Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 15:51
Static task
static1
Behavioral task
behavioral1
Sample
e20a2e09c3050c02b1bd800a06f7b2ef.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e20a2e09c3050c02b1bd800a06f7b2ef.exe
Resource
win10v2004-20231215-en
General
-
Target
e20a2e09c3050c02b1bd800a06f7b2ef.exe
-
Size
168KB
-
MD5
e20a2e09c3050c02b1bd800a06f7b2ef
-
SHA1
63218ed0508f58e6249ebeb567bd36898c02fa8b
-
SHA256
a5194d524d6873a0c9b353153e9d73b16022567224a09f46d9ccbf251cf6c8ac
-
SHA512
581f1276a853cc9277ce20202cd78ae2f33c4802ce0d07cf964e397a8955ab49d9a23faacf66a96387b57040221dc1bfbf1bc09c7e85fa9b5cf04a9b288e8d84
-
SSDEEP
3072:o194BB9ZN91eRHm02Voe//OH+PHfvCvC:Yubj4RH2VokfHC
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings 2 TTPs 44 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation e20a2e09c3050c02b1bd800a06f7b2ef.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation igfxtc32.exe -
Deletes itself 1 IoCs
pid Process 3504 igfxtc32.exe -
Executes dropped EXE 43 IoCs
pid Process 3504 igfxtc32.exe 1524 igfxtc32.exe 3020 igfxtc32.exe 4392 igfxtc32.exe 400 igfxtc32.exe 3360 igfxtc32.exe 1152 igfxtc32.exe 5096 igfxtc32.exe 5068 igfxtc32.exe 4752 igfxtc32.exe 116 igfxtc32.exe 1708 igfxtc32.exe 4768 igfxtc32.exe 448 igfxtc32.exe 4628 igfxtc32.exe 4816 igfxtc32.exe 3548 igfxtc32.exe 4968 igfxtc32.exe 3612 igfxtc32.exe 316 igfxtc32.exe 1636 igfxtc32.exe 860 igfxtc32.exe 2172 igfxtc32.exe 4620 igfxtc32.exe 3040 igfxtc32.exe 1440 igfxtc32.exe 3704 igfxtc32.exe 4148 igfxtc32.exe 1472 igfxtc32.exe 3148 igfxtc32.exe 4936 igfxtc32.exe 4056 igfxtc32.exe 4976 igfxtc32.exe 3660 igfxtc32.exe 2028 igfxtc32.exe 5064 igfxtc32.exe 4752 igfxtc32.exe 784 igfxtc32.exe 116 igfxtc32.exe 3596 igfxtc32.exe 4672 igfxtc32.exe 2244 igfxtc32.exe 3928 igfxtc32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum e20a2e09c3050c02b1bd800a06f7b2ef.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtc32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\ igfxtc32.exe File created C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File created C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\ igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File created C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\ igfxtc32.exe File created C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\ igfxtc32.exe File created C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\ igfxtc32.exe File opened for modification C:\Windows\SysWOW64\ igfxtc32.exe File created C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\ igfxtc32.exe File opened for modification C:\Windows\SysWOW64\ igfxtc32.exe File opened for modification C:\Windows\SysWOW64\ igfxtc32.exe File opened for modification C:\Windows\SysWOW64\ igfxtc32.exe File created C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File created C:\Windows\SysWOW64\igfxtc32.exe e20a2e09c3050c02b1bd800a06f7b2ef.exe File created C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\ igfxtc32.exe File created C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File created C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\ igfxtc32.exe File opened for modification C:\Windows\SysWOW64\ igfxtc32.exe File created C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\ igfxtc32.exe File opened for modification C:\Windows\SysWOW64\ igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File created C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File created C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File created C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\ igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\ igfxtc32.exe File created C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File created C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\ igfxtc32.exe File created C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\ igfxtc32.exe File created C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File created C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File created C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe File opened for modification C:\Windows\SysWOW64\igfxtc32.exe igfxtc32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 44 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ e20a2e09c3050c02b1bd800a06f7b2ef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtc32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2172 e20a2e09c3050c02b1bd800a06f7b2ef.exe 2172 e20a2e09c3050c02b1bd800a06f7b2ef.exe 2172 e20a2e09c3050c02b1bd800a06f7b2ef.exe 2172 e20a2e09c3050c02b1bd800a06f7b2ef.exe 3504 igfxtc32.exe 3504 igfxtc32.exe 3504 igfxtc32.exe 3504 igfxtc32.exe 1524 igfxtc32.exe 1524 igfxtc32.exe 1524 igfxtc32.exe 1524 igfxtc32.exe 3020 igfxtc32.exe 3020 igfxtc32.exe 3020 igfxtc32.exe 3020 igfxtc32.exe 4392 igfxtc32.exe 4392 igfxtc32.exe 4392 igfxtc32.exe 4392 igfxtc32.exe 400 igfxtc32.exe 400 igfxtc32.exe 400 igfxtc32.exe 400 igfxtc32.exe 3360 igfxtc32.exe 3360 igfxtc32.exe 3360 igfxtc32.exe 3360 igfxtc32.exe 1152 igfxtc32.exe 1152 igfxtc32.exe 1152 igfxtc32.exe 1152 igfxtc32.exe 5096 igfxtc32.exe 5096 igfxtc32.exe 5096 igfxtc32.exe 5096 igfxtc32.exe 5068 igfxtc32.exe 5068 igfxtc32.exe 5068 igfxtc32.exe 5068 igfxtc32.exe 4752 igfxtc32.exe 4752 igfxtc32.exe 4752 igfxtc32.exe 4752 igfxtc32.exe 116 igfxtc32.exe 116 igfxtc32.exe 116 igfxtc32.exe 116 igfxtc32.exe 1708 igfxtc32.exe 1708 igfxtc32.exe 1708 igfxtc32.exe 1708 igfxtc32.exe 4768 igfxtc32.exe 4768 igfxtc32.exe 4768 igfxtc32.exe 4768 igfxtc32.exe 448 igfxtc32.exe 448 igfxtc32.exe 448 igfxtc32.exe 448 igfxtc32.exe 4628 igfxtc32.exe 4628 igfxtc32.exe 4628 igfxtc32.exe 4628 igfxtc32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2172 wrote to memory of 3504 2172 e20a2e09c3050c02b1bd800a06f7b2ef.exe 85 PID 2172 wrote to memory of 3504 2172 e20a2e09c3050c02b1bd800a06f7b2ef.exe 85 PID 2172 wrote to memory of 3504 2172 e20a2e09c3050c02b1bd800a06f7b2ef.exe 85 PID 3504 wrote to memory of 1524 3504 igfxtc32.exe 88 PID 3504 wrote to memory of 1524 3504 igfxtc32.exe 88 PID 3504 wrote to memory of 1524 3504 igfxtc32.exe 88 PID 1524 wrote to memory of 3020 1524 igfxtc32.exe 91 PID 1524 wrote to memory of 3020 1524 igfxtc32.exe 91 PID 1524 wrote to memory of 3020 1524 igfxtc32.exe 91 PID 3020 wrote to memory of 4392 3020 igfxtc32.exe 94 PID 3020 wrote to memory of 4392 3020 igfxtc32.exe 94 PID 3020 wrote to memory of 4392 3020 igfxtc32.exe 94 PID 4392 wrote to memory of 400 4392 igfxtc32.exe 96 PID 4392 wrote to memory of 400 4392 igfxtc32.exe 96 PID 4392 wrote to memory of 400 4392 igfxtc32.exe 96 PID 400 wrote to memory of 3360 400 igfxtc32.exe 97 PID 400 wrote to memory of 3360 400 igfxtc32.exe 97 PID 400 wrote to memory of 3360 400 igfxtc32.exe 97 PID 3360 wrote to memory of 1152 3360 igfxtc32.exe 98 PID 3360 wrote to memory of 1152 3360 igfxtc32.exe 98 PID 3360 wrote to memory of 1152 3360 igfxtc32.exe 98 PID 1152 wrote to memory of 5096 1152 igfxtc32.exe 99 PID 1152 wrote to memory of 5096 1152 igfxtc32.exe 99 PID 1152 wrote to memory of 5096 1152 igfxtc32.exe 99 PID 5096 wrote to memory of 5068 5096 igfxtc32.exe 101 PID 5096 wrote to memory of 5068 5096 igfxtc32.exe 101 PID 5096 wrote to memory of 5068 5096 igfxtc32.exe 101 PID 5068 wrote to memory of 4752 5068 igfxtc32.exe 102 PID 5068 wrote to memory of 4752 5068 igfxtc32.exe 102 PID 5068 wrote to memory of 4752 5068 igfxtc32.exe 102 PID 4752 wrote to memory of 116 4752 igfxtc32.exe 103 PID 4752 wrote to memory of 116 4752 igfxtc32.exe 103 PID 4752 wrote to memory of 116 4752 igfxtc32.exe 103 PID 116 wrote to memory of 1708 116 igfxtc32.exe 104 PID 116 wrote to memory of 1708 116 igfxtc32.exe 104 PID 116 wrote to memory of 1708 116 igfxtc32.exe 104 PID 1708 wrote to memory of 4768 1708 igfxtc32.exe 105 PID 1708 wrote to memory of 4768 1708 igfxtc32.exe 105 PID 1708 wrote to memory of 4768 1708 igfxtc32.exe 105 PID 4768 wrote to memory of 448 4768 igfxtc32.exe 106 PID 4768 wrote to memory of 448 4768 igfxtc32.exe 106 PID 4768 wrote to memory of 448 4768 igfxtc32.exe 106 PID 448 wrote to memory of 4628 448 igfxtc32.exe 107 PID 448 wrote to memory of 4628 448 igfxtc32.exe 107 PID 448 wrote to memory of 4628 448 igfxtc32.exe 107 PID 4628 wrote to memory of 4816 4628 igfxtc32.exe 108 PID 4628 wrote to memory of 4816 4628 igfxtc32.exe 108 PID 4628 wrote to memory of 4816 4628 igfxtc32.exe 108 PID 4816 wrote to memory of 3548 4816 igfxtc32.exe 109 PID 4816 wrote to memory of 3548 4816 igfxtc32.exe 109 PID 4816 wrote to memory of 3548 4816 igfxtc32.exe 109 PID 3548 wrote to memory of 4968 3548 igfxtc32.exe 110 PID 3548 wrote to memory of 4968 3548 igfxtc32.exe 110 PID 3548 wrote to memory of 4968 3548 igfxtc32.exe 110 PID 4968 wrote to memory of 3612 4968 igfxtc32.exe 111 PID 4968 wrote to memory of 3612 4968 igfxtc32.exe 111 PID 4968 wrote to memory of 3612 4968 igfxtc32.exe 111 PID 3612 wrote to memory of 316 3612 igfxtc32.exe 112 PID 3612 wrote to memory of 316 3612 igfxtc32.exe 112 PID 3612 wrote to memory of 316 3612 igfxtc32.exe 112 PID 316 wrote to memory of 1636 316 igfxtc32.exe 113 PID 316 wrote to memory of 1636 316 igfxtc32.exe 113 PID 316 wrote to memory of 1636 316 igfxtc32.exe 113 PID 1636 wrote to memory of 860 1636 igfxtc32.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\e20a2e09c3050c02b1bd800a06f7b2ef.exe"C:\Users\Admin\AppData\Local\Temp\e20a2e09c3050c02b1bd800a06f7b2ef.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Users\Admin\AppData\Local\Temp\E20A2E~1.EXE2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe7⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe9⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe11⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe13⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe15⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe17⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe19⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe21⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe23⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:860 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:2172 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe25⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:4620 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:3040 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe27⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:1440 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3704 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe29⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Modifies registry class
PID:4148 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:1472 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe31⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:3148 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe32⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Modifies registry class
PID:4936 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe33⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:4056 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe34⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:4976 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe35⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:3660 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe36⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:2028 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe37⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:5064 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe38⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:4752 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe39⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:784 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe40⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:116 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe41⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:3596 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe42⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Modifies registry class
PID:4672 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe43⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Modifies registry class
PID:2244 -
C:\Windows\SysWOW64\igfxtc32.exe"C:\Windows\system32\igfxtc32.exe" C:\Windows\SysWOW64\igfxtc32.exe44⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:3928
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5e20a2e09c3050c02b1bd800a06f7b2ef
SHA163218ed0508f58e6249ebeb567bd36898c02fa8b
SHA256a5194d524d6873a0c9b353153e9d73b16022567224a09f46d9ccbf251cf6c8ac
SHA512581f1276a853cc9277ce20202cd78ae2f33c4802ce0d07cf964e397a8955ab49d9a23faacf66a96387b57040221dc1bfbf1bc09c7e85fa9b5cf04a9b288e8d84