 30 PID 2312 wrote to memory of 2920 2312 c4de5fbe065ee8ec7e4b246406a518c4_JaffaCakes118.exe 31 PID 2312 wrote to memory of 2920 2312 c4de5fbe065ee8ec7e4b246406a518c4_JaffaCakes118.exe 31 PID 2312 wrote to memory of 2920 2312 c4de5fbe065ee8ec7e4b246406a518c4_JaffaCakes118.exe 31 PID 2312 wrote to memory of 2920 2312 c4de5fbe065ee8ec7e4b246406a518c4_JaffaCakes118.exe 31 PID 2920 wrote to memory of 1004 2920 igfxwk32.exe 32 PID 2920 wrote to memory of 1004 2920 igfxwk32.exe 32 PID 2920 wrote to memory of 1004 2920 igfxwk32.exe 32 PID 2920 wrote to memory of 1004 2920 igfxwk32.exe 32 PID 2920 wrote to memory of 1004 2920 igfxwk32.exe 32 PID 2920 wrote to memory of 1004 2920 igfxwk32.exe 32 PID 2920 wrote to memory of 1004 2920 igfxwk32.exe 32 PID 1004 wrote to memory of 1776 1004 igfxwk32.exe 33 PID 1004 wrote to memory of 1776 1004 igfxwk32.exe 33 PID 1004 wrote to memory of 1776 1004 igfxwk32.exe 33 PID 1004 wrote to memory of 1776 1004 igfxwk32.exe 33 PID 1776 wrote to memory of 3040 1776 igfxwk32.exe 35 PID 1776 wrote to memory of 3040 1776 igfxwk32.exe 35 PID 1776 wrote to memory of 3040 1776 igfxwk32.exe 35 PID 1776 wrote to memory of 3040 1776 igfxwk32.exe 35 PID 1776 wrote to memory of 3040 1776 igfxwk32.exe 35 PID 1776 wrote to memory of 3040 1776 igfxwk32.exe 35 PID 1776 wrote to memory of 3040 1776 igfxwk32.exe 35 PID 3040 wrote to memory of 1264 3040 igfxwk32.exe 36 PID 3040 wrote to memory of 1264 3040 igfxwk32.exe 36 PID 3040 wrote to memory of 1264 3040 igfxwk32.exe 36 PID 3040 wrote to memory of 1264 3040 igfxwk32.exe 36 PID 1264 wrote to memory of 2968 1264 igfxwk32.exe 37 PID 1264 wrote to memory of 2968 1264 igfxwk32.exe 37 PID 1264 wrote to memory of 2968 1264 igfxwk32.exe 37 PID 1264 wrote to memory of 2968 1264 igfxwk32.exe 37 PID 1264 wrote to memory of 2968 1264 igfxwk32.exe 37 PID 1264 wrote to memory of 2968 1264 igfxwk32.exe 37 PID 1264 wrote to memory of 2968 1264 igfxwk32.exe 37 PID 2968 wrote to memory of 1880 2968 igfxwk32.exe 38 PID 2968 wrote to memory of 1880 2968 igfxwk32.exe 38 PID 2968 wrote to memory of 1880 2968 igfxwk32.exe 38 PID 2968 wrote to memory of 1880 2968 igfxwk32.exe 38 PID 1880 wrote to memory of 2044 1880 igfxwk32.exe 39 PID 1880 wrote to memory of 2044 1880 igfxwk32.exe 39 PID 1880 wrote to memory of 2044 1880 igfxwk32.exe 39 PID 1880 wrote to memory of 2044 1880 igfxwk32.exe 39 PID 1880 wrote to memory of 2044 1880 igfxwk32.exe 39 PID 1880 wrote to memory of 2044 1880 igfxwk32.exe 39 PID 1880 wrote to memory of 2044 1880 igfxwk32.exe 39 PID 2044 wrote to memory of 1960 2044 igfxwk32.exe 40 PID 2044 wrote to memory of 1960 2044 igfxwk32.exe 40 PID 2044 wrote to memory of 1960 2044 igfxwk32.exe 40 PID 2044 wrote to memory of 1960 2044 igfxwk32.exe 40 PID 1960 wrote to memory of 780 1960 igfxwk32.exe 41 PID 1960 wrote to memory of 780 1960 igfxwk32.exe 41 PID 1960 wrote to memory of 780 1960 igfxwk32.exe 41 PID 1960 wrote to memory of 780 1960 igfxwk32.exe 41 PID 1960 wrote to memory of 780 1960 igfxwk32.exe 41 PID 1960 wrote to memory of 780 1960 igfxwk32.exe 41 PID 1960 wrote to memory of 780 1960 igfxwk32.exe 41 PID 780 wrote to memory of 2176 780 igfxwk32.exe 42 PID 780 wrote to memory of 2176 780 igfxwk32.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4de5fbe065ee8ec7e4b246406a518c4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c4de5fbe065ee8ec7e4b246406a518c4_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\c4de5fbe065ee8ec7e4b246406a518c4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c4de5fbe065ee8ec7e4b246406a518c4_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Users\Admin\AppData\Local\Temp\C4DE5F~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Users\Admin\AppData\Local\Temp\C4DE5F~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2176 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:840 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1192 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1056 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1736 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:712 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2976 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:884 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1800 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2868 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2920 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2664 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:796 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3036 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2476 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1264 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2100 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2992 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1284 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:536 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe33⤵
- Executes dropped EXE
PID:2132
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5c4de5fbe065ee8ec7e4b246406a518c4
SHA1f870a88a4a14dcc2c1bd2e70a10a5d9ff05ce617
SHA25644d220c4ac4e76dba37b482f6e210989f01295ba6de4b1c395a0b64412279b04
SHA5121484ba460d5d186ace27332679071b956270f08ff7188296a1d1c88a622f934844b10bfda16dffda3bba8600231df2aad2decd94a7f2cf5c09df99330652804f