Analysis
-
max time kernel
147s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
27-01-2024 18:02
Static task
static1
Behavioral task
behavioral1
Sample
7ae7a7ba4496d3f41ea55d432a6346a3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7ae7a7ba4496d3f41ea55d432a6346a3.exe
Resource
win10v2004-20231222-en
General
-
Target
7ae7a7ba4496d3f41ea55d432a6346a3.exe
-
Size
169KB
-
MD5
7ae7a7ba4496d3f41ea55d432a6346a3
-
SHA1
824d712a47bcd0d686e8b0908e83fe949a938a01
-
SHA256
93126c09d41e1a0611c7ef1171e11e1599fc8e619af202982573ece10785891b
-
SHA512
ada791b4b49574f7664a73d51d383b5b409f9520bf620dc3e00cf4c0149239a912d7ed3f6e6003139094445e19de85e566568a59d26e9728a01b9be1eb9cf70d
-
SSDEEP
3072:mx+wJ0Gu+ngj/mvMOkljkJozO8pQVCVElHeGoY8Bih/uy:m14j/mK22zO8g3HevY9/X
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 27 IoCs
pid Process 2716 igfxkb32.exe 2672 igfxkb32.exe 2432 igfxkb32.exe 1164 igfxkb32.exe 2932 igfxkb32.exe 2544 igfxkb32.exe 1516 igfxkb32.exe 2172 igfxkb32.exe 1324 igfxkb32.exe 1288 igfxkb32.exe 3024 igfxkb32.exe 2356 igfxkb32.exe 2144 igfxkb32.exe 1468 igfxkb32.exe 2328 igfxkb32.exe 768 igfxkb32.exe 2520 igfxkb32.exe 2216 igfxkb32.exe 1724 igfxkb32.exe 3044 igfxkb32.exe 2452 igfxkb32.exe 2788 igfxkb32.exe 2588 igfxkb32.exe 1432 igfxkb32.exe 2240 igfxkb32.exe 2660 igfxkb32.exe 1180 igfxkb32.exe -
Loads dropped DLL 14 IoCs
pid Process 2836 7ae7a7ba4496d3f41ea55d432a6346a3.exe 2672 igfxkb32.exe 1164 igfxkb32.exe 2544 igfxkb32.exe 2172 igfxkb32.exe 1288 igfxkb32.exe 2356 igfxkb32.exe 1468 igfxkb32.exe 768 igfxkb32.exe 2216 igfxkb32.exe 3044 igfxkb32.exe 2788 igfxkb32.exe 1432 igfxkb32.exe 2660 igfxkb32.exe -
resource yara_rule behavioral1/memory/2836-2-0x0000000012370000-0x00000000123C9000-memory.dmp upx behavioral1/memory/2836-3-0x0000000012370000-0x00000000123C9000-memory.dmp upx behavioral1/memory/2836-4-0x0000000012370000-0x00000000123C9000-memory.dmp upx behavioral1/memory/2836-6-0x0000000012370000-0x00000000123C9000-memory.dmp upx behavioral1/memory/2836-7-0x0000000012370000-0x00000000123C9000-memory.dmp upx behavioral1/memory/2836-8-0x0000000012370000-0x00000000123C9000-memory.dmp upx behavioral1/memory/2836-9-0x0000000012370000-0x00000000123C9000-memory.dmp upx behavioral1/memory/2836-17-0x0000000012370000-0x00000000123C9000-memory.dmp upx behavioral1/memory/2672-27-0x0000000012370000-0x00000000123C9000-memory.dmp upx behavioral1/memory/2672-28-0x0000000012370000-0x00000000123C9000-memory.dmp upx behavioral1/memory/2672-29-0x0000000012370000-0x00000000123C9000-memory.dmp upx behavioral1/memory/2672-34-0x0000000012370000-0x00000000123C9000-memory.dmp upx behavioral1/memory/1164-48-0x0000000012370000-0x00000000123C9000-memory.dmp upx behavioral1/memory/2544-63-0x0000000012370000-0x00000000123C9000-memory.dmp upx behavioral1/memory/2172-77-0x0000000012370000-0x00000000123C9000-memory.dmp upx behavioral1/memory/1288-86-0x0000000012370000-0x00000000123C9000-memory.dmp upx behavioral1/memory/1288-87-0x0000000012370000-0x00000000123C9000-memory.dmp upx behavioral1/memory/1288-88-0x0000000012370000-0x00000000123C9000-memory.dmp upx behavioral1/memory/1288-94-0x0000000012370000-0x00000000123C9000-memory.dmp upx behavioral1/memory/2356-109-0x0000000012370000-0x00000000123C9000-memory.dmp upx behavioral1/memory/1468-125-0x0000000012370000-0x00000000123C9000-memory.dmp upx behavioral1/memory/768-140-0x0000000012370000-0x00000000123C9000-memory.dmp upx behavioral1/memory/2216-156-0x0000000012370000-0x00000000123C9000-memory.dmp upx behavioral1/memory/3044-160-0x0000000012370000-0x00000000123C9000-memory.dmp upx behavioral1/memory/3044-167-0x0000000012370000-0x00000000123C9000-memory.dmp upx behavioral1/memory/2788-183-0x0000000012370000-0x00000000123C9000-memory.dmp upx behavioral1/memory/1432-198-0x0000000012370000-0x00000000123C9000-memory.dmp upx behavioral1/memory/2660-213-0x0000000012370000-0x00000000123C9000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 28 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxkb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxkb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxkb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxkb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxkb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 7ae7a7ba4496d3f41ea55d432a6346a3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxkb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxkb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxkb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxkb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxkb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 7ae7a7ba4496d3f41ea55d432a6346a3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxkb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxkb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxkb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxkb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxkb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxkb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxkb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxkb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxkb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxkb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxkb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxkb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxkb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxkb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxkb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxkb32.exe -
Drops file in System32 directory 42 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxkb32.exe 7ae7a7ba4496d3f41ea55d432a6346a3.exe File opened for modification C:\Windows\SysWOW64\igfxkb32.exe igfxkb32.exe File created C:\Windows\SysWOW64\igfxkb32.exe igfxkb32.exe File created C:\Windows\SysWOW64\igfxkb32.exe igfxkb32.exe File opened for modification C:\Windows\SysWOW64\igfxkb32.exe igfxkb32.exe File created C:\Windows\SysWOW64\igfxkb32.exe igfxkb32.exe File opened for modification C:\Windows\SysWOW64\igfxkb32.exe igfxkb32.exe File opened for modification C:\Windows\SysWOW64\ igfxkb32.exe File opened for modification C:\Windows\SysWOW64\igfxkb32.exe igfxkb32.exe File created C:\Windows\SysWOW64\igfxkb32.exe igfxkb32.exe File created C:\Windows\SysWOW64\igfxkb32.exe igfxkb32.exe File opened for modification C:\Windows\SysWOW64\ igfxkb32.exe File opened for modification C:\Windows\SysWOW64\ igfxkb32.exe File created C:\Windows\SysWOW64\igfxkb32.exe igfxkb32.exe File opened for modification C:\Windows\SysWOW64\ igfxkb32.exe File opened for modification C:\Windows\SysWOW64\igfxkb32.exe igfxkb32.exe File created C:\Windows\SysWOW64\igfxkb32.exe igfxkb32.exe File opened for modification C:\Windows\SysWOW64\ 7ae7a7ba4496d3f41ea55d432a6346a3.exe File opened for modification C:\Windows\SysWOW64\igfxkb32.exe igfxkb32.exe File opened for modification C:\Windows\SysWOW64\ igfxkb32.exe File opened for modification C:\Windows\SysWOW64\igfxkb32.exe igfxkb32.exe File opened for modification C:\Windows\SysWOW64\igfxkb32.exe igfxkb32.exe File opened for modification C:\Windows\SysWOW64\ igfxkb32.exe File opened for modification C:\Windows\SysWOW64\igfxkb32.exe igfxkb32.exe File created C:\Windows\SysWOW64\igfxkb32.exe igfxkb32.exe File created C:\Windows\SysWOW64\igfxkb32.exe igfxkb32.exe File opened for modification C:\Windows\SysWOW64\ igfxkb32.exe File opened for modification C:\Windows\SysWOW64\igfxkb32.exe igfxkb32.exe File opened for modification C:\Windows\SysWOW64\ igfxkb32.exe File created C:\Windows\SysWOW64\igfxkb32.exe igfxkb32.exe File opened for modification C:\Windows\SysWOW64\igfxkb32.exe igfxkb32.exe File opened for modification C:\Windows\SysWOW64\ igfxkb32.exe File created C:\Windows\SysWOW64\igfxkb32.exe 7ae7a7ba4496d3f41ea55d432a6346a3.exe File opened for modification C:\Windows\SysWOW64\ igfxkb32.exe File created C:\Windows\SysWOW64\igfxkb32.exe igfxkb32.exe File opened for modification C:\Windows\SysWOW64\ igfxkb32.exe File opened for modification C:\Windows\SysWOW64\ igfxkb32.exe File opened for modification C:\Windows\SysWOW64\ igfxkb32.exe File opened for modification C:\Windows\SysWOW64\igfxkb32.exe igfxkb32.exe File created C:\Windows\SysWOW64\igfxkb32.exe igfxkb32.exe File opened for modification C:\Windows\SysWOW64\igfxkb32.exe igfxkb32.exe File created C:\Windows\SysWOW64\igfxkb32.exe igfxkb32.exe -
Suspicious use of SetThreadContext 13 IoCs
description pid Process procid_target PID 1720 set thread context of 2836 1720 7ae7a7ba4496d3f41ea55d432a6346a3.exe 28 PID 2716 set thread context of 2672 2716 igfxkb32.exe 32 PID 2432 set thread context of 1164 2432 igfxkb32.exe 34 PID 2932 set thread context of 2544 2932 igfxkb32.exe 36 PID 1516 set thread context of 2172 1516 igfxkb32.exe 38 PID 1324 set thread context of 1288 1324 igfxkb32.exe 40 PID 3024 set thread context of 2356 3024 igfxkb32.exe 42 PID 2144 set thread context of 1468 2144 igfxkb32.exe 44 PID 2328 set thread context of 768 2328 igfxkb32.exe 46 PID 2520 set thread context of 2216 2520 igfxkb32.exe 48 PID 2452 set thread context of 2788 2452 igfxkb32.exe 52 PID 2588 set thread context of 1432 2588 igfxkb32.exe 54 PID 2240 set thread context of 2660 2240 igfxkb32.exe 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2836 7ae7a7ba4496d3f41ea55d432a6346a3.exe 2836 7ae7a7ba4496d3f41ea55d432a6346a3.exe 2672 igfxkb32.exe 2672 igfxkb32.exe 1164 igfxkb32.exe 1164 igfxkb32.exe 2544 igfxkb32.exe 2544 igfxkb32.exe 2172 igfxkb32.exe 2172 igfxkb32.exe 1288 igfxkb32.exe 1288 igfxkb32.exe 2356 igfxkb32.exe 2356 igfxkb32.exe 1468 igfxkb32.exe 1468 igfxkb32.exe 768 igfxkb32.exe 768 igfxkb32.exe 2216 igfxkb32.exe 2216 igfxkb32.exe 3044 igfxkb32.exe 3044 igfxkb32.exe 2788 igfxkb32.exe 2788 igfxkb32.exe 1432 igfxkb32.exe 1432 igfxkb32.exe 2660 igfxkb32.exe 2660 igfxkb32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2836 1720 7ae7a7ba4496d3f41ea55d432a6346a3.exe 28 PID 1720 wrote to memory of 2836 1720 7ae7a7ba4496d3f41ea55d432a6346a3.exe 28 PID 1720 wrote to memory of 2836 1720 7ae7a7ba4496d3f41ea55d432a6346a3.exe 28 PID 1720 wrote to memory of 2836 1720 7ae7a7ba4496d3f41ea55d432a6346a3.exe 28 PID 1720 wrote to memory of 2836 1720 7ae7a7ba4496d3f41ea55d432a6346a3.exe 28 PID 1720 wrote to memory of 2836 1720 7ae7a7ba4496d3f41ea55d432a6346a3.exe 28 PID 1720 wrote to memory of 2836 1720 7ae7a7ba4496d3f41ea55d432a6346a3.exe 28 PID 2836 wrote to memory of 2716 2836 7ae7a7ba4496d3f41ea55d432a6346a3.exe 29 PID 2836 wrote to memory of 2716 2836 7ae7a7ba4496d3f41ea55d432a6346a3.exe 29 PID 2836 wrote to memory of 2716 2836 7ae7a7ba4496d3f41ea55d432a6346a3.exe 29 PID 2836 wrote to memory of 2716 2836 7ae7a7ba4496d3f41ea55d432a6346a3.exe 29 PID 2716 wrote to memory of 2672 2716 igfxkb32.exe 32 PID 2716 wrote to memory of 2672 2716 igfxkb32.exe 32 PID 2716 wrote to memory of 2672 2716 igfxkb32.exe 32 PID 2716 wrote to memory of 2672 2716 igfxkb32.exe 32 PID 2716 wrote to memory of 2672 2716 igfxkb32.exe 32 PID 2716 wrote to memory of 2672 2716 igfxkb32.exe 32 PID 2716 wrote to memory of 2672 2716 igfxkb32.exe 32 PID 2672 wrote to memory of 2432 2672 igfxkb32.exe 33 PID 2672 wrote to memory of 2432 2672 igfxkb32.exe 33 PID 2672 wrote to memory of 2432 2672 igfxkb32.exe 33 PID 2672 wrote to memory of 2432 2672 igfxkb32.exe 33 PID 2432 wrote to memory of 1164 2432 igfxkb32.exe 34 PID 2432 wrote to memory of 1164 2432 igfxkb32.exe 34 PID 2432 wrote to memory of 1164 2432 igfxkb32.exe 34 PID 2432 wrote to memory of 1164 2432 igfxkb32.exe 34 PID 2432 wrote to memory of 1164 2432 igfxkb32.exe 34 PID 2432 wrote to memory of 1164 2432 igfxkb32.exe 34 PID 2432 wrote to memory of 1164 2432 igfxkb32.exe 34 PID 1164 wrote to memory of 2932 1164 igfxkb32.exe 35 PID 1164 wrote to memory of 2932 1164 igfxkb32.exe 35 PID 1164 wrote to memory of 2932 1164 igfxkb32.exe 35 PID 1164 wrote to memory of 2932 1164 igfxkb32.exe 35 PID 2932 wrote to memory of 2544 2932 igfxkb32.exe 36 PID 2932 wrote to memory of 2544 2932 igfxkb32.exe 36 PID 2932 wrote to memory of 2544 2932 igfxkb32.exe 36 PID 2932 wrote to memory of 2544 2932 igfxkb32.exe 36 PID 2932 wrote to memory of 2544 2932 igfxkb32.exe 36 PID 2932 wrote to memory of 2544 2932 igfxkb32.exe 36 PID 2932 wrote to memory of 2544 2932 igfxkb32.exe 36 PID 2544 wrote to memory of 1516 2544 igfxkb32.exe 37 PID 2544 wrote to memory of 1516 2544 igfxkb32.exe 37 PID 2544 wrote to memory of 1516 2544 igfxkb32.exe 37 PID 2544 wrote to memory of 1516 2544 igfxkb32.exe 37 PID 1516 wrote to memory of 2172 1516 igfxkb32.exe 38 PID 1516 wrote to memory of 2172 1516 igfxkb32.exe 38 PID 1516 wrote to memory of 2172 1516 igfxkb32.exe 38 PID 1516 wrote to memory of 2172 1516 igfxkb32.exe 38 PID 1516 wrote to memory of 2172 1516 igfxkb32.exe 38 PID 1516 wrote to memory of 2172 1516 igfxkb32.exe 38 PID 1516 wrote to memory of 2172 1516 igfxkb32.exe 38 PID 2172 wrote to memory of 1324 2172 igfxkb32.exe 39 PID 2172 wrote to memory of 1324 2172 igfxkb32.exe 39 PID 2172 wrote to memory of 1324 2172 igfxkb32.exe 39 PID 2172 wrote to memory of 1324 2172 igfxkb32.exe 39 PID 1324 wrote to memory of 1288 1324 igfxkb32.exe 40 PID 1324 wrote to memory of 1288 1324 igfxkb32.exe 40 PID 1324 wrote to memory of 1288 1324 igfxkb32.exe 40 PID 1324 wrote to memory of 1288 1324 igfxkb32.exe 40 PID 1324 wrote to memory of 1288 1324 igfxkb32.exe 40 PID 1324 wrote to memory of 1288 1324 igfxkb32.exe 40 PID 1324 wrote to memory of 1288 1324 igfxkb32.exe 40 PID 1288 wrote to memory of 3024 1288 igfxkb32.exe 41 PID 1288 wrote to memory of 3024 1288 igfxkb32.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ae7a7ba4496d3f41ea55d432a6346a3.exe"C:\Users\Admin\AppData\Local\Temp\7ae7a7ba4496d3f41ea55d432a6346a3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\7ae7a7ba4496d3f41ea55d432a6346a3.exeC:\Users\Admin\AppData\Local\Temp\7ae7a7ba4496d3f41ea55d432a6346a3.exe2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\igfxkb32.exe"C:\Windows\system32\igfxkb32.exe" C:\Users\Admin\AppData\Local\Temp\7AE7A7~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\igfxkb32.exeC:\Windows\SysWOW64\igfxkb32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\igfxkb32.exe"C:\Windows\system32\igfxkb32.exe" C:\Windows\SysWOW64\igfxkb32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\igfxkb32.exeC:\Windows\SysWOW64\igfxkb32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\SysWOW64\igfxkb32.exe"C:\Windows\system32\igfxkb32.exe" C:\Windows\SysWOW64\igfxkb32.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\igfxkb32.exeC:\Windows\SysWOW64\igfxkb32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\igfxkb32.exe"C:\Windows\system32\igfxkb32.exe" C:\Windows\SysWOW64\igfxkb32.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\igfxkb32.exeC:\Windows\SysWOW64\igfxkb32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\igfxkb32.exe"C:\Windows\system32\igfxkb32.exe" C:\Windows\SysWOW64\igfxkb32.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\igfxkb32.exeC:\Windows\SysWOW64\igfxkb32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\igfxkb32.exe"C:\Windows\system32\igfxkb32.exe" C:\Windows\SysWOW64\igfxkb32.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3024 -
C:\Windows\SysWOW64\igfxkb32.exeC:\Windows\SysWOW64\igfxkb32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2356 -
C:\Windows\SysWOW64\igfxkb32.exe"C:\Windows\system32\igfxkb32.exe" C:\Windows\SysWOW64\igfxkb32.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2144 -
C:\Windows\SysWOW64\igfxkb32.exeC:\Windows\SysWOW64\igfxkb32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1468 -
C:\Windows\SysWOW64\igfxkb32.exe"C:\Windows\system32\igfxkb32.exe" C:\Windows\SysWOW64\igfxkb32.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2328 -
C:\Windows\SysWOW64\igfxkb32.exeC:\Windows\SysWOW64\igfxkb32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:768 -
C:\Windows\SysWOW64\igfxkb32.exe"C:\Windows\system32\igfxkb32.exe" C:\Windows\SysWOW64\igfxkb32.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2520 -
C:\Windows\SysWOW64\igfxkb32.exeC:\Windows\SysWOW64\igfxkb32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2216 -
C:\Windows\SysWOW64\igfxkb32.exe"C:\Windows\system32\igfxkb32.exe" C:\Windows\SysWOW64\igfxkb32.exe21⤵
- Executes dropped EXE
PID:1724 -
C:\Windows\SysWOW64\igfxkb32.exeC:\Windows\SysWOW64\igfxkb32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3044 -
C:\Windows\SysWOW64\igfxkb32.exe"C:\Windows\system32\igfxkb32.exe" C:\Windows\SysWOW64\igfxkb32.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2452 -
C:\Windows\SysWOW64\igfxkb32.exeC:\Windows\SysWOW64\igfxkb32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2788 -
C:\Windows\SysWOW64\igfxkb32.exe"C:\Windows\system32\igfxkb32.exe" C:\Windows\SysWOW64\igfxkb32.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2588 -
C:\Windows\SysWOW64\igfxkb32.exeC:\Windows\SysWOW64\igfxkb32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1432 -
C:\Windows\SysWOW64\igfxkb32.exe"C:\Windows\system32\igfxkb32.exe" C:\Windows\SysWOW64\igfxkb32.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2240 -
C:\Windows\SysWOW64\igfxkb32.exeC:\Windows\SysWOW64\igfxkb32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2660 -
C:\Windows\SysWOW64\igfxkb32.exe"C:\Windows\system32\igfxkb32.exe" C:\Windows\SysWOW64\igfxkb32.exe29⤵
- Executes dropped EXE
PID:1180
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD57ae7a7ba4496d3f41ea55d432a6346a3
SHA1824d712a47bcd0d686e8b0908e83fe949a938a01
SHA25693126c09d41e1a0611c7ef1171e11e1599fc8e619af202982573ece10785891b
SHA512ada791b4b49574f7664a73d51d383b5b409f9520bf620dc3e00cf4c0149239a912d7ed3f6e6003139094445e19de85e566568a59d26e9728a01b9be1eb9cf70d