Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2025, 00:54
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8963e989dea0e97c6ded8573e26a2142.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8963e989dea0e97c6ded8573e26a2142.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_8963e989dea0e97c6ded8573e26a2142.exe
-
Size
170KB
-
MD5
8963e989dea0e97c6ded8573e26a2142
-
SHA1
b6d1a1e6173c3746cc2e35f81c434bb527a22019
-
SHA256
390afaef52a2c7cbc5a390839e092f65d5dd049b6fe9e6e5a0d5f6f36963919d
-
SHA512
dc4f91b05f78ca3428aeef681deee1711a8c2f70f859b6faa0fa0cf6f75a3ac731d3daacb31de686197786a44a89b1094107270aba089076f8cbccdfaecea92a
-
SSDEEP
3072:a2VF4r+UlpLxVql4XhUeS6IigfK/w4jZhQ3HirPjJo3dLKEvut7Nqk0U:ROpLr04xjFIZC/waQ3HijetLq7gkj
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 15 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation igfxwp32.exe Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation igfxwp32.exe Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation igfxwp32.exe Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation igfxwp32.exe Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation igfxwp32.exe Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation JaffaCakes118_8963e989dea0e97c6ded8573e26a2142.exe Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation igfxwp32.exe Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation igfxwp32.exe Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation igfxwp32.exe Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation igfxwp32.exe Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation igfxwp32.exe Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation igfxwp32.exe Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation igfxwp32.exe Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation igfxwp32.exe Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation igfxwp32.exe -
Deletes itself 1 IoCs
pid Process 4560 igfxwp32.exe -
Executes dropped EXE 29 IoCs
pid Process 4932 igfxwp32.exe 4560 igfxwp32.exe 2036 igfxwp32.exe 1920 igfxwp32.exe 2872 igfxwp32.exe 2844 igfxwp32.exe 4900 igfxwp32.exe 4572 igfxwp32.exe 4828 igfxwp32.exe 3108 igfxwp32.exe 400 igfxwp32.exe 1180 igfxwp32.exe 4652 igfxwp32.exe 2332 igfxwp32.exe 2592 igfxwp32.exe 4780 igfxwp32.exe 2904 igfxwp32.exe 1784 igfxwp32.exe 3012 igfxwp32.exe 3312 igfxwp32.exe 3520 igfxwp32.exe 1780 igfxwp32.exe 4052 igfxwp32.exe 2032 igfxwp32.exe 4368 igfxwp32.exe 2888 igfxwp32.exe 4872 igfxwp32.exe 1044 igfxwp32.exe 4424 igfxwp32.exe -
Maps connected drives based on registry 3 TTPs 30 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum JaffaCakes118_8963e989dea0e97c6ded8573e26a2142.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 JaffaCakes118_8963e989dea0e97c6ded8573e26a2142.exe -
Drops file in System32 directory 45 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe JaffaCakes118_8963e989dea0e97c6ded8573e26a2142.exe File created C:\Windows\SysWOW64\igfxwp32.exe JaffaCakes118_8963e989dea0e97c6ded8573e26a2142.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ JaffaCakes118_8963e989dea0e97c6ded8573e26a2142.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe -
Suspicious use of SetThreadContext 15 IoCs
description pid Process procid_target PID 3400 set thread context of 2104 3400 JaffaCakes118_8963e989dea0e97c6ded8573e26a2142.exe 97 PID 4932 set thread context of 4560 4932 igfxwp32.exe 101 PID 2036 set thread context of 1920 2036 igfxwp32.exe 103 PID 2872 set thread context of 2844 2872 igfxwp32.exe 115 PID 4900 set thread context of 4572 4900 igfxwp32.exe 117 PID 4828 set thread context of 3108 4828 igfxwp32.exe 119 PID 400 set thread context of 1180 400 igfxwp32.exe 121 PID 4652 set thread context of 2332 4652 igfxwp32.exe 124 PID 2592 set thread context of 4780 2592 igfxwp32.exe 126 PID 2904 set thread context of 1784 2904 igfxwp32.exe 128 PID 3012 set thread context of 3312 3012 igfxwp32.exe 130 PID 3520 set thread context of 1780 3520 igfxwp32.exe 132 PID 4052 set thread context of 2032 4052 igfxwp32.exe 134 PID 4368 set thread context of 2888 4368 igfxwp32.exe 136 PID 4872 set thread context of 1044 4872 igfxwp32.exe 138 -
resource yara_rule behavioral2/memory/2104-1-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2104-4-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2104-5-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2104-6-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2104-42-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4560-49-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4560-51-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1920-63-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2844-68-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2844-75-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4572-82-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3108-94-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1180-101-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2332-110-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4780-118-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1784-127-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3312-136-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1780-147-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2032-159-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2888-168-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1044-178-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 30 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8963e989dea0e97c6ded8573e26a2142.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8963e989dea0e97c6ded8573e26a2142.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ JaffaCakes118_8963e989dea0e97c6ded8573e26a2142.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxwp32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3400 JaffaCakes118_8963e989dea0e97c6ded8573e26a2142.exe 3400 JaffaCakes118_8963e989dea0e97c6ded8573e26a2142.exe 2104 JaffaCakes118_8963e989dea0e97c6ded8573e26a2142.exe 2104 JaffaCakes118_8963e989dea0e97c6ded8573e26a2142.exe 2104 JaffaCakes118_8963e989dea0e97c6ded8573e26a2142.exe 2104 JaffaCakes118_8963e989dea0e97c6ded8573e26a2142.exe 4932 igfxwp32.exe 4932 igfxwp32.exe 4560 igfxwp32.exe 4560 igfxwp32.exe 4560 igfxwp32.exe 4560 igfxwp32.exe 2036 igfxwp32.exe 2036 igfxwp32.exe 1920 igfxwp32.exe 1920 igfxwp32.exe 1920 igfxwp32.exe 1920 igfxwp32.exe 2872 igfxwp32.exe 2872 igfxwp32.exe 2844 igfxwp32.exe 2844 igfxwp32.exe 2844 igfxwp32.exe 2844 igfxwp32.exe 4900 igfxwp32.exe 4900 igfxwp32.exe 4572 igfxwp32.exe 4572 igfxwp32.exe 4572 igfxwp32.exe 4572 igfxwp32.exe 4828 igfxwp32.exe 4828 igfxwp32.exe 3108 igfxwp32.exe 3108 igfxwp32.exe 3108 igfxwp32.exe 3108 igfxwp32.exe 400 igfxwp32.exe 400 igfxwp32.exe 1180 igfxwp32.exe 1180 igfxwp32.exe 1180 igfxwp32.exe 1180 igfxwp32.exe 4652 igfxwp32.exe 4652 igfxwp32.exe 2332 igfxwp32.exe 2332 igfxwp32.exe 2332 igfxwp32.exe 2332 igfxwp32.exe 2592 igfxwp32.exe 2592 igfxwp32.exe 4780 igfxwp32.exe 4780 igfxwp32.exe 4780 igfxwp32.exe 4780 igfxwp32.exe 2904 igfxwp32.exe 2904 igfxwp32.exe 1784 igfxwp32.exe 1784 igfxwp32.exe 1784 igfxwp32.exe 1784 igfxwp32.exe 3012 igfxwp32.exe 3012 igfxwp32.exe 3312 igfxwp32.exe 3312 igfxwp32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3400 wrote to memory of 2104 3400 JaffaCakes118_8963e989dea0e97c6ded8573e26a2142.exe 97 PID 3400 wrote to memory of 2104 3400 JaffaCakes118_8963e989dea0e97c6ded8573e26a2142.exe 97 PID 3400 wrote to memory of 2104 3400 JaffaCakes118_8963e989dea0e97c6ded8573e26a2142.exe 97 PID 3400 wrote to memory of 2104 3400 JaffaCakes118_8963e989dea0e97c6ded8573e26a2142.exe 97 PID 3400 wrote to memory of 2104 3400 JaffaCakes118_8963e989dea0e97c6ded8573e26a2142.exe 97 PID 3400 wrote to memory of 2104 3400 JaffaCakes118_8963e989dea0e97c6ded8573e26a2142.exe 97 PID 3400 wrote to memory of 2104 3400 JaffaCakes118_8963e989dea0e97c6ded8573e26a2142.exe 97 PID 2104 wrote to memory of 4932 2104 JaffaCakes118_8963e989dea0e97c6ded8573e26a2142.exe 99 PID 2104 wrote to memory of 4932 2104 JaffaCakes118_8963e989dea0e97c6ded8573e26a2142.exe 99 PID 2104 wrote to memory of 4932 2104 JaffaCakes118_8963e989dea0e97c6ded8573e26a2142.exe 99 PID 4932 wrote to memory of 4560 4932 igfxwp32.exe 101 PID 4932 wrote to memory of 4560 4932 igfxwp32.exe 101 PID 4932 wrote to memory of 4560 4932 igfxwp32.exe 101 PID 4932 wrote to memory of 4560 4932 igfxwp32.exe 101 PID 4932 wrote to memory of 4560 4932 igfxwp32.exe 101 PID 4932 wrote to memory of 4560 4932 igfxwp32.exe 101 PID 4932 wrote to memory of 4560 4932 igfxwp32.exe 101 PID 4560 wrote to memory of 2036 4560 igfxwp32.exe 102 PID 4560 wrote to memory of 2036 4560 igfxwp32.exe 102 PID 4560 wrote to memory of 2036 4560 igfxwp32.exe 102 PID 2036 wrote to memory of 1920 2036 igfxwp32.exe 103 PID 2036 wrote to memory of 1920 2036 igfxwp32.exe 103 PID 2036 wrote to memory of 1920 2036 igfxwp32.exe 103 PID 2036 wrote to memory of 1920 2036 igfxwp32.exe 103 PID 2036 wrote to memory of 1920 2036 igfxwp32.exe 103 PID 2036 wrote to memory of 1920 2036 igfxwp32.exe 103 PID 2036 wrote to memory of 1920 2036 igfxwp32.exe 103 PID 1920 wrote to memory of 2872 1920 igfxwp32.exe 105 PID 1920 wrote to memory of 2872 1920 igfxwp32.exe 105 PID 1920 wrote to memory of 2872 1920 igfxwp32.exe 105 PID 2872 wrote to memory of 2844 2872 igfxwp32.exe 115 PID 2872 wrote to memory of 2844 2872 igfxwp32.exe 115 PID 2872 wrote to memory of 2844 2872 igfxwp32.exe 115 PID 2872 wrote to memory of 2844 2872 igfxwp32.exe 115 PID 2872 wrote to memory of 2844 2872 igfxwp32.exe 115 PID 2872 wrote to memory of 2844 2872 igfxwp32.exe 115 PID 2872 wrote to memory of 2844 2872 igfxwp32.exe 115 PID 2844 wrote to memory of 4900 2844 igfxwp32.exe 116 PID 2844 wrote to memory of 4900 2844 igfxwp32.exe 116 PID 2844 wrote to memory of 4900 2844 igfxwp32.exe 116 PID 4900 wrote to memory of 4572 4900 igfxwp32.exe 117 PID 4900 wrote to memory of 4572 4900 igfxwp32.exe 117 PID 4900 wrote to memory of 4572 4900 igfxwp32.exe 117 PID 4900 wrote to memory of 4572 4900 igfxwp32.exe 117 PID 4900 wrote to memory of 4572 4900 igfxwp32.exe 117 PID 4900 wrote to memory of 4572 4900 igfxwp32.exe 117 PID 4900 wrote to memory of 4572 4900 igfxwp32.exe 117 PID 4572 wrote to memory of 4828 4572 igfxwp32.exe 118 PID 4572 wrote to memory of 4828 4572 igfxwp32.exe 118 PID 4572 wrote to memory of 4828 4572 igfxwp32.exe 118 PID 4828 wrote to memory of 3108 4828 igfxwp32.exe 119 PID 4828 wrote to memory of 3108 4828 igfxwp32.exe 119 PID 4828 wrote to memory of 3108 4828 igfxwp32.exe 119 PID 4828 wrote to memory of 3108 4828 igfxwp32.exe 119 PID 4828 wrote to memory of 3108 4828 igfxwp32.exe 119 PID 4828 wrote to memory of 3108 4828 igfxwp32.exe 119 PID 4828 wrote to memory of 3108 4828 igfxwp32.exe 119 PID 3108 wrote to memory of 400 3108 igfxwp32.exe 120 PID 3108 wrote to memory of 400 3108 igfxwp32.exe 120 PID 3108 wrote to memory of 400 3108 igfxwp32.exe 120 PID 400 wrote to memory of 1180 400 igfxwp32.exe 121 PID 400 wrote to memory of 1180 400 igfxwp32.exe 121 PID 400 wrote to memory of 1180 400 igfxwp32.exe 121 PID 400 wrote to memory of 1180 400 igfxwp32.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8963e989dea0e97c6ded8573e26a2142.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8963e989dea0e97c6ded8573e26a2142.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8963e989dea0e97c6ded8573e26a2142.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8963e989dea0e97c6ded8573e26a2142.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1180 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4652 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2332 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2592 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4780 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2904 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1784 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3012 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3312 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3520 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1780 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4052 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2032 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4368 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2888 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4872 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1044 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe31⤵
- Executes dropped EXE
PID:4424
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
170KB
MD58963e989dea0e97c6ded8573e26a2142
SHA1b6d1a1e6173c3746cc2e35f81c434bb527a22019
SHA256390afaef52a2c7cbc5a390839e092f65d5dd049b6fe9e6e5a0d5f6f36963919d
SHA512dc4f91b05f78ca3428aeef681deee1711a8c2f70f859b6faa0fa0cf6f75a3ac731d3daacb31de686197786a44a89b1094107270aba089076f8cbccdfaecea92a