Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/12/2024, 03:56
Static task
static1
Behavioral task
behavioral1
Sample
c5c9cc18ecfdf1dd5e77163539206ce1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c5c9cc18ecfdf1dd5e77163539206ce1_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
c5c9cc18ecfdf1dd5e77163539206ce1_JaffaCakes118.exe
-
Size
168KB
-
MD5
c5c9cc18ecfdf1dd5e77163539206ce1
-
SHA1
4a15c7813fc60e06047205515901bb89094b3a4a
-
SHA256
7bc761e7341be0a72eb4d4afff7cc1970c46cec2cf5851949b363626d04e2d22
-
SHA512
69f8ae1277c42a0b12685e2d84cb73b5e90f3411af40fbad003d774fd4529fd414a5e2f5b8ec177ab9b5a4d6f42089ecb91e7401c9779a481d7ed7fbc24b9744
-
SSDEEP
3072:Xh7IT11ifB55719lbskv2V2U1+8uEqWzv1VDCtwwTK4oYC86IGVP1QTjT:611iflBbLQ9FqWzdV2bTK4oZxIIP1QTH
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2828 igfxwk32.exe -
Executes dropped EXE 30 IoCs
pid Process 276 igfxwk32.exe 2828 igfxwk32.exe 2592 igfxwk32.exe 2568 igfxwk32.exe 3056 igfxwk32.exe 2868 igfxwk32.exe 2920 igfxwk32.exe 2904 igfxwk32.exe 2176 igfxwk32.exe 1436 igfxwk32.exe 864 igfxwk32.exe 2020 igfxwk32.exe 1388 igfxwk32.exe 824 igfxwk32.exe 348 igfxwk32.exe 2488 igfxwk32.exe 1148 igfxwk32.exe 2480 igfxwk32.exe 1608 igfxwk32.exe 2248 igfxwk32.exe 2812 igfxwk32.exe 2728 igfxwk32.exe 2628 igfxwk32.exe 1548 igfxwk32.exe 532 igfxwk32.exe 2640 igfxwk32.exe 2000 igfxwk32.exe 1904 igfxwk32.exe 684 igfxwk32.exe 1776 igfxwk32.exe -
Loads dropped DLL 30 IoCs
pid Process 1652 c5c9cc18ecfdf1dd5e77163539206ce1_JaffaCakes118.exe 276 igfxwk32.exe 2828 igfxwk32.exe 2592 igfxwk32.exe 2568 igfxwk32.exe 3056 igfxwk32.exe 2868 igfxwk32.exe 2920 igfxwk32.exe 2904 igfxwk32.exe 2176 igfxwk32.exe 1436 igfxwk32.exe 864 igfxwk32.exe 2020 igfxwk32.exe 1388 igfxwk32.exe 824 igfxwk32.exe 348 igfxwk32.exe 2488 igfxwk32.exe 1148 igfxwk32.exe 2480 igfxwk32.exe 1608 igfxwk32.exe 2248 igfxwk32.exe 2812 igfxwk32.exe 2728 igfxwk32.exe 2628 igfxwk32.exe 1548 igfxwk32.exe 532 igfxwk32.exe 2640 igfxwk32.exe 2000 igfxwk32.exe 1904 igfxwk32.exe 684 igfxwk32.exe -
Maps connected drives based on registry 3 TTPs 32 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 c5c9cc18ecfdf1dd5e77163539206ce1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum c5c9cc18ecfdf1dd5e77163539206ce1_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe -
Drops file in System32 directory 45 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ c5c9cc18ecfdf1dd5e77163539206ce1_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe c5c9cc18ecfdf1dd5e77163539206ce1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe c5c9cc18ecfdf1dd5e77163539206ce1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe -
Suspicious use of SetThreadContext 16 IoCs
description pid Process procid_target PID 1708 set thread context of 1652 1708 c5c9cc18ecfdf1dd5e77163539206ce1_JaffaCakes118.exe 31 PID 276 set thread context of 2828 276 igfxwk32.exe 33 PID 2592 set thread context of 2568 2592 igfxwk32.exe 35 PID 3056 set thread context of 2868 3056 igfxwk32.exe 37 PID 2920 set thread context of 2904 2920 igfxwk32.exe 39 PID 2176 set thread context of 1436 2176 igfxwk32.exe 41 PID 864 set thread context of 2020 864 igfxwk32.exe 43 PID 1388 set thread context of 824 1388 igfxwk32.exe 45 PID 348 set thread context of 2488 348 igfxwk32.exe 48 PID 1148 set thread context of 2480 1148 igfxwk32.exe 50 PID 1608 set thread context of 2248 1608 igfxwk32.exe 52 PID 2812 set thread context of 2728 2812 igfxwk32.exe 54 PID 2628 set thread context of 1548 2628 igfxwk32.exe 56 PID 532 set thread context of 2640 532 igfxwk32.exe 58 PID 2000 set thread context of 1904 2000 igfxwk32.exe 60 PID 684 set thread context of 1776 684 igfxwk32.exe 62 -
resource yara_rule behavioral1/memory/1652-4-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1652-3-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1652-9-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1652-8-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1652-7-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1652-6-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1652-2-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1652-19-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2828-32-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2828-31-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2828-30-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2828-29-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2828-37-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2568-49-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2568-54-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2868-66-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2868-71-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2904-81-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2904-83-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2904-82-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2904-88-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1436-100-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1436-99-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1436-98-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1436-106-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2020-117-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2020-123-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/824-135-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/824-141-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2488-157-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2480-167-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2480-175-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2248-191-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2728-208-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1548-224-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2640-241-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1904-250-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1904-255-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 31 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c5c9cc18ecfdf1dd5e77163539206ce1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c5c9cc18ecfdf1dd5e77163539206ce1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwk32.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1652 c5c9cc18ecfdf1dd5e77163539206ce1_JaffaCakes118.exe 1652 c5c9cc18ecfdf1dd5e77163539206ce1_JaffaCakes118.exe 2828 igfxwk32.exe 2828 igfxwk32.exe 2568 igfxwk32.exe 2568 igfxwk32.exe 2868 igfxwk32.exe 2868 igfxwk32.exe 2904 igfxwk32.exe 2904 igfxwk32.exe 1436 igfxwk32.exe 1436 igfxwk32.exe 2020 igfxwk32.exe 2020 igfxwk32.exe 824 igfxwk32.exe 824 igfxwk32.exe 2488 igfxwk32.exe 2488 igfxwk32.exe 2480 igfxwk32.exe 2480 igfxwk32.exe 2248 igfxwk32.exe 2248 igfxwk32.exe 2728 igfxwk32.exe 2728 igfxwk32.exe 1548 igfxwk32.exe 1548 igfxwk32.exe 2640 igfxwk32.exe 2640 igfxwk32.exe 1904 igfxwk32.exe 1904 igfxwk32.exe 1776 igfxwk32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1708 wrote to memory of 1652 1708 c5c9cc18ecfdf1dd5e77163539206ce1_JaffaCakes118.exe 31 PID 1708 wrote to memory of 1652 1708 c5c9cc18ecfdf1dd5e77163539206ce1_JaffaCakes118.exe 31 PID 1708 wrote to memory of 1652 1708 c5c9cc18ecfdf1dd5e77163539206ce1_JaffaCakes118.exe 31 PID 1708 wrote to memory of 1652 1708 c5c9cc18ecfdf1dd5e77163539206ce1_JaffaCakes118.exe 31 PID 1708 wrote to memory of 1652 1708 c5c9cc18ecfdf1dd5e77163539206ce1_JaffaCakes118.exe 31 PID 1708 wrote to memory of 1652 1708 c5c9cc18ecfdf1dd5e77163539206ce1_JaffaCakes118.exe 31 PID 1708 wrote to memory of 1652 1708 c5c9cc18ecfdf1dd5e77163539206ce1_JaffaCakes118.exe 31 PID 1652 wrote to memory of 276 1652 c5c9cc18ecfdf1dd5e77163539206ce1_JaffaCakes118.exe 32 PID 1652 wrote to memory of 276 1652 c5c9cc18ecfdf1dd5e77163539206ce1_JaffaCakes118.exe 32 PID 1652 wrote to memory of 276 1652 c5c9cc18ecfdf1dd5e77163539206ce1_JaffaCakes118.exe 32 PID 1652 wrote to memory of 276 1652 c5c9cc18ecfdf1dd5e77163539206ce1_JaffaCakes118.exe 32 PID 276 wrote to memory of 2828 276 igfxwk32.exe 33 PID 276 wrote to memory of 2828 276 igfxwk32.exe 33 PID 276 wrote to memory of 2828 276 igfxwk32.exe 33 PID 276 wrote to memory of 2828 276 igfxwk32.exe 33 PID 276 wrote to memory of 2828 276 igfxwk32.exe 33 PID 276 wrote to memory of 2828 276 igfxwk32.exe 33 PID 276 wrote to memory of 2828 276 igfxwk32.exe 33 PID 2828 wrote to memory of 2592 2828 igfxwk32.exe 34 PID 2828 wrote to memory of 2592 2828 igfxwk32.exe 34 PID 2828 wrote to memory of 2592 2828 igfxwk32.exe 34 PID 2828 wrote to memory of 2592 2828 igfxwk32.exe 34 PID 2592 wrote to memory of 2568 2592 igfxwk32.exe 35 PID 2592 wrote to memory of 2568 2592 igfxwk32.exe 35 PID 2592 wrote to memory of 2568 2592 igfxwk32.exe 35 PID 2592 wrote to memory of 2568 2592 igfxwk32.exe 35 PID 2592 wrote to memory of 2568 2592 igfxwk32.exe 35 PID 2592 wrote to memory of 2568 2592 igfxwk32.exe 35 PID 2592 wrote to memory of 2568 2592 igfxwk32.exe 35 PID 2568 wrote to memory of 3056 2568 igfxwk32.exe 36 PID 2568 wrote to memory of 3056 2568 igfxwk32.exe 36 PID 2568 wrote to memory of 3056 2568 igfxwk32.exe 36 PID 2568 wrote to memory of 3056 2568 igfxwk32.exe 36 PID 3056 wrote to memory of 2868 3056 igfxwk32.exe 37 PID 3056 wrote to memory of 2868 3056 igfxwk32.exe 37 PID 3056 wrote to memory of 2868 3056 igfxwk32.exe 37 PID 3056 wrote to memory of 2868 3056 igfxwk32.exe 37 PID 3056 wrote to memory of 2868 3056 igfxwk32.exe 37 PID 3056 wrote to memory of 2868 3056 igfxwk32.exe 37 PID 3056 wrote to memory of 2868 3056 igfxwk32.exe 37 PID 2868 wrote to memory of 2920 2868 igfxwk32.exe 38 PID 2868 wrote to memory of 2920 2868 igfxwk32.exe 38 PID 2868 wrote to memory of 2920 2868 igfxwk32.exe 38 PID 2868 wrote to memory of 2920 2868 igfxwk32.exe 38 PID 2920 wrote to memory of 2904 2920 igfxwk32.exe 39 PID 2920 wrote to memory of 2904 2920 igfxwk32.exe 39 PID 2920 wrote to memory of 2904 2920 igfxwk32.exe 39 PID 2920 wrote to memory of 2904 2920 igfxwk32.exe 39 PID 2920 wrote to memory of 2904 2920 igfxwk32.exe 39 PID 2920 wrote to memory of 2904 2920 igfxwk32.exe 39 PID 2920 wrote to memory of 2904 2920 igfxwk32.exe 39 PID 2904 wrote to memory of 2176 2904 igfxwk32.exe 40 PID 2904 wrote to memory of 2176 2904 igfxwk32.exe 40 PID 2904 wrote to memory of 2176 2904 igfxwk32.exe 40 PID 2904 wrote to memory of 2176 2904 igfxwk32.exe 40 PID 2176 wrote to memory of 1436 2176 igfxwk32.exe 41 PID 2176 wrote to memory of 1436 2176 igfxwk32.exe 41 PID 2176 wrote to memory of 1436 2176 igfxwk32.exe 41 PID 2176 wrote to memory of 1436 2176 igfxwk32.exe 41 PID 2176 wrote to memory of 1436 2176 igfxwk32.exe 41 PID 2176 wrote to memory of 1436 2176 igfxwk32.exe 41 PID 2176 wrote to memory of 1436 2176 igfxwk32.exe 41 PID 1436 wrote to memory of 864 1436 igfxwk32.exe 42 PID 1436 wrote to memory of 864 1436 igfxwk32.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5c9cc18ecfdf1dd5e77163539206ce1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c5c9cc18ecfdf1dd5e77163539206ce1_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\c5c9cc18ecfdf1dd5e77163539206ce1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c5c9cc18ecfdf1dd5e77163539206ce1_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Users\Admin\AppData\Local\Temp\C5C9CC~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Users\Admin\AppData\Local\Temp\C5C9CC~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:864 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2020 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1388 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:824 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:348 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2488 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1148 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2480 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1608 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2248 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2812 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2728 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2628 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1548 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:532 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2640 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2000 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1904 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:684 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe32⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:1776
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5c5c9cc18ecfdf1dd5e77163539206ce1
SHA14a15c7813fc60e06047205515901bb89094b3a4a
SHA2567bc761e7341be0a72eb4d4afff7cc1970c46cec2cf5851949b363626d04e2d22
SHA51269f8ae1277c42a0b12685e2d84cb73b5e90f3411af40fbad003d774fd4529fd414a5e2f5b8ec177ab9b5a4d6f42089ecb91e7401c9779a481d7ed7fbc24b9744