Analysis
-
max time kernel
148s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 07:51
Static task
static1
Behavioral task
behavioral1
Sample
cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe
-
Size
172KB
-
MD5
cbdc91c92ebd41d25b5b4b874db54615
-
SHA1
44dd4f1525945924981769c3e70b5b6f5e92ac72
-
SHA256
bde8fc6059c3dc79ab728e56a8bc80b19c4f6f0a527fab6aa647cb4546b313aa
-
SHA512
7d9c6ac2014713128b5bca2a1bd03d7cb90bcd4f05af53998ef679512c9ead50f1fed91637a55bb608b45d7c7a6f88b48c911b57afe8e064b5c75f97bf7ade74
-
SSDEEP
3072:UCOeDHj6J+1LPz9D+ydlXOw2Ews0DOEK6EYck0soq11o35N30tU/caQq:hOenLPz9DbRGEz0zCq1yHkticad
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2696 igfxwl32.exe -
Executes dropped EXE 33 IoCs
pid Process 2640 igfxwl32.exe 2696 igfxwl32.exe 2144 igfxwl32.exe 3016 igfxwl32.exe 2060 igfxwl32.exe 1676 igfxwl32.exe 2832 igfxwl32.exe 2004 igfxwl32.exe 1784 igfxwl32.exe 3064 igfxwl32.exe 408 igfxwl32.exe 2032 igfxwl32.exe 3056 igfxwl32.exe 1604 igfxwl32.exe 1940 igfxwl32.exe 1492 igfxwl32.exe 1780 igfxwl32.exe 2632 igfxwl32.exe 2648 igfxwl32.exe 2896 igfxwl32.exe 2992 igfxwl32.exe 1748 igfxwl32.exe 2164 igfxwl32.exe 2820 igfxwl32.exe 2960 igfxwl32.exe 2964 igfxwl32.exe 2808 igfxwl32.exe 1032 igfxwl32.exe 1040 igfxwl32.exe 1144 igfxwl32.exe 1876 igfxwl32.exe 2484 igfxwl32.exe 2352 igfxwl32.exe -
Loads dropped DLL 33 IoCs
pid Process 2664 cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe 2640 igfxwl32.exe 2696 igfxwl32.exe 2144 igfxwl32.exe 3016 igfxwl32.exe 2060 igfxwl32.exe 1676 igfxwl32.exe 2832 igfxwl32.exe 2004 igfxwl32.exe 1784 igfxwl32.exe 3064 igfxwl32.exe 408 igfxwl32.exe 2032 igfxwl32.exe 3056 igfxwl32.exe 1604 igfxwl32.exe 1940 igfxwl32.exe 1492 igfxwl32.exe 1780 igfxwl32.exe 2632 igfxwl32.exe 2648 igfxwl32.exe 2896 igfxwl32.exe 2992 igfxwl32.exe 1748 igfxwl32.exe 2164 igfxwl32.exe 2820 igfxwl32.exe 2960 igfxwl32.exe 2964 igfxwl32.exe 2808 igfxwl32.exe 1032 igfxwl32.exe 1040 igfxwl32.exe 1144 igfxwl32.exe 1876 igfxwl32.exe 2484 igfxwl32.exe -
Maps connected drives based on registry 3 TTPs 34 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe -
Drops file in System32 directory 51 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxwl32.exe cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe -
Suspicious use of SetThreadContext 16 IoCs
description pid Process procid_target PID 288 set thread context of 2664 288 cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe 30 PID 2640 set thread context of 2696 2640 igfxwl32.exe 32 PID 2144 set thread context of 3016 2144 igfxwl32.exe 34 PID 2060 set thread context of 1676 2060 igfxwl32.exe 36 PID 2832 set thread context of 2004 2832 igfxwl32.exe 38 PID 1784 set thread context of 3064 1784 igfxwl32.exe 40 PID 408 set thread context of 2032 408 igfxwl32.exe 42 PID 3056 set thread context of 1604 3056 igfxwl32.exe 44 PID 1940 set thread context of 1492 1940 igfxwl32.exe 47 PID 2648 set thread context of 2896 2648 igfxwl32.exe 51 PID 2992 set thread context of 1748 2992 igfxwl32.exe 53 PID 2164 set thread context of 2820 2164 igfxwl32.exe 55 PID 2960 set thread context of 2964 2960 igfxwl32.exe 57 PID 2808 set thread context of 1032 2808 igfxwl32.exe 59 PID 1040 set thread context of 1144 1040 igfxwl32.exe 61 PID 1876 set thread context of 2484 1876 igfxwl32.exe 63 -
resource yara_rule behavioral1/memory/2664-4-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2664-11-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2664-9-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2664-8-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2664-5-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2664-3-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2664-10-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2664-21-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2696-32-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2696-35-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2696-33-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2696-34-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2696-41-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/3016-55-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/3016-54-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/3016-56-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/3016-61-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1676-76-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1676-79-0x00000000030E0000-0x0000000003115000-memory.dmp upx behavioral1/memory/1676-83-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2004-96-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2004-98-0x0000000002F00000-0x0000000002F35000-memory.dmp upx behavioral1/memory/2004-101-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/3064-115-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/3064-114-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/3064-113-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/3064-121-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2032-134-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2032-141-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1604-160-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1492-179-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2632-193-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2896-205-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2896-213-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2992-215-0x0000000000240000-0x0000000000275000-memory.dmp upx behavioral1/memory/1748-225-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1748-232-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2820-250-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2964-269-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1032-284-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1144-298-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2484-312-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 34 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 2664 cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe 2664 cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe 2696 igfxwl32.exe 2696 igfxwl32.exe 3016 igfxwl32.exe 3016 igfxwl32.exe 1676 igfxwl32.exe 1676 igfxwl32.exe 2004 igfxwl32.exe 2004 igfxwl32.exe 3064 igfxwl32.exe 3064 igfxwl32.exe 2032 igfxwl32.exe 2032 igfxwl32.exe 1604 igfxwl32.exe 1604 igfxwl32.exe 1492 igfxwl32.exe 1492 igfxwl32.exe 2632 igfxwl32.exe 2632 igfxwl32.exe 2896 igfxwl32.exe 2896 igfxwl32.exe 1748 igfxwl32.exe 1748 igfxwl32.exe 2820 igfxwl32.exe 2820 igfxwl32.exe 2964 igfxwl32.exe 2964 igfxwl32.exe 1032 igfxwl32.exe 1032 igfxwl32.exe 1144 igfxwl32.exe 1144 igfxwl32.exe 2484 igfxwl32.exe 2484 igfxwl32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 288 wrote to memory of 2664 288 cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe 30 PID 288 wrote to memory of 2664 288 cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe 30 PID 288 wrote to memory of 2664 288 cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe 30 PID 288 wrote to memory of 2664 288 cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe 30 PID 288 wrote to memory of 2664 288 cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe 30 PID 288 wrote to memory of 2664 288 cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe 30 PID 288 wrote to memory of 2664 288 cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe 30 PID 2664 wrote to memory of 2640 2664 cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe 31 PID 2664 wrote to memory of 2640 2664 cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe 31 PID 2664 wrote to memory of 2640 2664 cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe 31 PID 2664 wrote to memory of 2640 2664 cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe 31 PID 2640 wrote to memory of 2696 2640 igfxwl32.exe 32 PID 2640 wrote to memory of 2696 2640 igfxwl32.exe 32 PID 2640 wrote to memory of 2696 2640 igfxwl32.exe 32 PID 2640 wrote to memory of 2696 2640 igfxwl32.exe 32 PID 2640 wrote to memory of 2696 2640 igfxwl32.exe 32 PID 2640 wrote to memory of 2696 2640 igfxwl32.exe 32 PID 2640 wrote to memory of 2696 2640 igfxwl32.exe 32 PID 2696 wrote to memory of 2144 2696 igfxwl32.exe 33 PID 2696 wrote to memory of 2144 2696 igfxwl32.exe 33 PID 2696 wrote to memory of 2144 2696 igfxwl32.exe 33 PID 2696 wrote to memory of 2144 2696 igfxwl32.exe 33 PID 2144 wrote to memory of 3016 2144 igfxwl32.exe 34 PID 2144 wrote to memory of 3016 2144 igfxwl32.exe 34 PID 2144 wrote to memory of 3016 2144 igfxwl32.exe 34 PID 2144 wrote to memory of 3016 2144 igfxwl32.exe 34 PID 2144 wrote to memory of 3016 2144 igfxwl32.exe 34 PID 2144 wrote to memory of 3016 2144 igfxwl32.exe 34 PID 2144 wrote to memory of 3016 2144 igfxwl32.exe 34 PID 3016 wrote to memory of 2060 3016 igfxwl32.exe 35 PID 3016 wrote to memory of 2060 3016 igfxwl32.exe 35 PID 3016 wrote to memory of 2060 3016 igfxwl32.exe 35 PID 3016 wrote to memory of 2060 3016 igfxwl32.exe 35 PID 2060 wrote to memory of 1676 2060 igfxwl32.exe 36 PID 2060 wrote to memory of 1676 2060 igfxwl32.exe 36 PID 2060 wrote to memory of 1676 2060 igfxwl32.exe 36 PID 2060 wrote to memory of 1676 2060 igfxwl32.exe 36 PID 2060 wrote to memory of 1676 2060 igfxwl32.exe 36 PID 2060 wrote to memory of 1676 2060 igfxwl32.exe 36 PID 2060 wrote to memory of 1676 2060 igfxwl32.exe 36 PID 1676 wrote to memory of 2832 1676 igfxwl32.exe 37 PID 1676 wrote to memory of 2832 1676 igfxwl32.exe 37 PID 1676 wrote to memory of 2832 1676 igfxwl32.exe 37 PID 1676 wrote to memory of 2832 1676 igfxwl32.exe 37 PID 2832 wrote to memory of 2004 2832 igfxwl32.exe 38 PID 2832 wrote to memory of 2004 2832 igfxwl32.exe 38 PID 2832 wrote to memory of 2004 2832 igfxwl32.exe 38 PID 2832 wrote to memory of 2004 2832 igfxwl32.exe 38 PID 2832 wrote to memory of 2004 2832 igfxwl32.exe 38 PID 2832 wrote to memory of 2004 2832 igfxwl32.exe 38 PID 2832 wrote to memory of 2004 2832 igfxwl32.exe 38 PID 2004 wrote to memory of 1784 2004 igfxwl32.exe 39 PID 2004 wrote to memory of 1784 2004 igfxwl32.exe 39 PID 2004 wrote to memory of 1784 2004 igfxwl32.exe 39 PID 2004 wrote to memory of 1784 2004 igfxwl32.exe 39 PID 1784 wrote to memory of 3064 1784 igfxwl32.exe 40 PID 1784 wrote to memory of 3064 1784 igfxwl32.exe 40 PID 1784 wrote to memory of 3064 1784 igfxwl32.exe 40 PID 1784 wrote to memory of 3064 1784 igfxwl32.exe 40 PID 1784 wrote to memory of 3064 1784 igfxwl32.exe 40 PID 1784 wrote to memory of 3064 1784 igfxwl32.exe 40 PID 1784 wrote to memory of 3064 1784 igfxwl32.exe 40 PID 3064 wrote to memory of 408 3064 igfxwl32.exe 41 PID 3064 wrote to memory of 408 3064 igfxwl32.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:288 -
C:\Users\Admin\AppData\Local\Temp\cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Users\Admin\AppData\Local\Temp\CBDC91~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Users\Admin\AppData\Local\Temp\CBDC91~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:408 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2032 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3056 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1604 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1940 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1492 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1780 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2632 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2648 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2896 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2992 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1748 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2164 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2820 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2960 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2964 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2808 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1032 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1040 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1144 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe33⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1876 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe34⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2484 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe35⤵
- Executes dropped EXE
PID:2352
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD5cbdc91c92ebd41d25b5b4b874db54615
SHA144dd4f1525945924981769c3e70b5b6f5e92ac72
SHA256bde8fc6059c3dc79ab728e56a8bc80b19c4f6f0a527fab6aa647cb4546b313aa
SHA5127d9c6ac2014713128b5bca2a1bd03d7cb90bcd4f05af53998ef679512c9ead50f1fed91637a55bb608b45d7c7a6f88b48c911b57afe8e064b5c75f97bf7ade74