Analysis
-
max time kernel
151s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/01/2024, 06:49
Behavioral task
behavioral1
Sample
7403160cc0b5c66baf0919c5979827a6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7403160cc0b5c66baf0919c5979827a6.exe
Resource
win10v2004-20231222-en
General
-
Target
7403160cc0b5c66baf0919c5979827a6.exe
-
Size
241KB
-
MD5
7403160cc0b5c66baf0919c5979827a6
-
SHA1
33654f0ed237e3dde8d2ce094c1dca952e9bd8c7
-
SHA256
8175d65ea18612e0f05830b00fc3206d0d06b5641d3baec3e22f16753a9725d7
-
SHA512
52463cc919df34bf503ce5781d10dcdc757cb8d82e05c6eef89ba5b66b3c4697aaa88ea9984cf8c6e88b12b3b340430735dcb108b7f68dd2d13b6cffc98ecc26
-
SSDEEP
6144:qHrDUxK2rhRV1TYIFKM4e+hV5oWhiMr63niRurrfr:xbhRV5Ygkbh87diRur
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2052 igfxper32.exe -
Executes dropped EXE 45 IoCs
pid Process 2052 igfxper32.exe 1164 igfxper32.exe 2568 igfxper32.exe 2384 igfxper32.exe 2832 igfxper32.exe 320 igfxper32.exe 1632 igfxper32.exe 1624 igfxper32.exe 280 igfxper32.exe 1668 igfxper32.exe 1972 igfxper32.exe 2300 igfxper32.exe 2132 igfxper32.exe 720 igfxper32.exe 1336 igfxper32.exe 764 igfxper32.exe 1944 igfxper32.exe 1932 igfxper32.exe 3052 igfxper32.exe 2872 igfxper32.exe 2712 igfxper32.exe 368 igfxper32.exe 2732 igfxper32.exe 2596 igfxper32.exe 2684 igfxper32.exe 1648 igfxper32.exe 2812 igfxper32.exe 2540 igfxper32.exe 1580 igfxper32.exe 2236 igfxper32.exe 268 igfxper32.exe 1748 igfxper32.exe 1372 igfxper32.exe 580 igfxper32.exe 2112 igfxper32.exe 1144 igfxper32.exe 2248 igfxper32.exe 1808 igfxper32.exe 332 igfxper32.exe 1776 igfxper32.exe 640 igfxper32.exe 1352 igfxper32.exe 988 igfxper32.exe 2508 igfxper32.exe 1692 igfxper32.exe -
Loads dropped DLL 64 IoCs
pid Process 2944 7403160cc0b5c66baf0919c5979827a6.exe 2944 7403160cc0b5c66baf0919c5979827a6.exe 2052 igfxper32.exe 2052 igfxper32.exe 1164 igfxper32.exe 1164 igfxper32.exe 2568 igfxper32.exe 2568 igfxper32.exe 2384 igfxper32.exe 2384 igfxper32.exe 2832 igfxper32.exe 2832 igfxper32.exe 320 igfxper32.exe 320 igfxper32.exe 1632 igfxper32.exe 1632 igfxper32.exe 1624 igfxper32.exe 1624 igfxper32.exe 280 igfxper32.exe 280 igfxper32.exe 1668 igfxper32.exe 1668 igfxper32.exe 1972 igfxper32.exe 1972 igfxper32.exe 2300 igfxper32.exe 2300 igfxper32.exe 2132 igfxper32.exe 2132 igfxper32.exe 720 igfxper32.exe 720 igfxper32.exe 1336 igfxper32.exe 1336 igfxper32.exe 764 igfxper32.exe 764 igfxper32.exe 1944 igfxper32.exe 1944 igfxper32.exe 1932 igfxper32.exe 1932 igfxper32.exe 3052 igfxper32.exe 3052 igfxper32.exe 2872 igfxper32.exe 2872 igfxper32.exe 2712 igfxper32.exe 2712 igfxper32.exe 368 igfxper32.exe 368 igfxper32.exe 2732 igfxper32.exe 2732 igfxper32.exe 2596 igfxper32.exe 2596 igfxper32.exe 2684 igfxper32.exe 2684 igfxper32.exe 1648 igfxper32.exe 1648 igfxper32.exe 2812 igfxper32.exe 2812 igfxper32.exe 2540 igfxper32.exe 2540 igfxper32.exe 1580 igfxper32.exe 1580 igfxper32.exe 2236 igfxper32.exe 2236 igfxper32.exe 268 igfxper32.exe 268 igfxper32.exe -
resource yara_rule behavioral1/memory/2944-0-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/files/0x000d0000000122fe-6.dat upx behavioral1/memory/2944-12-0x0000000002FF0000-0x00000000030AA000-memory.dmp upx behavioral1/files/0x000d0000000122fe-23.dat upx behavioral1/files/0x000d0000000122fe-24.dat upx behavioral1/memory/1632-53-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/files/0x000d0000000122fe-76.dat upx behavioral1/files/0x000d0000000122fe-78.dat upx behavioral1/memory/720-98-0x0000000003100000-0x00000000031BA000-memory.dmp upx behavioral1/memory/2540-148-0x00000000030E0000-0x000000000319A000-memory.dmp upx behavioral1/memory/1372-160-0x0000000000400000-0x00000000004BA000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 7403160cc0b5c66baf0919c5979827a6.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 7403160cc0b5c66baf0919c5979827a6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe 7403160cc0b5c66baf0919c5979827a6.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\ 7403160cc0b5c66baf0919c5979827a6.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 2944 7403160cc0b5c66baf0919c5979827a6.exe 2052 igfxper32.exe 1164 igfxper32.exe 2568 igfxper32.exe 2384 igfxper32.exe 2832 igfxper32.exe 320 igfxper32.exe 1632 igfxper32.exe 1624 igfxper32.exe 280 igfxper32.exe 1668 igfxper32.exe 1972 igfxper32.exe 2300 igfxper32.exe 2132 igfxper32.exe 720 igfxper32.exe 1336 igfxper32.exe 764 igfxper32.exe 1944 igfxper32.exe 1932 igfxper32.exe 3052 igfxper32.exe 2872 igfxper32.exe 2712 igfxper32.exe 368 igfxper32.exe 2732 igfxper32.exe 2596 igfxper32.exe 2684 igfxper32.exe 1648 igfxper32.exe 2812 igfxper32.exe 2540 igfxper32.exe 1580 igfxper32.exe 2236 igfxper32.exe 268 igfxper32.exe 1748 igfxper32.exe 1372 igfxper32.exe 580 igfxper32.exe 2112 igfxper32.exe 1144 igfxper32.exe 2248 igfxper32.exe 1808 igfxper32.exe 332 igfxper32.exe 1776 igfxper32.exe 640 igfxper32.exe 1352 igfxper32.exe 988 igfxper32.exe 2508 igfxper32.exe 1692 igfxper32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2944 wrote to memory of 2052 2944 7403160cc0b5c66baf0919c5979827a6.exe 28 PID 2944 wrote to memory of 2052 2944 7403160cc0b5c66baf0919c5979827a6.exe 28 PID 2944 wrote to memory of 2052 2944 7403160cc0b5c66baf0919c5979827a6.exe 28 PID 2944 wrote to memory of 2052 2944 7403160cc0b5c66baf0919c5979827a6.exe 28 PID 2052 wrote to memory of 1164 2052 igfxper32.exe 29 PID 2052 wrote to memory of 1164 2052 igfxper32.exe 29 PID 2052 wrote to memory of 1164 2052 igfxper32.exe 29 PID 2052 wrote to memory of 1164 2052 igfxper32.exe 29 PID 1164 wrote to memory of 2568 1164 igfxper32.exe 30 PID 1164 wrote to memory of 2568 1164 igfxper32.exe 30 PID 1164 wrote to memory of 2568 1164 igfxper32.exe 30 PID 1164 wrote to memory of 2568 1164 igfxper32.exe 30 PID 2568 wrote to memory of 2384 2568 igfxper32.exe 31 PID 2568 wrote to memory of 2384 2568 igfxper32.exe 31 PID 2568 wrote to memory of 2384 2568 igfxper32.exe 31 PID 2568 wrote to memory of 2384 2568 igfxper32.exe 31 PID 2384 wrote to memory of 2832 2384 igfxper32.exe 32 PID 2384 wrote to memory of 2832 2384 igfxper32.exe 32 PID 2384 wrote to memory of 2832 2384 igfxper32.exe 32 PID 2384 wrote to memory of 2832 2384 igfxper32.exe 32 PID 2832 wrote to memory of 320 2832 igfxper32.exe 33 PID 2832 wrote to memory of 320 2832 igfxper32.exe 33 PID 2832 wrote to memory of 320 2832 igfxper32.exe 33 PID 2832 wrote to memory of 320 2832 igfxper32.exe 33 PID 320 wrote to memory of 1632 320 igfxper32.exe 34 PID 320 wrote to memory of 1632 320 igfxper32.exe 34 PID 320 wrote to memory of 1632 320 igfxper32.exe 34 PID 320 wrote to memory of 1632 320 igfxper32.exe 34 PID 1632 wrote to memory of 1624 1632 igfxper32.exe 35 PID 1632 wrote to memory of 1624 1632 igfxper32.exe 35 PID 1632 wrote to memory of 1624 1632 igfxper32.exe 35 PID 1632 wrote to memory of 1624 1632 igfxper32.exe 35 PID 1624 wrote to memory of 280 1624 igfxper32.exe 36 PID 1624 wrote to memory of 280 1624 igfxper32.exe 36 PID 1624 wrote to memory of 280 1624 igfxper32.exe 36 PID 1624 wrote to memory of 280 1624 igfxper32.exe 36 PID 280 wrote to memory of 1668 280 igfxper32.exe 37 PID 280 wrote to memory of 1668 280 igfxper32.exe 37 PID 280 wrote to memory of 1668 280 igfxper32.exe 37 PID 280 wrote to memory of 1668 280 igfxper32.exe 37 PID 1668 wrote to memory of 1972 1668 igfxper32.exe 40 PID 1668 wrote to memory of 1972 1668 igfxper32.exe 40 PID 1668 wrote to memory of 1972 1668 igfxper32.exe 40 PID 1668 wrote to memory of 1972 1668 igfxper32.exe 40 PID 1972 wrote to memory of 2300 1972 igfxper32.exe 41 PID 1972 wrote to memory of 2300 1972 igfxper32.exe 41 PID 1972 wrote to memory of 2300 1972 igfxper32.exe 41 PID 1972 wrote to memory of 2300 1972 igfxper32.exe 41 PID 2300 wrote to memory of 2132 2300 igfxper32.exe 42 PID 2300 wrote to memory of 2132 2300 igfxper32.exe 42 PID 2300 wrote to memory of 2132 2300 igfxper32.exe 42 PID 2300 wrote to memory of 2132 2300 igfxper32.exe 42 PID 2132 wrote to memory of 720 2132 igfxper32.exe 43 PID 2132 wrote to memory of 720 2132 igfxper32.exe 43 PID 2132 wrote to memory of 720 2132 igfxper32.exe 43 PID 2132 wrote to memory of 720 2132 igfxper32.exe 43 PID 720 wrote to memory of 1336 720 igfxper32.exe 44 PID 720 wrote to memory of 1336 720 igfxper32.exe 44 PID 720 wrote to memory of 1336 720 igfxper32.exe 44 PID 720 wrote to memory of 1336 720 igfxper32.exe 44 PID 1336 wrote to memory of 764 1336 igfxper32.exe 45 PID 1336 wrote to memory of 764 1336 igfxper32.exe 45 PID 1336 wrote to memory of 764 1336 igfxper32.exe 45 PID 1336 wrote to memory of 764 1336 igfxper32.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\7403160cc0b5c66baf0919c5979827a6.exe"C:\Users\Admin\AppData\Local\Temp\7403160cc0b5c66baf0919c5979827a6.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Users\Admin\AppData\Local\Temp\740316~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:280 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:764 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1944 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1932 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3052 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2872 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2712 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:368 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2732 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2596 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2684 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:1648 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2812 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE29⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2540 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1580 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2236 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:268 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:1748 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1372 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:580 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2112 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1144 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2248 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1808 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE40⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:332 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE41⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1776 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE42⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:640 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1352 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:988 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2508 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1692 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE47⤵PID:2692
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD512d6f79081acfb32d6bd706197d8e5b3
SHA10dd5f72692112d3dd0f339ea3e8a0ac0be5825aa
SHA256fd1e143e91612d1716fdf51f7342f0c5e3fd377a6821f4a8033756d8ef72d461
SHA512324c055ce56befec8485d4999d1cf75ba3740b528a930950c7ea2cd754fe6d94e3e48fe153c038db815aa2be2ed63ac51d3e3b7f960d7722fab36790d7629949
-
Filesize
128KB
MD5bac0f0636c7d73272a0c4a741dc0cece
SHA116b20afcf465a7efdffce1a91eeac4a5db2e36e9
SHA256a2b8b6c5f14768f7584a9013907eb9fc6fd24092250dd8ab99bad8023fb529c9
SHA512448ac3d771138f7c9bccadff1e7d17cef0a0cdb229aeab71020633c867c3d9a4dac1e03277fe39b81999e9b82ba912b9b7a3d5df575cc65362a84b6268fa06ea
-
Filesize
241KB
MD57403160cc0b5c66baf0919c5979827a6
SHA133654f0ed237e3dde8d2ce094c1dca952e9bd8c7
SHA2568175d65ea18612e0f05830b00fc3206d0d06b5641d3baec3e22f16753a9725d7
SHA51252463cc919df34bf503ce5781d10dcdc757cb8d82e05c6eef89ba5b66b3c4697aaa88ea9984cf8c6e88b12b3b340430735dcb108b7f68dd2d13b6cffc98ecc26
-
Filesize
197KB
MD5e540634135beb948f0d56faf76464a38
SHA1c444da368b18cf05bd6787c3f44b983c483c2859
SHA25695867ba941d2f63301fc3fb101075a41695740cc3fbe98906eb8735de4a1d9a1
SHA5121481c2d6d49f28b70ad38cf40d7319b512fa5ab57dfa61a8483da32e734b7ee5dd39ad1940208de50f045d9940c9bee8df43ba8277a034fd09ac9de3b52807a0