Analysis
-
max time kernel
148s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 07:51
Static task
static1
Behavioral task
behavioral1
Sample
cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe
-
Size
172KB
-
MD5
cbdc91c92ebd41d25b5b4b874db54615
-
SHA1
44dd4f1525945924981769c3e70b5b6f5e92ac72
-
SHA256
bde8fc6059c3dc79ab728e56a8bc80b19c4f6f0a527fab6aa647cb4546b313aa
-
SHA512
7d9c6ac2014713128b5bca2a1bd03d7cb90bcd4f05af53998ef679512c9ead50f1fed91637a55bb608b45d7c7a6f88b48c911b57afe8e064b5c75f97bf7ade74
-
SSDEEP
3072:UCOeDHj6J+1LPz9D+ydlXOw2Ews0DOEK6EYck0soq11o35N30tU/caQq:hOenLPz9DbRGEz0zCq1yHkticad
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 16 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxwl32.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation igfxwl32.exe -
Deletes itself 1 IoCs
pid Process 2016 igfxwl32.exe -
Executes dropped EXE 31 IoCs
pid Process 2400 igfxwl32.exe 2016 igfxwl32.exe 1168 igfxwl32.exe 4504 igfxwl32.exe 3684 igfxwl32.exe 4812 igfxwl32.exe 4080 igfxwl32.exe 1064 igfxwl32.exe 2296 igfxwl32.exe 1732 igfxwl32.exe 3608 igfxwl32.exe 4276 igfxwl32.exe 1768 igfxwl32.exe 60 igfxwl32.exe 4216 igfxwl32.exe 3504 igfxwl32.exe 636 igfxwl32.exe 3076 igfxwl32.exe 4828 igfxwl32.exe 1880 igfxwl32.exe 1700 igfxwl32.exe 1044 igfxwl32.exe 2564 igfxwl32.exe 1808 igfxwl32.exe 2532 igfxwl32.exe 4408 igfxwl32.exe 1604 igfxwl32.exe 4080 igfxwl32.exe 4268 igfxwl32.exe 2836 igfxwl32.exe 2580 igfxwl32.exe -
Maps connected drives based on registry 3 TTPs 32 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwl32.exe -
Drops file in System32 directory 48 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\ igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe File opened for modification C:\Windows\SysWOW64\igfxwl32.exe cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxwl32.exe igfxwl32.exe -
Suspicious use of SetThreadContext 16 IoCs
description pid Process procid_target PID 4748 set thread context of 1452 4748 cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe 82 PID 2400 set thread context of 2016 2400 igfxwl32.exe 91 PID 1168 set thread context of 4504 1168 igfxwl32.exe 93 PID 3684 set thread context of 4812 3684 igfxwl32.exe 97 PID 4080 set thread context of 1064 4080 igfxwl32.exe 99 PID 2296 set thread context of 1732 2296 igfxwl32.exe 101 PID 3608 set thread context of 4276 3608 igfxwl32.exe 103 PID 1768 set thread context of 60 1768 igfxwl32.exe 105 PID 4216 set thread context of 3504 4216 igfxwl32.exe 107 PID 636 set thread context of 3076 636 igfxwl32.exe 109 PID 4828 set thread context of 1880 4828 igfxwl32.exe 111 PID 1700 set thread context of 1044 1700 igfxwl32.exe 113 PID 2564 set thread context of 1808 2564 igfxwl32.exe 115 PID 2532 set thread context of 4408 2532 igfxwl32.exe 117 PID 1604 set thread context of 4080 1604 igfxwl32.exe 119 PID 4268 set thread context of 2836 4268 igfxwl32.exe 121 -
resource yara_rule behavioral2/memory/1452-1-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1452-4-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1452-5-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1452-6-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1452-40-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2016-46-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2016-48-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2016-47-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2016-50-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4504-58-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4812-67-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1064-76-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1732-85-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4276-97-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/60-107-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3504-114-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3076-122-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1880-131-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1044-139-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1808-151-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4408-161-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4080-171-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2836-182-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 32 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwl32.exe -
Modifies registry class 16 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwl32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1452 cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe 1452 cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe 1452 cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe 1452 cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe 2016 igfxwl32.exe 2016 igfxwl32.exe 2016 igfxwl32.exe 2016 igfxwl32.exe 4504 igfxwl32.exe 4504 igfxwl32.exe 4504 igfxwl32.exe 4504 igfxwl32.exe 4812 igfxwl32.exe 4812 igfxwl32.exe 4812 igfxwl32.exe 4812 igfxwl32.exe 1064 igfxwl32.exe 1064 igfxwl32.exe 1064 igfxwl32.exe 1064 igfxwl32.exe 1732 igfxwl32.exe 1732 igfxwl32.exe 1732 igfxwl32.exe 1732 igfxwl32.exe 4276 igfxwl32.exe 4276 igfxwl32.exe 4276 igfxwl32.exe 4276 igfxwl32.exe 60 igfxwl32.exe 60 igfxwl32.exe 60 igfxwl32.exe 60 igfxwl32.exe 3504 igfxwl32.exe 3504 igfxwl32.exe 3504 igfxwl32.exe 3504 igfxwl32.exe 3076 igfxwl32.exe 3076 igfxwl32.exe 3076 igfxwl32.exe 3076 igfxwl32.exe 1880 igfxwl32.exe 1880 igfxwl32.exe 1880 igfxwl32.exe 1880 igfxwl32.exe 1044 igfxwl32.exe 1044 igfxwl32.exe 1044 igfxwl32.exe 1044 igfxwl32.exe 1808 igfxwl32.exe 1808 igfxwl32.exe 1808 igfxwl32.exe 1808 igfxwl32.exe 4408 igfxwl32.exe 4408 igfxwl32.exe 4408 igfxwl32.exe 4408 igfxwl32.exe 4080 igfxwl32.exe 4080 igfxwl32.exe 4080 igfxwl32.exe 4080 igfxwl32.exe 2836 igfxwl32.exe 2836 igfxwl32.exe 2836 igfxwl32.exe 2836 igfxwl32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4748 wrote to memory of 1452 4748 cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe 82 PID 4748 wrote to memory of 1452 4748 cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe 82 PID 4748 wrote to memory of 1452 4748 cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe 82 PID 4748 wrote to memory of 1452 4748 cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe 82 PID 4748 wrote to memory of 1452 4748 cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe 82 PID 4748 wrote to memory of 1452 4748 cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe 82 PID 4748 wrote to memory of 1452 4748 cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe 82 PID 1452 wrote to memory of 2400 1452 cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe 87 PID 1452 wrote to memory of 2400 1452 cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe 87 PID 1452 wrote to memory of 2400 1452 cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe 87 PID 2400 wrote to memory of 2016 2400 igfxwl32.exe 91 PID 2400 wrote to memory of 2016 2400 igfxwl32.exe 91 PID 2400 wrote to memory of 2016 2400 igfxwl32.exe 91 PID 2400 wrote to memory of 2016 2400 igfxwl32.exe 91 PID 2400 wrote to memory of 2016 2400 igfxwl32.exe 91 PID 2400 wrote to memory of 2016 2400 igfxwl32.exe 91 PID 2400 wrote to memory of 2016 2400 igfxwl32.exe 91 PID 2016 wrote to memory of 1168 2016 igfxwl32.exe 92 PID 2016 wrote to memory of 1168 2016 igfxwl32.exe 92 PID 2016 wrote to memory of 1168 2016 igfxwl32.exe 92 PID 1168 wrote to memory of 4504 1168 igfxwl32.exe 93 PID 1168 wrote to memory of 4504 1168 igfxwl32.exe 93 PID 1168 wrote to memory of 4504 1168 igfxwl32.exe 93 PID 1168 wrote to memory of 4504 1168 igfxwl32.exe 93 PID 1168 wrote to memory of 4504 1168 igfxwl32.exe 93 PID 1168 wrote to memory of 4504 1168 igfxwl32.exe 93 PID 1168 wrote to memory of 4504 1168 igfxwl32.exe 93 PID 4504 wrote to memory of 3684 4504 igfxwl32.exe 94 PID 4504 wrote to memory of 3684 4504 igfxwl32.exe 94 PID 4504 wrote to memory of 3684 4504 igfxwl32.exe 94 PID 3684 wrote to memory of 4812 3684 igfxwl32.exe 97 PID 3684 wrote to memory of 4812 3684 igfxwl32.exe 97 PID 3684 wrote to memory of 4812 3684 igfxwl32.exe 97 PID 3684 wrote to memory of 4812 3684 igfxwl32.exe 97 PID 3684 wrote to memory of 4812 3684 igfxwl32.exe 97 PID 3684 wrote to memory of 4812 3684 igfxwl32.exe 97 PID 3684 wrote to memory of 4812 3684 igfxwl32.exe 97 PID 4812 wrote to memory of 4080 4812 igfxwl32.exe 98 PID 4812 wrote to memory of 4080 4812 igfxwl32.exe 98 PID 4812 wrote to memory of 4080 4812 igfxwl32.exe 98 PID 4080 wrote to memory of 1064 4080 igfxwl32.exe 99 PID 4080 wrote to memory of 1064 4080 igfxwl32.exe 99 PID 4080 wrote to memory of 1064 4080 igfxwl32.exe 99 PID 4080 wrote to memory of 1064 4080 igfxwl32.exe 99 PID 4080 wrote to memory of 1064 4080 igfxwl32.exe 99 PID 4080 wrote to memory of 1064 4080 igfxwl32.exe 99 PID 4080 wrote to memory of 1064 4080 igfxwl32.exe 99 PID 1064 wrote to memory of 2296 1064 igfxwl32.exe 100 PID 1064 wrote to memory of 2296 1064 igfxwl32.exe 100 PID 1064 wrote to memory of 2296 1064 igfxwl32.exe 100 PID 2296 wrote to memory of 1732 2296 igfxwl32.exe 101 PID 2296 wrote to memory of 1732 2296 igfxwl32.exe 101 PID 2296 wrote to memory of 1732 2296 igfxwl32.exe 101 PID 2296 wrote to memory of 1732 2296 igfxwl32.exe 101 PID 2296 wrote to memory of 1732 2296 igfxwl32.exe 101 PID 2296 wrote to memory of 1732 2296 igfxwl32.exe 101 PID 2296 wrote to memory of 1732 2296 igfxwl32.exe 101 PID 1732 wrote to memory of 3608 1732 igfxwl32.exe 102 PID 1732 wrote to memory of 3608 1732 igfxwl32.exe 102 PID 1732 wrote to memory of 3608 1732 igfxwl32.exe 102 PID 3608 wrote to memory of 4276 3608 igfxwl32.exe 103 PID 3608 wrote to memory of 4276 3608 igfxwl32.exe 103 PID 3608 wrote to memory of 4276 3608 igfxwl32.exe 103 PID 3608 wrote to memory of 4276 3608 igfxwl32.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cbdc91c92ebd41d25b5b4b874db54615_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Users\Admin\AppData\Local\Temp\CBDC91~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Users\Admin\AppData\Local\Temp\CBDC91~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4276 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1768 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:60 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4216 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3504 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:636 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3076 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4828 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1880 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1700 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1044 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2564 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1808 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2532 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4408 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1604 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4080 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4268 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe32⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2836 -
C:\Windows\SysWOW64\igfxwl32.exe"C:\Windows\system32\igfxwl32.exe" C:\Windows\SysWOW64\igfxwl32.exe33⤵
- Executes dropped EXE
PID:2580
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD5cbdc91c92ebd41d25b5b4b874db54615
SHA144dd4f1525945924981769c3e70b5b6f5e92ac72
SHA256bde8fc6059c3dc79ab728e56a8bc80b19c4f6f0a527fab6aa647cb4546b313aa
SHA5127d9c6ac2014713128b5bca2a1bd03d7cb90bcd4f05af53998ef679512c9ead50f1fed91637a55bb608b45d7c7a6f88b48c911b57afe8e064b5c75f97bf7ade74