Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 09:27
Static task
static1
Behavioral task
behavioral1
Sample
f85dfc3c6d0cb691d7341f063a3266c3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f85dfc3c6d0cb691d7341f063a3266c3_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f85dfc3c6d0cb691d7341f063a3266c3_JaffaCakes118.exe
-
Size
220KB
-
MD5
f85dfc3c6d0cb691d7341f063a3266c3
-
SHA1
eb353f245d504107b9007d43bb4dfc96c1b300a8
-
SHA256
4b95ec1f9aeb58dbe173f08afd61004ddf7d1b28a3f96ed25f19792092328a43
-
SHA512
310a8d9be8f0cf17acc8e1f66e61ac99a5fdd5c3effd283bc61f91886a7863dd553130f433865e77a7d5530b45b5a3395fcf9d20acc91e54f921cff40180fc62
-
SSDEEP
3072:W0QEWBtDGLizq1M49YrltEr53LZnwh2e8EjuAbe/1fGyWxvBO61xf5VorCYnFTe:W0afq1MKltnwh58d/ZGyI5d1p5VorCWs
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2768 igfxrk32.exe -
Executes dropped EXE 30 IoCs
pid Process 2288 igfxrk32.exe 2768 igfxrk32.exe 2080 igfxrk32.exe 2612 igfxrk32.exe 1740 igfxrk32.exe 1844 igfxrk32.exe 680 igfxrk32.exe 1068 igfxrk32.exe 2896 igfxrk32.exe 592 igfxrk32.exe 2300 igfxrk32.exe 2560 igfxrk32.exe 1580 igfxrk32.exe 1516 igfxrk32.exe 2424 igfxrk32.exe 2920 igfxrk32.exe 2120 igfxrk32.exe 1532 igfxrk32.exe 2100 igfxrk32.exe 2720 igfxrk32.exe 2752 igfxrk32.exe 2620 igfxrk32.exe 2276 igfxrk32.exe 2764 igfxrk32.exe 2484 igfxrk32.exe 1832 igfxrk32.exe 1632 igfxrk32.exe 1816 igfxrk32.exe 2812 igfxrk32.exe 1588 igfxrk32.exe -
Loads dropped DLL 60 IoCs
pid Process 2380 f85dfc3c6d0cb691d7341f063a3266c3_JaffaCakes118.exe 2380 f85dfc3c6d0cb691d7341f063a3266c3_JaffaCakes118.exe 2288 igfxrk32.exe 2288 igfxrk32.exe 2768 igfxrk32.exe 2768 igfxrk32.exe 2080 igfxrk32.exe 2080 igfxrk32.exe 2612 igfxrk32.exe 2612 igfxrk32.exe 1740 igfxrk32.exe 1740 igfxrk32.exe 1844 igfxrk32.exe 1844 igfxrk32.exe 680 igfxrk32.exe 680 igfxrk32.exe 1068 igfxrk32.exe 1068 igfxrk32.exe 2896 igfxrk32.exe 2896 igfxrk32.exe 592 igfxrk32.exe 592 igfxrk32.exe 2300 igfxrk32.exe 2300 igfxrk32.exe 2560 igfxrk32.exe 2560 igfxrk32.exe 1580 igfxrk32.exe 1580 igfxrk32.exe 1516 igfxrk32.exe 1516 igfxrk32.exe 2424 igfxrk32.exe 2424 igfxrk32.exe 2920 igfxrk32.exe 2920 igfxrk32.exe 2120 igfxrk32.exe 2120 igfxrk32.exe 1532 igfxrk32.exe 1532 igfxrk32.exe 2100 igfxrk32.exe 2100 igfxrk32.exe 2720 igfxrk32.exe 2720 igfxrk32.exe 2752 igfxrk32.exe 2752 igfxrk32.exe 2620 igfxrk32.exe 2620 igfxrk32.exe 2276 igfxrk32.exe 2276 igfxrk32.exe 2764 igfxrk32.exe 2764 igfxrk32.exe 2484 igfxrk32.exe 2484 igfxrk32.exe 1832 igfxrk32.exe 1832 igfxrk32.exe 1632 igfxrk32.exe 1632 igfxrk32.exe 1816 igfxrk32.exe 1816 igfxrk32.exe 2812 igfxrk32.exe 2812 igfxrk32.exe -
Maps connected drives based on registry 3 TTPs 32 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxrk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxrk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxrk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxrk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum f85dfc3c6d0cb691d7341f063a3266c3_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxrk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxrk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxrk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 f85dfc3c6d0cb691d7341f063a3266c3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrk32.exe -
Drops file in System32 directory 46 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ igfxrk32.exe File opened for modification C:\Windows\SysWOW64\ f85dfc3c6d0cb691d7341f063a3266c3_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxrk32.exe f85dfc3c6d0cb691d7341f063a3266c3_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxrk32.exe f85dfc3c6d0cb691d7341f063a3266c3_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxrk32.exe File opened for modification C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File created C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File opened for modification C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File opened for modification C:\Windows\SysWOW64\ igfxrk32.exe File created C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File opened for modification C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File opened for modification C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File opened for modification C:\Windows\SysWOW64\ igfxrk32.exe File created C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File created C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File opened for modification C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File opened for modification C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File opened for modification C:\Windows\SysWOW64\ igfxrk32.exe File opened for modification C:\Windows\SysWOW64\ igfxrk32.exe File created C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File opened for modification C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File created C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File created C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File opened for modification C:\Windows\SysWOW64\ igfxrk32.exe File created C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File created C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File created C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File opened for modification C:\Windows\SysWOW64\ igfxrk32.exe File created C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File opened for modification C:\Windows\SysWOW64\ igfxrk32.exe File opened for modification C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File opened for modification C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File opened for modification C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File created C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File opened for modification C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File opened for modification C:\Windows\SysWOW64\ igfxrk32.exe File opened for modification C:\Windows\SysWOW64\ igfxrk32.exe File opened for modification C:\Windows\SysWOW64\ igfxrk32.exe File opened for modification C:\Windows\SysWOW64\ igfxrk32.exe File opened for modification C:\Windows\SysWOW64\ igfxrk32.exe File opened for modification C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File created C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File opened for modification C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File opened for modification C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe File opened for modification C:\Windows\SysWOW64\ igfxrk32.exe File created C:\Windows\SysWOW64\igfxrk32.exe igfxrk32.exe -
Suspicious use of SetThreadContext 16 IoCs
description pid Process procid_target PID 2348 set thread context of 2380 2348 f85dfc3c6d0cb691d7341f063a3266c3_JaffaCakes118.exe 30 PID 2288 set thread context of 2768 2288 igfxrk32.exe 32 PID 2080 set thread context of 2612 2080 igfxrk32.exe 35 PID 1740 set thread context of 1844 1740 igfxrk32.exe 37 PID 680 set thread context of 1068 680 igfxrk32.exe 39 PID 2896 set thread context of 592 2896 igfxrk32.exe 41 PID 2300 set thread context of 2560 2300 igfxrk32.exe 43 PID 1580 set thread context of 1516 1580 igfxrk32.exe 45 PID 2424 set thread context of 2920 2424 igfxrk32.exe 47 PID 2120 set thread context of 1532 2120 igfxrk32.exe 49 PID 2100 set thread context of 2720 2100 igfxrk32.exe 51 PID 2752 set thread context of 2620 2752 igfxrk32.exe 53 PID 2276 set thread context of 2764 2276 igfxrk32.exe 55 PID 2484 set thread context of 1832 2484 igfxrk32.exe 57 PID 1632 set thread context of 1816 1632 igfxrk32.exe 59 PID 2812 set thread context of 1588 2812 igfxrk32.exe 61 -
resource yara_rule behavioral1/memory/2380-2-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2380-9-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2380-10-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2380-7-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2380-5-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2380-4-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2380-8-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2380-23-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2768-38-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2768-37-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2768-36-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2768-35-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2768-39-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2768-47-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2612-58-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2612-59-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2612-65-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/1844-84-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/1068-96-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/1068-95-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/1068-97-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/1068-103-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/592-122-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2560-140-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/1516-158-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2920-169-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2920-177-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/1532-195-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2720-207-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2620-215-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2620-220-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2764-228-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2764-233-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/1832-245-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/1816-253-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/1816-258-0x0000000000400000-0x0000000000451000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 31 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f85dfc3c6d0cb691d7341f063a3266c3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f85dfc3c6d0cb691d7341f063a3266c3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrk32.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2380 f85dfc3c6d0cb691d7341f063a3266c3_JaffaCakes118.exe 2380 f85dfc3c6d0cb691d7341f063a3266c3_JaffaCakes118.exe 2768 igfxrk32.exe 2768 igfxrk32.exe 2612 igfxrk32.exe 2612 igfxrk32.exe 1844 igfxrk32.exe 1844 igfxrk32.exe 1068 igfxrk32.exe 1068 igfxrk32.exe 592 igfxrk32.exe 592 igfxrk32.exe 2560 igfxrk32.exe 2560 igfxrk32.exe 1516 igfxrk32.exe 1516 igfxrk32.exe 2920 igfxrk32.exe 2920 igfxrk32.exe 1532 igfxrk32.exe 1532 igfxrk32.exe 2720 igfxrk32.exe 2720 igfxrk32.exe 2620 igfxrk32.exe 2620 igfxrk32.exe 2764 igfxrk32.exe 2764 igfxrk32.exe 1832 igfxrk32.exe 1832 igfxrk32.exe 1816 igfxrk32.exe 1816 igfxrk32.exe 1588 igfxrk32.exe 1588 igfxrk32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2380 2348 f85dfc3c6d0cb691d7341f063a3266c3_JaffaCakes118.exe 30 PID 2348 wrote to memory of 2380 2348 f85dfc3c6d0cb691d7341f063a3266c3_JaffaCakes118.exe 30 PID 2348 wrote to memory of 2380 2348 f85dfc3c6d0cb691d7341f063a3266c3_JaffaCakes118.exe 30 PID 2348 wrote to memory of 2380 2348 f85dfc3c6d0cb691d7341f063a3266c3_JaffaCakes118.exe 30 PID 2348 wrote to memory of 2380 2348 f85dfc3c6d0cb691d7341f063a3266c3_JaffaCakes118.exe 30 PID 2348 wrote to memory of 2380 2348 f85dfc3c6d0cb691d7341f063a3266c3_JaffaCakes118.exe 30 PID 2348 wrote to memory of 2380 2348 f85dfc3c6d0cb691d7341f063a3266c3_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2288 2380 f85dfc3c6d0cb691d7341f063a3266c3_JaffaCakes118.exe 31 PID 2380 wrote to memory of 2288 2380 f85dfc3c6d0cb691d7341f063a3266c3_JaffaCakes118.exe 31 PID 2380 wrote to memory of 2288 2380 f85dfc3c6d0cb691d7341f063a3266c3_JaffaCakes118.exe 31 PID 2380 wrote to memory of 2288 2380 f85dfc3c6d0cb691d7341f063a3266c3_JaffaCakes118.exe 31 PID 2288 wrote to memory of 2768 2288 igfxrk32.exe 32 PID 2288 wrote to memory of 2768 2288 igfxrk32.exe 32 PID 2288 wrote to memory of 2768 2288 igfxrk32.exe 32 PID 2288 wrote to memory of 2768 2288 igfxrk32.exe 32 PID 2288 wrote to memory of 2768 2288 igfxrk32.exe 32 PID 2288 wrote to memory of 2768 2288 igfxrk32.exe 32 PID 2288 wrote to memory of 2768 2288 igfxrk32.exe 32 PID 2768 wrote to memory of 2080 2768 igfxrk32.exe 34 PID 2768 wrote to memory of 2080 2768 igfxrk32.exe 34 PID 2768 wrote to memory of 2080 2768 igfxrk32.exe 34 PID 2768 wrote to memory of 2080 2768 igfxrk32.exe 34 PID 2080 wrote to memory of 2612 2080 igfxrk32.exe 35 PID 2080 wrote to memory of 2612 2080 igfxrk32.exe 35 PID 2080 wrote to memory of 2612 2080 igfxrk32.exe 35 PID 2080 wrote to memory of 2612 2080 igfxrk32.exe 35 PID 2080 wrote to memory of 2612 2080 igfxrk32.exe 35 PID 2080 wrote to memory of 2612 2080 igfxrk32.exe 35 PID 2080 wrote to memory of 2612 2080 igfxrk32.exe 35 PID 2612 wrote to memory of 1740 2612 igfxrk32.exe 36 PID 2612 wrote to memory of 1740 2612 igfxrk32.exe 36 PID 2612 wrote to memory of 1740 2612 igfxrk32.exe 36 PID 2612 wrote to memory of 1740 2612 igfxrk32.exe 36 PID 1740 wrote to memory of 1844 1740 igfxrk32.exe 37 PID 1740 wrote to memory of 1844 1740 igfxrk32.exe 37 PID 1740 wrote to memory of 1844 1740 igfxrk32.exe 37 PID 1740 wrote to memory of 1844 1740 igfxrk32.exe 37 PID 1740 wrote to memory of 1844 1740 igfxrk32.exe 37 PID 1740 wrote to memory of 1844 1740 igfxrk32.exe 37 PID 1740 wrote to memory of 1844 1740 igfxrk32.exe 37 PID 1844 wrote to memory of 680 1844 igfxrk32.exe 38 PID 1844 wrote to memory of 680 1844 igfxrk32.exe 38 PID 1844 wrote to memory of 680 1844 igfxrk32.exe 38 PID 1844 wrote to memory of 680 1844 igfxrk32.exe 38 PID 680 wrote to memory of 1068 680 igfxrk32.exe 39 PID 680 wrote to memory of 1068 680 igfxrk32.exe 39 PID 680 wrote to memory of 1068 680 igfxrk32.exe 39 PID 680 wrote to memory of 1068 680 igfxrk32.exe 39 PID 680 wrote to memory of 1068 680 igfxrk32.exe 39 PID 680 wrote to memory of 1068 680 igfxrk32.exe 39 PID 680 wrote to memory of 1068 680 igfxrk32.exe 39 PID 1068 wrote to memory of 2896 1068 igfxrk32.exe 40 PID 1068 wrote to memory of 2896 1068 igfxrk32.exe 40 PID 1068 wrote to memory of 2896 1068 igfxrk32.exe 40 PID 1068 wrote to memory of 2896 1068 igfxrk32.exe 40 PID 2896 wrote to memory of 592 2896 igfxrk32.exe 41 PID 2896 wrote to memory of 592 2896 igfxrk32.exe 41 PID 2896 wrote to memory of 592 2896 igfxrk32.exe 41 PID 2896 wrote to memory of 592 2896 igfxrk32.exe 41 PID 2896 wrote to memory of 592 2896 igfxrk32.exe 41 PID 2896 wrote to memory of 592 2896 igfxrk32.exe 41 PID 2896 wrote to memory of 592 2896 igfxrk32.exe 41 PID 592 wrote to memory of 2300 592 igfxrk32.exe 42 PID 592 wrote to memory of 2300 592 igfxrk32.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\f85dfc3c6d0cb691d7341f063a3266c3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f85dfc3c6d0cb691d7341f063a3266c3_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\f85dfc3c6d0cb691d7341f063a3266c3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f85dfc3c6d0cb691d7341f063a3266c3_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Users\Admin\AppData\Local\Temp\F85DFC~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Users\Admin\AppData\Local\Temp\F85DFC~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2300 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2560 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1580 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1516 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2424 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2920 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2120 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1532 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2100 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2720 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2752 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2620 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2276 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2764 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2484 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1832 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1632 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1816 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2812 -
C:\Windows\SysWOW64\igfxrk32.exe"C:\Windows\system32\igfxrk32.exe" C:\Windows\SysWOW64\igfxrk32.exe32⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1588
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
220KB
MD5f85dfc3c6d0cb691d7341f063a3266c3
SHA1eb353f245d504107b9007d43bb4dfc96c1b300a8
SHA2564b95ec1f9aeb58dbe173f08afd61004ddf7d1b28a3f96ed25f19792092328a43
SHA512310a8d9be8f0cf17acc8e1f66e61ac99a5fdd5c3effd283bc61f91886a7863dd553130f433865e77a7d5530b45b5a3395fcf9d20acc91e54f921cff40180fc62