Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 11:32
Static task
static1
Behavioral task
behavioral1
Sample
c77db0d729c2ddc5c7610065a3db168d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c77db0d729c2ddc5c7610065a3db168d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
c77db0d729c2ddc5c7610065a3db168d_JaffaCakes118.exe
-
Size
244KB
-
MD5
c77db0d729c2ddc5c7610065a3db168d
-
SHA1
0eda7d1ac1bad56eba9ff8da0b81d14cdb866700
-
SHA256
ef03750b6f1d70d7d27b980f60477c806f17a4e6168ac1bff5e8cd2367aa22ae
-
SHA512
cefe6682bf07db1eefa8880e5086f5e3c2b2adb25f7b29314c49cf7f682063b530a936a64c791746aa7f06f622dbc961ed9ec98e0b5e4e64c7de0bd46c60ca30
-
SSDEEP
3072:4jx6x0SORJBiLiZhBxKrUeTST7t3phv+/1+KfskdrielYWuM9D6mIx3:U6GSORJLheOTXhv+dRskJYWuoHU3
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 15 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxrt32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxrt32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxrt32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation c77db0d729c2ddc5c7610065a3db168d_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxrt32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxrt32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxrt32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxrt32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxrt32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxrt32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxrt32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxrt32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxrt32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxrt32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation igfxrt32.exe -
Deletes itself 1 IoCs
pid Process 2560 igfxrt32.exe -
Executes dropped EXE 30 IoCs
pid Process 4244 igfxrt32.exe 2560 igfxrt32.exe 3000 igfxrt32.exe 4084 igfxrt32.exe 2072 igfxrt32.exe 1572 igfxrt32.exe 3612 igfxrt32.exe 4820 igfxrt32.exe 3040 igfxrt32.exe 4164 igfxrt32.exe 4420 igfxrt32.exe 4916 igfxrt32.exe 1112 igfxrt32.exe 4216 igfxrt32.exe 4252 igfxrt32.exe 3132 igfxrt32.exe 4708 igfxrt32.exe 1940 igfxrt32.exe 4388 igfxrt32.exe 3564 igfxrt32.exe 708 igfxrt32.exe 1432 igfxrt32.exe 1116 igfxrt32.exe 4296 igfxrt32.exe 764 igfxrt32.exe 3524 igfxrt32.exe 4716 igfxrt32.exe 5004 igfxrt32.exe 4564 igfxrt32.exe 4608 igfxrt32.exe -
Maps connected drives based on registry 3 TTPs 32 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum c77db0d729c2ddc5c7610065a3db168d_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 c77db0d729c2ddc5c7610065a3db168d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrt32.exe -
Drops file in System32 directory 46 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxrt32.exe igfxrt32.exe File opened for modification C:\Windows\SysWOW64\ igfxrt32.exe File opened for modification C:\Windows\SysWOW64\ igfxrt32.exe File opened for modification C:\Windows\SysWOW64\ igfxrt32.exe File created C:\Windows\SysWOW64\igfxrt32.exe igfxrt32.exe File created C:\Windows\SysWOW64\igfxrt32.exe igfxrt32.exe File created C:\Windows\SysWOW64\igfxrt32.exe c77db0d729c2ddc5c7610065a3db168d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxrt32.exe File opened for modification C:\Windows\SysWOW64\ igfxrt32.exe File opened for modification C:\Windows\SysWOW64\igfxrt32.exe igfxrt32.exe File opened for modification C:\Windows\SysWOW64\igfxrt32.exe igfxrt32.exe File created C:\Windows\SysWOW64\igfxrt32.exe igfxrt32.exe File created C:\Windows\SysWOW64\igfxrt32.exe igfxrt32.exe File created C:\Windows\SysWOW64\igfxrt32.exe igfxrt32.exe File opened for modification C:\Windows\SysWOW64\ igfxrt32.exe File created C:\Windows\SysWOW64\igfxrt32.exe igfxrt32.exe File opened for modification C:\Windows\SysWOW64\ igfxrt32.exe File opened for modification C:\Windows\SysWOW64\ igfxrt32.exe File created C:\Windows\SysWOW64\igfxrt32.exe igfxrt32.exe File opened for modification C:\Windows\SysWOW64\igfxrt32.exe igfxrt32.exe File opened for modification C:\Windows\SysWOW64\igfxrt32.exe igfxrt32.exe File created C:\Windows\SysWOW64\igfxrt32.exe igfxrt32.exe File opened for modification C:\Windows\SysWOW64\igfxrt32.exe igfxrt32.exe File opened for modification C:\Windows\SysWOW64\ igfxrt32.exe File opened for modification C:\Windows\SysWOW64\igfxrt32.exe igfxrt32.exe File created C:\Windows\SysWOW64\igfxrt32.exe igfxrt32.exe File opened for modification C:\Windows\SysWOW64\igfxrt32.exe igfxrt32.exe File opened for modification C:\Windows\SysWOW64\igfxrt32.exe igfxrt32.exe File created C:\Windows\SysWOW64\igfxrt32.exe igfxrt32.exe File opened for modification C:\Windows\SysWOW64\ igfxrt32.exe File opened for modification C:\Windows\SysWOW64\ igfxrt32.exe File opened for modification C:\Windows\SysWOW64\igfxrt32.exe igfxrt32.exe File opened for modification C:\Windows\SysWOW64\ igfxrt32.exe File opened for modification C:\Windows\SysWOW64\igfxrt32.exe igfxrt32.exe File created C:\Windows\SysWOW64\igfxrt32.exe igfxrt32.exe File opened for modification C:\Windows\SysWOW64\ igfxrt32.exe File opened for modification C:\Windows\SysWOW64\igfxrt32.exe igfxrt32.exe File opened for modification C:\Windows\SysWOW64\ igfxrt32.exe File opened for modification C:\Windows\SysWOW64\ igfxrt32.exe File created C:\Windows\SysWOW64\igfxrt32.exe igfxrt32.exe File opened for modification C:\Windows\SysWOW64\ c77db0d729c2ddc5c7610065a3db168d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxrt32.exe c77db0d729c2ddc5c7610065a3db168d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxrt32.exe igfxrt32.exe File opened for modification C:\Windows\SysWOW64\igfxrt32.exe igfxrt32.exe File created C:\Windows\SysWOW64\igfxrt32.exe igfxrt32.exe File created C:\Windows\SysWOW64\igfxrt32.exe igfxrt32.exe -
Suspicious use of SetThreadContext 16 IoCs
description pid Process procid_target PID 4916 set thread context of 4220 4916 c77db0d729c2ddc5c7610065a3db168d_JaffaCakes118.exe 83 PID 4244 set thread context of 2560 4244 igfxrt32.exe 86 PID 3000 set thread context of 4084 3000 igfxrt32.exe 100 PID 2072 set thread context of 1572 2072 igfxrt32.exe 104 PID 3612 set thread context of 4820 3612 igfxrt32.exe 107 PID 3040 set thread context of 4164 3040 igfxrt32.exe 109 PID 4420 set thread context of 4916 4420 igfxrt32.exe 111 PID 1112 set thread context of 4216 1112 igfxrt32.exe 113 PID 4252 set thread context of 3132 4252 igfxrt32.exe 115 PID 4708 set thread context of 1940 4708 igfxrt32.exe 117 PID 4388 set thread context of 3564 4388 igfxrt32.exe 119 PID 708 set thread context of 1432 708 igfxrt32.exe 121 PID 1116 set thread context of 4296 1116 igfxrt32.exe 123 PID 764 set thread context of 3524 764 igfxrt32.exe 125 PID 4716 set thread context of 5004 4716 igfxrt32.exe 127 PID 4564 set thread context of 4608 4564 igfxrt32.exe 129 -
resource yara_rule behavioral2/memory/4220-0-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/4220-2-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/4220-3-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/4220-4-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/4220-31-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/2560-44-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/4220-45-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/2560-47-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/2560-56-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/1572-64-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/1572-65-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/1572-63-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/4084-60-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/1572-70-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/4820-78-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/4820-82-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/4164-87-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/4164-90-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/4916-96-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/4216-104-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/3132-112-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/1940-120-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/1940-122-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/3564-126-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/1432-133-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/4296-139-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/4296-144-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/4296-147-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/3524-152-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/5004-161-0x0000000000400000-0x0000000000451000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 31 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c77db0d729c2ddc5c7610065a3db168d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c77db0d729c2ddc5c7610065a3db168d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrt32.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrt32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrt32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrt32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrt32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrt32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrt32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrt32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrt32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ c77db0d729c2ddc5c7610065a3db168d_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrt32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrt32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrt32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrt32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrt32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrt32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4220 c77db0d729c2ddc5c7610065a3db168d_JaffaCakes118.exe 4220 c77db0d729c2ddc5c7610065a3db168d_JaffaCakes118.exe 4220 c77db0d729c2ddc5c7610065a3db168d_JaffaCakes118.exe 4220 c77db0d729c2ddc5c7610065a3db168d_JaffaCakes118.exe 2560 igfxrt32.exe 2560 igfxrt32.exe 2560 igfxrt32.exe 2560 igfxrt32.exe 4084 igfxrt32.exe 4084 igfxrt32.exe 4084 igfxrt32.exe 4084 igfxrt32.exe 1572 igfxrt32.exe 1572 igfxrt32.exe 1572 igfxrt32.exe 1572 igfxrt32.exe 4820 igfxrt32.exe 4820 igfxrt32.exe 4820 igfxrt32.exe 4820 igfxrt32.exe 4164 igfxrt32.exe 4164 igfxrt32.exe 4164 igfxrt32.exe 4164 igfxrt32.exe 4916 igfxrt32.exe 4916 igfxrt32.exe 4916 igfxrt32.exe 4916 igfxrt32.exe 4216 igfxrt32.exe 4216 igfxrt32.exe 4216 igfxrt32.exe 4216 igfxrt32.exe 3132 igfxrt32.exe 3132 igfxrt32.exe 3132 igfxrt32.exe 3132 igfxrt32.exe 1940 igfxrt32.exe 1940 igfxrt32.exe 1940 igfxrt32.exe 1940 igfxrt32.exe 3564 igfxrt32.exe 3564 igfxrt32.exe 3564 igfxrt32.exe 3564 igfxrt32.exe 1432 igfxrt32.exe 1432 igfxrt32.exe 1432 igfxrt32.exe 1432 igfxrt32.exe 4296 igfxrt32.exe 4296 igfxrt32.exe 4296 igfxrt32.exe 4296 igfxrt32.exe 3524 igfxrt32.exe 3524 igfxrt32.exe 3524 igfxrt32.exe 3524 igfxrt32.exe 5004 igfxrt32.exe 5004 igfxrt32.exe 5004 igfxrt32.exe 5004 igfxrt32.exe 4608 igfxrt32.exe 4608 igfxrt32.exe 4608 igfxrt32.exe 4608 igfxrt32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4916 wrote to memory of 4220 4916 c77db0d729c2ddc5c7610065a3db168d_JaffaCakes118.exe 83 PID 4916 wrote to memory of 4220 4916 c77db0d729c2ddc5c7610065a3db168d_JaffaCakes118.exe 83 PID 4916 wrote to memory of 4220 4916 c77db0d729c2ddc5c7610065a3db168d_JaffaCakes118.exe 83 PID 4916 wrote to memory of 4220 4916 c77db0d729c2ddc5c7610065a3db168d_JaffaCakes118.exe 83 PID 4916 wrote to memory of 4220 4916 c77db0d729c2ddc5c7610065a3db168d_JaffaCakes118.exe 83 PID 4916 wrote to memory of 4220 4916 c77db0d729c2ddc5c7610065a3db168d_JaffaCakes118.exe 83 PID 4916 wrote to memory of 4220 4916 c77db0d729c2ddc5c7610065a3db168d_JaffaCakes118.exe 83 PID 4220 wrote to memory of 4244 4220 c77db0d729c2ddc5c7610065a3db168d_JaffaCakes118.exe 85 PID 4220 wrote to memory of 4244 4220 c77db0d729c2ddc5c7610065a3db168d_JaffaCakes118.exe 85 PID 4220 wrote to memory of 4244 4220 c77db0d729c2ddc5c7610065a3db168d_JaffaCakes118.exe 85 PID 4244 wrote to memory of 2560 4244 igfxrt32.exe 86 PID 4244 wrote to memory of 2560 4244 igfxrt32.exe 86 PID 4244 wrote to memory of 2560 4244 igfxrt32.exe 86 PID 4244 wrote to memory of 2560 4244 igfxrt32.exe 86 PID 4244 wrote to memory of 2560 4244 igfxrt32.exe 86 PID 4244 wrote to memory of 2560 4244 igfxrt32.exe 86 PID 4244 wrote to memory of 2560 4244 igfxrt32.exe 86 PID 2560 wrote to memory of 3000 2560 igfxrt32.exe 99 PID 2560 wrote to memory of 3000 2560 igfxrt32.exe 99 PID 2560 wrote to memory of 3000 2560 igfxrt32.exe 99 PID 3000 wrote to memory of 4084 3000 igfxrt32.exe 100 PID 3000 wrote to memory of 4084 3000 igfxrt32.exe 100 PID 3000 wrote to memory of 4084 3000 igfxrt32.exe 100 PID 3000 wrote to memory of 4084 3000 igfxrt32.exe 100 PID 3000 wrote to memory of 4084 3000 igfxrt32.exe 100 PID 3000 wrote to memory of 4084 3000 igfxrt32.exe 100 PID 3000 wrote to memory of 4084 3000 igfxrt32.exe 100 PID 4084 wrote to memory of 2072 4084 igfxrt32.exe 102 PID 4084 wrote to memory of 2072 4084 igfxrt32.exe 102 PID 4084 wrote to memory of 2072 4084 igfxrt32.exe 102 PID 2072 wrote to memory of 1572 2072 igfxrt32.exe 104 PID 2072 wrote to memory of 1572 2072 igfxrt32.exe 104 PID 2072 wrote to memory of 1572 2072 igfxrt32.exe 104 PID 2072 wrote to memory of 1572 2072 igfxrt32.exe 104 PID 2072 wrote to memory of 1572 2072 igfxrt32.exe 104 PID 2072 wrote to memory of 1572 2072 igfxrt32.exe 104 PID 2072 wrote to memory of 1572 2072 igfxrt32.exe 104 PID 1572 wrote to memory of 3612 1572 igfxrt32.exe 106 PID 1572 wrote to memory of 3612 1572 igfxrt32.exe 106 PID 1572 wrote to memory of 3612 1572 igfxrt32.exe 106 PID 3612 wrote to memory of 4820 3612 igfxrt32.exe 107 PID 3612 wrote to memory of 4820 3612 igfxrt32.exe 107 PID 3612 wrote to memory of 4820 3612 igfxrt32.exe 107 PID 3612 wrote to memory of 4820 3612 igfxrt32.exe 107 PID 3612 wrote to memory of 4820 3612 igfxrt32.exe 107 PID 3612 wrote to memory of 4820 3612 igfxrt32.exe 107 PID 3612 wrote to memory of 4820 3612 igfxrt32.exe 107 PID 4820 wrote to memory of 3040 4820 igfxrt32.exe 108 PID 4820 wrote to memory of 3040 4820 igfxrt32.exe 108 PID 4820 wrote to memory of 3040 4820 igfxrt32.exe 108 PID 3040 wrote to memory of 4164 3040 igfxrt32.exe 109 PID 3040 wrote to memory of 4164 3040 igfxrt32.exe 109 PID 3040 wrote to memory of 4164 3040 igfxrt32.exe 109 PID 3040 wrote to memory of 4164 3040 igfxrt32.exe 109 PID 3040 wrote to memory of 4164 3040 igfxrt32.exe 109 PID 3040 wrote to memory of 4164 3040 igfxrt32.exe 109 PID 3040 wrote to memory of 4164 3040 igfxrt32.exe 109 PID 4164 wrote to memory of 4420 4164 igfxrt32.exe 110 PID 4164 wrote to memory of 4420 4164 igfxrt32.exe 110 PID 4164 wrote to memory of 4420 4164 igfxrt32.exe 110 PID 4420 wrote to memory of 4916 4420 igfxrt32.exe 111 PID 4420 wrote to memory of 4916 4420 igfxrt32.exe 111 PID 4420 wrote to memory of 4916 4420 igfxrt32.exe 111 PID 4420 wrote to memory of 4916 4420 igfxrt32.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\c77db0d729c2ddc5c7610065a3db168d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c77db0d729c2ddc5c7610065a3db168d_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\c77db0d729c2ddc5c7610065a3db168d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c77db0d729c2ddc5c7610065a3db168d_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\SysWOW64\igfxrt32.exe"C:\Windows\system32\igfxrt32.exe" C:\Users\Admin\AppData\Local\Temp\C77DB0~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\SysWOW64\igfxrt32.exe"C:\Windows\system32\igfxrt32.exe" C:\Users\Admin\AppData\Local\Temp\C77DB0~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\igfxrt32.exe"C:\Windows\system32\igfxrt32.exe" C:\Windows\SysWOW64\igfxrt32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\igfxrt32.exe"C:\Windows\system32\igfxrt32.exe" C:\Windows\SysWOW64\igfxrt32.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\SysWOW64\igfxrt32.exe"C:\Windows\system32\igfxrt32.exe" C:\Windows\SysWOW64\igfxrt32.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\igfxrt32.exe"C:\Windows\system32\igfxrt32.exe" C:\Windows\SysWOW64\igfxrt32.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\igfxrt32.exe"C:\Windows\system32\igfxrt32.exe" C:\Windows\SysWOW64\igfxrt32.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\SysWOW64\igfxrt32.exe"C:\Windows\system32\igfxrt32.exe" C:\Windows\SysWOW64\igfxrt32.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\igfxrt32.exe"C:\Windows\system32\igfxrt32.exe" C:\Windows\SysWOW64\igfxrt32.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\igfxrt32.exe"C:\Windows\system32\igfxrt32.exe" C:\Windows\SysWOW64\igfxrt32.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Windows\SysWOW64\igfxrt32.exe"C:\Windows\system32\igfxrt32.exe" C:\Windows\SysWOW64\igfxrt32.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\SysWOW64\igfxrt32.exe"C:\Windows\system32\igfxrt32.exe" C:\Windows\SysWOW64\igfxrt32.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4916 -
C:\Windows\SysWOW64\igfxrt32.exe"C:\Windows\system32\igfxrt32.exe" C:\Windows\SysWOW64\igfxrt32.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1112 -
C:\Windows\SysWOW64\igfxrt32.exe"C:\Windows\system32\igfxrt32.exe" C:\Windows\SysWOW64\igfxrt32.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4216 -
C:\Windows\SysWOW64\igfxrt32.exe"C:\Windows\system32\igfxrt32.exe" C:\Windows\SysWOW64\igfxrt32.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4252 -
C:\Windows\SysWOW64\igfxrt32.exe"C:\Windows\system32\igfxrt32.exe" C:\Windows\SysWOW64\igfxrt32.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3132 -
C:\Windows\SysWOW64\igfxrt32.exe"C:\Windows\system32\igfxrt32.exe" C:\Windows\SysWOW64\igfxrt32.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4708 -
C:\Windows\SysWOW64\igfxrt32.exe"C:\Windows\system32\igfxrt32.exe" C:\Windows\SysWOW64\igfxrt32.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1940 -
C:\Windows\SysWOW64\igfxrt32.exe"C:\Windows\system32\igfxrt32.exe" C:\Windows\SysWOW64\igfxrt32.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4388 -
C:\Windows\SysWOW64\igfxrt32.exe"C:\Windows\system32\igfxrt32.exe" C:\Windows\SysWOW64\igfxrt32.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3564 -
C:\Windows\SysWOW64\igfxrt32.exe"C:\Windows\system32\igfxrt32.exe" C:\Windows\SysWOW64\igfxrt32.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:708 -
C:\Windows\SysWOW64\igfxrt32.exe"C:\Windows\system32\igfxrt32.exe" C:\Windows\SysWOW64\igfxrt32.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1432 -
C:\Windows\SysWOW64\igfxrt32.exe"C:\Windows\system32\igfxrt32.exe" C:\Windows\SysWOW64\igfxrt32.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1116 -
C:\Windows\SysWOW64\igfxrt32.exe"C:\Windows\system32\igfxrt32.exe" C:\Windows\SysWOW64\igfxrt32.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4296 -
C:\Windows\SysWOW64\igfxrt32.exe"C:\Windows\system32\igfxrt32.exe" C:\Windows\SysWOW64\igfxrt32.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:764 -
C:\Windows\SysWOW64\igfxrt32.exe"C:\Windows\system32\igfxrt32.exe" C:\Windows\SysWOW64\igfxrt32.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3524 -
C:\Windows\SysWOW64\igfxrt32.exe"C:\Windows\system32\igfxrt32.exe" C:\Windows\SysWOW64\igfxrt32.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4716 -
C:\Windows\SysWOW64\igfxrt32.exe"C:\Windows\system32\igfxrt32.exe" C:\Windows\SysWOW64\igfxrt32.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5004 -
C:\Windows\SysWOW64\igfxrt32.exe"C:\Windows\system32\igfxrt32.exe" C:\Windows\SysWOW64\igfxrt32.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4564 -
C:\Windows\SysWOW64\igfxrt32.exe"C:\Windows\system32\igfxrt32.exe" C:\Windows\SysWOW64\igfxrt32.exe32⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4608
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD5c77db0d729c2ddc5c7610065a3db168d
SHA10eda7d1ac1bad56eba9ff8da0b81d14cdb866700
SHA256ef03750b6f1d70d7d27b980f60477c806f17a4e6168ac1bff5e8cd2367aa22ae
SHA512cefe6682bf07db1eefa8880e5086f5e3c2b2adb25f7b29314c49cf7f682063b530a936a64c791746aa7f06f622dbc961ed9ec98e0b5e4e64c7de0bd46c60ca30