Analysis
-
max time kernel
148s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 11:42
Static task
static1
Behavioral task
behavioral1
Sample
1ba73e58924afe9aa6e88161bfb3adc4.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1ba73e58924afe9aa6e88161bfb3adc4.exe
Resource
win10v2004-20231215-en
General
-
Target
1ba73e58924afe9aa6e88161bfb3adc4.exe
-
Size
168KB
-
MD5
1ba73e58924afe9aa6e88161bfb3adc4
-
SHA1
9dc45648c7e3847dad43f8fe6c0a930f79020108
-
SHA256
e15fac847d6df2ec36478decdb6dddee812f95b6a3d56705513d72fbb6124696
-
SHA512
d025f3f6d8c2b002ada73d5943f4d1fcdd13744647b13d3619b9ba7efac11619a9ea6275a7772b89bdd5f21c95fcbed3aa38b637a8fe813f9cccabf7666fb81b
-
SSDEEP
3072:838Nmr19fQK5l5XgfWnDNVAQxLjAHq9VQFM0TTziItBxHKvCpfBjtGqk7CgWH:Ar19f6gLsBFm2d0CpzOWH
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2720 igfxwk32.exe -
Executes dropped EXE 31 IoCs
pid Process 2580 igfxwk32.exe 2720 igfxwk32.exe 2524 igfxwk32.exe 2544 igfxwk32.exe 1740 igfxwk32.exe 2656 igfxwk32.exe 1708 igfxwk32.exe 2540 igfxwk32.exe 2984 igfxwk32.exe 1096 igfxwk32.exe 784 igfxwk32.exe 1496 igfxwk32.exe 1536 igfxwk32.exe 2176 igfxwk32.exe 108 igfxwk32.exe 1192 igfxwk32.exe 952 igfxwk32.exe 1128 igfxwk32.exe 1724 igfxwk32.exe 2848 igfxwk32.exe 2680 igfxwk32.exe 2148 igfxwk32.exe 2472 igfxwk32.exe 2784 igfxwk32.exe 2068 igfxwk32.exe 964 igfxwk32.exe 2376 igfxwk32.exe 2832 igfxwk32.exe 1540 igfxwk32.exe 1124 igfxwk32.exe 596 igfxwk32.exe -
Loads dropped DLL 31 IoCs
pid Process 1388 1ba73e58924afe9aa6e88161bfb3adc4.exe 2580 igfxwk32.exe 2720 igfxwk32.exe 2524 igfxwk32.exe 2544 igfxwk32.exe 1740 igfxwk32.exe 2656 igfxwk32.exe 1708 igfxwk32.exe 2540 igfxwk32.exe 2984 igfxwk32.exe 1096 igfxwk32.exe 784 igfxwk32.exe 1496 igfxwk32.exe 1536 igfxwk32.exe 2176 igfxwk32.exe 108 igfxwk32.exe 1192 igfxwk32.exe 952 igfxwk32.exe 1128 igfxwk32.exe 1724 igfxwk32.exe 2848 igfxwk32.exe 2680 igfxwk32.exe 2148 igfxwk32.exe 2472 igfxwk32.exe 2784 igfxwk32.exe 2068 igfxwk32.exe 964 igfxwk32.exe 2376 igfxwk32.exe 2832 igfxwk32.exe 1540 igfxwk32.exe 1124 igfxwk32.exe -
resource yara_rule behavioral1/memory/1388-2-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1388-3-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1388-4-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1388-6-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1388-8-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1388-7-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1388-16-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2720-27-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2720-29-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2720-30-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2720-33-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2544-43-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2544-49-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2656-64-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2540-76-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2540-81-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1096-93-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1096-95-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1096-102-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1496-112-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1496-120-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2176-136-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1192-152-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1128-164-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1128-167-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1128-173-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2848-189-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2148-203-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2148-208-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2784-218-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2784-225-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/964-242-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2832-256-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1124-264-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1124-269-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 32 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 1ba73e58924afe9aa6e88161bfb3adc4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 1ba73e58924afe9aa6e88161bfb3adc4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwk32.exe -
Drops file in System32 directory 48 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ 1ba73e58924afe9aa6e88161bfb3adc4.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe 1ba73e58924afe9aa6e88161bfb3adc4.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe 1ba73e58924afe9aa6e88161bfb3adc4.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\ igfxwk32.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe File created C:\Windows\SysWOW64\igfxwk32.exe igfxwk32.exe -
Suspicious use of SetThreadContext 16 IoCs
description pid Process procid_target PID 3028 set thread context of 1388 3028 1ba73e58924afe9aa6e88161bfb3adc4.exe 28 PID 2580 set thread context of 2720 2580 igfxwk32.exe 30 PID 2524 set thread context of 2544 2524 igfxwk32.exe 32 PID 1740 set thread context of 2656 1740 igfxwk32.exe 34 PID 1708 set thread context of 2540 1708 igfxwk32.exe 36 PID 2984 set thread context of 1096 2984 igfxwk32.exe 40 PID 784 set thread context of 1496 784 igfxwk32.exe 42 PID 1536 set thread context of 2176 1536 igfxwk32.exe 44 PID 108 set thread context of 1192 108 igfxwk32.exe 46 PID 952 set thread context of 1128 952 igfxwk32.exe 48 PID 1724 set thread context of 2848 1724 igfxwk32.exe 50 PID 2680 set thread context of 2148 2680 igfxwk32.exe 52 PID 2472 set thread context of 2784 2472 igfxwk32.exe 54 PID 2068 set thread context of 964 2068 igfxwk32.exe 56 PID 2376 set thread context of 2832 2376 igfxwk32.exe 58 PID 1540 set thread context of 1124 1540 igfxwk32.exe 60 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 1388 1ba73e58924afe9aa6e88161bfb3adc4.exe 1388 1ba73e58924afe9aa6e88161bfb3adc4.exe 2720 igfxwk32.exe 2720 igfxwk32.exe 2544 igfxwk32.exe 2544 igfxwk32.exe 2656 igfxwk32.exe 2656 igfxwk32.exe 2540 igfxwk32.exe 2540 igfxwk32.exe 1096 igfxwk32.exe 1096 igfxwk32.exe 1496 igfxwk32.exe 1496 igfxwk32.exe 2176 igfxwk32.exe 2176 igfxwk32.exe 1192 igfxwk32.exe 1192 igfxwk32.exe 1128 igfxwk32.exe 1128 igfxwk32.exe 2848 igfxwk32.exe 2848 igfxwk32.exe 2148 igfxwk32.exe 2148 igfxwk32.exe 2784 igfxwk32.exe 2784 igfxwk32.exe 964 igfxwk32.exe 964 igfxwk32.exe 2832 igfxwk32.exe 2832 igfxwk32.exe 1124 igfxwk32.exe 1124 igfxwk32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3028 wrote to memory of 1388 3028 1ba73e58924afe9aa6e88161bfb3adc4.exe 28 PID 3028 wrote to memory of 1388 3028 1ba73e58924afe9aa6e88161bfb3adc4.exe 28 PID 3028 wrote to memory of 1388 3028 1ba73e58924afe9aa6e88161bfb3adc4.exe 28 PID 3028 wrote to memory of 1388 3028 1ba73e58924afe9aa6e88161bfb3adc4.exe 28 PID 3028 wrote to memory of 1388 3028 1ba73e58924afe9aa6e88161bfb3adc4.exe 28 PID 3028 wrote to memory of 1388 3028 1ba73e58924afe9aa6e88161bfb3adc4.exe 28 PID 3028 wrote to memory of 1388 3028 1ba73e58924afe9aa6e88161bfb3adc4.exe 28 PID 1388 wrote to memory of 2580 1388 1ba73e58924afe9aa6e88161bfb3adc4.exe 29 PID 1388 wrote to memory of 2580 1388 1ba73e58924afe9aa6e88161bfb3adc4.exe 29 PID 1388 wrote to memory of 2580 1388 1ba73e58924afe9aa6e88161bfb3adc4.exe 29 PID 1388 wrote to memory of 2580 1388 1ba73e58924afe9aa6e88161bfb3adc4.exe 29 PID 2580 wrote to memory of 2720 2580 igfxwk32.exe 30 PID 2580 wrote to memory of 2720 2580 igfxwk32.exe 30 PID 2580 wrote to memory of 2720 2580 igfxwk32.exe 30 PID 2580 wrote to memory of 2720 2580 igfxwk32.exe 30 PID 2580 wrote to memory of 2720 2580 igfxwk32.exe 30 PID 2580 wrote to memory of 2720 2580 igfxwk32.exe 30 PID 2580 wrote to memory of 2720 2580 igfxwk32.exe 30 PID 2720 wrote to memory of 2524 2720 igfxwk32.exe 31 PID 2720 wrote to memory of 2524 2720 igfxwk32.exe 31 PID 2720 wrote to memory of 2524 2720 igfxwk32.exe 31 PID 2720 wrote to memory of 2524 2720 igfxwk32.exe 31 PID 2524 wrote to memory of 2544 2524 igfxwk32.exe 32 PID 2524 wrote to memory of 2544 2524 igfxwk32.exe 32 PID 2524 wrote to memory of 2544 2524 igfxwk32.exe 32 PID 2524 wrote to memory of 2544 2524 igfxwk32.exe 32 PID 2524 wrote to memory of 2544 2524 igfxwk32.exe 32 PID 2524 wrote to memory of 2544 2524 igfxwk32.exe 32 PID 2524 wrote to memory of 2544 2524 igfxwk32.exe 32 PID 2544 wrote to memory of 1740 2544 igfxwk32.exe 33 PID 2544 wrote to memory of 1740 2544 igfxwk32.exe 33 PID 2544 wrote to memory of 1740 2544 igfxwk32.exe 33 PID 2544 wrote to memory of 1740 2544 igfxwk32.exe 33 PID 1740 wrote to memory of 2656 1740 igfxwk32.exe 34 PID 1740 wrote to memory of 2656 1740 igfxwk32.exe 34 PID 1740 wrote to memory of 2656 1740 igfxwk32.exe 34 PID 1740 wrote to memory of 2656 1740 igfxwk32.exe 34 PID 1740 wrote to memory of 2656 1740 igfxwk32.exe 34 PID 1740 wrote to memory of 2656 1740 igfxwk32.exe 34 PID 1740 wrote to memory of 2656 1740 igfxwk32.exe 34 PID 2656 wrote to memory of 1708 2656 igfxwk32.exe 35 PID 2656 wrote to memory of 1708 2656 igfxwk32.exe 35 PID 2656 wrote to memory of 1708 2656 igfxwk32.exe 35 PID 2656 wrote to memory of 1708 2656 igfxwk32.exe 35 PID 1708 wrote to memory of 2540 1708 igfxwk32.exe 36 PID 1708 wrote to memory of 2540 1708 igfxwk32.exe 36 PID 1708 wrote to memory of 2540 1708 igfxwk32.exe 36 PID 1708 wrote to memory of 2540 1708 igfxwk32.exe 36 PID 1708 wrote to memory of 2540 1708 igfxwk32.exe 36 PID 1708 wrote to memory of 2540 1708 igfxwk32.exe 36 PID 1708 wrote to memory of 2540 1708 igfxwk32.exe 36 PID 2540 wrote to memory of 2984 2540 igfxwk32.exe 37 PID 2540 wrote to memory of 2984 2540 igfxwk32.exe 37 PID 2540 wrote to memory of 2984 2540 igfxwk32.exe 37 PID 2540 wrote to memory of 2984 2540 igfxwk32.exe 37 PID 2984 wrote to memory of 1096 2984 igfxwk32.exe 40 PID 2984 wrote to memory of 1096 2984 igfxwk32.exe 40 PID 2984 wrote to memory of 1096 2984 igfxwk32.exe 40 PID 2984 wrote to memory of 1096 2984 igfxwk32.exe 40 PID 2984 wrote to memory of 1096 2984 igfxwk32.exe 40 PID 2984 wrote to memory of 1096 2984 igfxwk32.exe 40 PID 2984 wrote to memory of 1096 2984 igfxwk32.exe 40 PID 1096 wrote to memory of 784 1096 igfxwk32.exe 41 PID 1096 wrote to memory of 784 1096 igfxwk32.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ba73e58924afe9aa6e88161bfb3adc4.exe"C:\Users\Admin\AppData\Local\Temp\1ba73e58924afe9aa6e88161bfb3adc4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\1ba73e58924afe9aa6e88161bfb3adc4.exe"C:\Users\Admin\AppData\Local\Temp\1ba73e58924afe9aa6e88161bfb3adc4.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Users\Admin\AppData\Local\Temp\1BA73E~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Users\Admin\AppData\Local\Temp\1BA73E~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:784 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1496 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1536 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2176 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:108 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1192 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:952 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1128 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1724 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2848 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2680 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2148 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2472 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2784 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2068 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:964 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2376 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2832 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1540 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1124 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe33⤵
- Executes dropped EXE
PID:596
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD58bb6ab223f685c1475a54025d28f561a
SHA1208518e45bd57f4b7b5dc7304b31aff06e96939d
SHA256648e028a3e0d4d4340626a24366b87131ee7afde631890fb414fca2437968fe1
SHA5128cf75e75717806cc38ee12e06fc382575d09783d28988d52fa4f71be5610f33900c55f7afc4d4ee41c7043f0d5128d35f5bb657418927d99d400ff62b3fe8ba0
-
Filesize
168KB
MD51ba73e58924afe9aa6e88161bfb3adc4
SHA19dc45648c7e3847dad43f8fe6c0a930f79020108
SHA256e15fac847d6df2ec36478decdb6dddee812f95b6a3d56705513d72fbb6124696
SHA512d025f3f6d8c2b002ada73d5943f4d1fcdd13744647b13d3619b9ba7efac11619a9ea6275a7772b89bdd5f21c95fcbed3aa38b637a8fe813f9cccabf7666fb81b
-
Filesize
98KB
MD52e20d2421f98e4b3bf46192fb95741d0
SHA185e242da9ddc893a19e73b2fe8a7e0571b8c0e22
SHA256854e8722895b6b7baad4fcd5fea3d4181f89386ce160cbffd6bacdf64e1ee05d
SHA5125cdbf1c5cf0d5dd02fdeac41cab5492a0efb8ea413fe9efdc98735be20381035845411b457c287a23d1bda5b032598f58afc75a8c13827a1927f429b6d1d258f