Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14-07-2024 05:10
Static task
static1
Behavioral task
behavioral1
Sample
447018747bb1d4d1428075608440ad52_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
447018747bb1d4d1428075608440ad52_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
447018747bb1d4d1428075608440ad52_JaffaCakes118.exe
-
Size
202KB
-
MD5
447018747bb1d4d1428075608440ad52
-
SHA1
73fc3ed65261e5f8455d03ff63b12d0e72833d0c
-
SHA256
8328c10e0d2bffa1fd91956b47549f89b27ee560ceaa622b3ff4a205b31b4f33
-
SHA512
02cb15d85a939c521e8de4ef6989f4704c421f2351cbc20d48f81f4b432d673e7ee2bead3e56d59448c203f7292e14e0cf1a27100aa46169600a4b4df4188605
-
SSDEEP
6144:/S+Fau0KN3GvqCkwNj0iIinvXhNNlTxTcIOK:/FUkNTCHjhIWNNTca
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings 2 TTPs 41 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation igfxdr32.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation igfxdr32.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation igfxdr32.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation igfxdr32.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation igfxdr32.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation igfxdr32.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation igfxdr32.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation igfxdr32.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation igfxdr32.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation igfxdr32.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation igfxdr32.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation igfxdr32.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation igfxdr32.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation igfxdr32.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation igfxdr32.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation igfxdr32.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation igfxdr32.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation igfxdr32.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation igfxdr32.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation igfxdr32.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation igfxdr32.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation igfxdr32.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation igfxdr32.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation igfxdr32.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation igfxdr32.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation igfxdr32.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation igfxdr32.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation igfxdr32.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation igfxdr32.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation igfxdr32.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation igfxdr32.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation igfxdr32.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation igfxdr32.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation igfxdr32.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation igfxdr32.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation igfxdr32.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation igfxdr32.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation 447018747bb1d4d1428075608440ad52_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation igfxdr32.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation igfxdr32.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation igfxdr32.exe -
Deletes itself 1 IoCs
pid Process 3412 igfxdr32.exe -
Executes dropped EXE 41 IoCs
pid Process 3412 igfxdr32.exe 2440 igfxdr32.exe 4260 igfxdr32.exe 2948 igfxdr32.exe 1784 igfxdr32.exe 2476 igfxdr32.exe 4192 igfxdr32.exe 2512 igfxdr32.exe 2432 igfxdr32.exe 3512 igfxdr32.exe 3584 igfxdr32.exe 4796 igfxdr32.exe 4336 igfxdr32.exe 4784 igfxdr32.exe 3348 igfxdr32.exe 3592 igfxdr32.exe 1712 igfxdr32.exe 1272 igfxdr32.exe 60 igfxdr32.exe 3200 igfxdr32.exe 2280 igfxdr32.exe 1188 igfxdr32.exe 2084 igfxdr32.exe 3740 igfxdr32.exe 3028 igfxdr32.exe 4956 igfxdr32.exe 2400 igfxdr32.exe 1764 igfxdr32.exe 1152 igfxdr32.exe 4244 igfxdr32.exe 452 igfxdr32.exe 2344 igfxdr32.exe 2732 igfxdr32.exe 224 igfxdr32.exe 5028 igfxdr32.exe 3460 igfxdr32.exe 2664 igfxdr32.exe 5048 igfxdr32.exe 3280 igfxdr32.exe 1660 igfxdr32.exe 3952 igfxdr32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 447018747bb1d4d1428075608440ad52_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdr32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\igfxdr32.exe igfxdr32.exe File created C:\Windows\SysWOW64\igfxdr32.exe igfxdr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdr32.exe File opened for modification C:\Windows\SysWOW64\igfxdr32.exe igfxdr32.exe File created C:\Windows\SysWOW64\igfxdr32.exe igfxdr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdr32.exe File created C:\Windows\SysWOW64\igfxdr32.exe igfxdr32.exe File created C:\Windows\SysWOW64\igfxdr32.exe igfxdr32.exe File opened for modification C:\Windows\SysWOW64\igfxdr32.exe igfxdr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdr32.exe File opened for modification C:\Windows\SysWOW64\igfxdr32.exe igfxdr32.exe File created C:\Windows\SysWOW64\igfxdr32.exe igfxdr32.exe File created C:\Windows\SysWOW64\igfxdr32.exe igfxdr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdr32.exe File created C:\Windows\SysWOW64\igfxdr32.exe igfxdr32.exe File created C:\Windows\SysWOW64\igfxdr32.exe igfxdr32.exe File opened for modification C:\Windows\SysWOW64\igfxdr32.exe igfxdr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdr32.exe File created C:\Windows\SysWOW64\igfxdr32.exe igfxdr32.exe File created C:\Windows\SysWOW64\igfxdr32.exe igfxdr32.exe File opened for modification C:\Windows\SysWOW64\igfxdr32.exe igfxdr32.exe File created C:\Windows\SysWOW64\igfxdr32.exe igfxdr32.exe File opened for modification C:\Windows\SysWOW64\igfxdr32.exe igfxdr32.exe File created C:\Windows\SysWOW64\igfxdr32.exe igfxdr32.exe File opened for modification C:\Windows\SysWOW64\igfxdr32.exe igfxdr32.exe File created C:\Windows\SysWOW64\igfxdr32.exe igfxdr32.exe File created C:\Windows\SysWOW64\igfxdr32.exe igfxdr32.exe File opened for modification C:\Windows\SysWOW64\igfxdr32.exe igfxdr32.exe File created C:\Windows\SysWOW64\igfxdr32.exe igfxdr32.exe File created C:\Windows\SysWOW64\igfxdr32.exe igfxdr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdr32.exe File opened for modification C:\Windows\SysWOW64\igfxdr32.exe 447018747bb1d4d1428075608440ad52_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxdr32.exe igfxdr32.exe File opened for modification C:\Windows\SysWOW64\igfxdr32.exe igfxdr32.exe File opened for modification C:\Windows\SysWOW64\igfxdr32.exe igfxdr32.exe File created C:\Windows\SysWOW64\igfxdr32.exe igfxdr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdr32.exe File created C:\Windows\SysWOW64\igfxdr32.exe igfxdr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdr32.exe File opened for modification C:\Windows\SysWOW64\igfxdr32.exe igfxdr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdr32.exe File opened for modification C:\Windows\SysWOW64\igfxdr32.exe igfxdr32.exe File opened for modification C:\Windows\SysWOW64\igfxdr32.exe igfxdr32.exe File created C:\Windows\SysWOW64\igfxdr32.exe igfxdr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdr32.exe File opened for modification C:\Windows\SysWOW64\igfxdr32.exe igfxdr32.exe File opened for modification C:\Windows\SysWOW64\igfxdr32.exe igfxdr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdr32.exe File created C:\Windows\SysWOW64\igfxdr32.exe igfxdr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdr32.exe File opened for modification C:\Windows\SysWOW64\igfxdr32.exe igfxdr32.exe File created C:\Windows\SysWOW64\igfxdr32.exe igfxdr32.exe File created C:\Windows\SysWOW64\igfxdr32.exe 447018747bb1d4d1428075608440ad52_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxdr32.exe File created C:\Windows\SysWOW64\igfxdr32.exe igfxdr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdr32.exe File opened for modification C:\Windows\SysWOW64\igfxdr32.exe igfxdr32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 42 IoCs
pid Process 4840 447018747bb1d4d1428075608440ad52_JaffaCakes118.exe 3412 igfxdr32.exe 2440 igfxdr32.exe 4260 igfxdr32.exe 2948 igfxdr32.exe 1784 igfxdr32.exe 2476 igfxdr32.exe 4192 igfxdr32.exe 2512 igfxdr32.exe 2432 igfxdr32.exe 3512 igfxdr32.exe 3584 igfxdr32.exe 4796 igfxdr32.exe 4336 igfxdr32.exe 4784 igfxdr32.exe 3348 igfxdr32.exe 3592 igfxdr32.exe 1712 igfxdr32.exe 1272 igfxdr32.exe 60 igfxdr32.exe 3200 igfxdr32.exe 2280 igfxdr32.exe 1188 igfxdr32.exe 2084 igfxdr32.exe 3740 igfxdr32.exe 3028 igfxdr32.exe 4956 igfxdr32.exe 2400 igfxdr32.exe 1764 igfxdr32.exe 1152 igfxdr32.exe 4244 igfxdr32.exe 452 igfxdr32.exe 2344 igfxdr32.exe 2732 igfxdr32.exe 224 igfxdr32.exe 5028 igfxdr32.exe 3460 igfxdr32.exe 2664 igfxdr32.exe 5048 igfxdr32.exe 3280 igfxdr32.exe 1660 igfxdr32.exe 3952 igfxdr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 41 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 447018747bb1d4d1428075608440ad52_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdr32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4840 447018747bb1d4d1428075608440ad52_JaffaCakes118.exe 4840 447018747bb1d4d1428075608440ad52_JaffaCakes118.exe 4840 447018747bb1d4d1428075608440ad52_JaffaCakes118.exe 4840 447018747bb1d4d1428075608440ad52_JaffaCakes118.exe 4840 447018747bb1d4d1428075608440ad52_JaffaCakes118.exe 4840 447018747bb1d4d1428075608440ad52_JaffaCakes118.exe 4840 447018747bb1d4d1428075608440ad52_JaffaCakes118.exe 4840 447018747bb1d4d1428075608440ad52_JaffaCakes118.exe 4840 447018747bb1d4d1428075608440ad52_JaffaCakes118.exe 4840 447018747bb1d4d1428075608440ad52_JaffaCakes118.exe 4840 447018747bb1d4d1428075608440ad52_JaffaCakes118.exe 4840 447018747bb1d4d1428075608440ad52_JaffaCakes118.exe 4840 447018747bb1d4d1428075608440ad52_JaffaCakes118.exe 4840 447018747bb1d4d1428075608440ad52_JaffaCakes118.exe 4840 447018747bb1d4d1428075608440ad52_JaffaCakes118.exe 4840 447018747bb1d4d1428075608440ad52_JaffaCakes118.exe 4840 447018747bb1d4d1428075608440ad52_JaffaCakes118.exe 4840 447018747bb1d4d1428075608440ad52_JaffaCakes118.exe 4840 447018747bb1d4d1428075608440ad52_JaffaCakes118.exe 4840 447018747bb1d4d1428075608440ad52_JaffaCakes118.exe 4840 447018747bb1d4d1428075608440ad52_JaffaCakes118.exe 4840 447018747bb1d4d1428075608440ad52_JaffaCakes118.exe 4840 447018747bb1d4d1428075608440ad52_JaffaCakes118.exe 4840 447018747bb1d4d1428075608440ad52_JaffaCakes118.exe 4840 447018747bb1d4d1428075608440ad52_JaffaCakes118.exe 4840 447018747bb1d4d1428075608440ad52_JaffaCakes118.exe 4840 447018747bb1d4d1428075608440ad52_JaffaCakes118.exe 4840 447018747bb1d4d1428075608440ad52_JaffaCakes118.exe 4840 447018747bb1d4d1428075608440ad52_JaffaCakes118.exe 4840 447018747bb1d4d1428075608440ad52_JaffaCakes118.exe 3412 igfxdr32.exe 3412 igfxdr32.exe 3412 igfxdr32.exe 3412 igfxdr32.exe 3412 igfxdr32.exe 3412 igfxdr32.exe 3412 igfxdr32.exe 3412 igfxdr32.exe 3412 igfxdr32.exe 3412 igfxdr32.exe 3412 igfxdr32.exe 3412 igfxdr32.exe 3412 igfxdr32.exe 3412 igfxdr32.exe 3412 igfxdr32.exe 3412 igfxdr32.exe 3412 igfxdr32.exe 3412 igfxdr32.exe 3412 igfxdr32.exe 3412 igfxdr32.exe 3412 igfxdr32.exe 3412 igfxdr32.exe 3412 igfxdr32.exe 3412 igfxdr32.exe 3412 igfxdr32.exe 3412 igfxdr32.exe 3412 igfxdr32.exe 3412 igfxdr32.exe 3412 igfxdr32.exe 3412 igfxdr32.exe 2440 igfxdr32.exe 2440 igfxdr32.exe 2440 igfxdr32.exe 2440 igfxdr32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4840 wrote to memory of 3412 4840 447018747bb1d4d1428075608440ad52_JaffaCakes118.exe 86 PID 4840 wrote to memory of 3412 4840 447018747bb1d4d1428075608440ad52_JaffaCakes118.exe 86 PID 4840 wrote to memory of 3412 4840 447018747bb1d4d1428075608440ad52_JaffaCakes118.exe 86 PID 3412 wrote to memory of 2440 3412 igfxdr32.exe 87 PID 3412 wrote to memory of 2440 3412 igfxdr32.exe 87 PID 3412 wrote to memory of 2440 3412 igfxdr32.exe 87 PID 2440 wrote to memory of 4260 2440 igfxdr32.exe 88 PID 2440 wrote to memory of 4260 2440 igfxdr32.exe 88 PID 2440 wrote to memory of 4260 2440 igfxdr32.exe 88 PID 4260 wrote to memory of 2948 4260 igfxdr32.exe 89 PID 4260 wrote to memory of 2948 4260 igfxdr32.exe 89 PID 4260 wrote to memory of 2948 4260 igfxdr32.exe 89 PID 2948 wrote to memory of 1784 2948 igfxdr32.exe 90 PID 2948 wrote to memory of 1784 2948 igfxdr32.exe 90 PID 2948 wrote to memory of 1784 2948 igfxdr32.exe 90 PID 1784 wrote to memory of 2476 1784 igfxdr32.exe 91 PID 1784 wrote to memory of 2476 1784 igfxdr32.exe 91 PID 1784 wrote to memory of 2476 1784 igfxdr32.exe 91 PID 2476 wrote to memory of 4192 2476 igfxdr32.exe 92 PID 2476 wrote to memory of 4192 2476 igfxdr32.exe 92 PID 2476 wrote to memory of 4192 2476 igfxdr32.exe 92 PID 4192 wrote to memory of 2512 4192 igfxdr32.exe 93 PID 4192 wrote to memory of 2512 4192 igfxdr32.exe 93 PID 4192 wrote to memory of 2512 4192 igfxdr32.exe 93 PID 2512 wrote to memory of 2432 2512 igfxdr32.exe 96 PID 2512 wrote to memory of 2432 2512 igfxdr32.exe 96 PID 2512 wrote to memory of 2432 2512 igfxdr32.exe 96 PID 2432 wrote to memory of 3512 2432 igfxdr32.exe 97 PID 2432 wrote to memory of 3512 2432 igfxdr32.exe 97 PID 2432 wrote to memory of 3512 2432 igfxdr32.exe 97 PID 3512 wrote to memory of 3584 3512 igfxdr32.exe 98 PID 3512 wrote to memory of 3584 3512 igfxdr32.exe 98 PID 3512 wrote to memory of 3584 3512 igfxdr32.exe 98 PID 3584 wrote to memory of 4796 3584 igfxdr32.exe 100 PID 3584 wrote to memory of 4796 3584 igfxdr32.exe 100 PID 3584 wrote to memory of 4796 3584 igfxdr32.exe 100 PID 4796 wrote to memory of 4336 4796 igfxdr32.exe 101 PID 4796 wrote to memory of 4336 4796 igfxdr32.exe 101 PID 4796 wrote to memory of 4336 4796 igfxdr32.exe 101 PID 4336 wrote to memory of 4784 4336 igfxdr32.exe 102 PID 4336 wrote to memory of 4784 4336 igfxdr32.exe 102 PID 4336 wrote to memory of 4784 4336 igfxdr32.exe 102 PID 4784 wrote to memory of 3348 4784 igfxdr32.exe 103 PID 4784 wrote to memory of 3348 4784 igfxdr32.exe 103 PID 4784 wrote to memory of 3348 4784 igfxdr32.exe 103 PID 3348 wrote to memory of 3592 3348 igfxdr32.exe 104 PID 3348 wrote to memory of 3592 3348 igfxdr32.exe 104 PID 3348 wrote to memory of 3592 3348 igfxdr32.exe 104 PID 3592 wrote to memory of 1712 3592 igfxdr32.exe 105 PID 3592 wrote to memory of 1712 3592 igfxdr32.exe 105 PID 3592 wrote to memory of 1712 3592 igfxdr32.exe 105 PID 1712 wrote to memory of 1272 1712 igfxdr32.exe 106 PID 1712 wrote to memory of 1272 1712 igfxdr32.exe 106 PID 1712 wrote to memory of 1272 1712 igfxdr32.exe 106 PID 1272 wrote to memory of 60 1272 igfxdr32.exe 107 PID 1272 wrote to memory of 60 1272 igfxdr32.exe 107 PID 1272 wrote to memory of 60 1272 igfxdr32.exe 107 PID 60 wrote to memory of 3200 60 igfxdr32.exe 108 PID 60 wrote to memory of 3200 60 igfxdr32.exe 108 PID 60 wrote to memory of 3200 60 igfxdr32.exe 108 PID 3200 wrote to memory of 2280 3200 igfxdr32.exe 109 PID 3200 wrote to memory of 2280 3200 igfxdr32.exe 109 PID 3200 wrote to memory of 2280 3200 igfxdr32.exe 109 PID 2280 wrote to memory of 1188 2280 igfxdr32.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\447018747bb1d4d1428075608440ad52_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\447018747bb1d4d1428075608440ad52_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\SysWOW64\igfxdr32.exe"C:\Windows\system32\igfxdr32.exe" C:\Users\Admin\AppData\Local\Temp\447018~1.EXE2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\SysWOW64\igfxdr32.exe"C:\Windows\system32\igfxdr32.exe" C:\Windows\SysWOW64\igfxdr32.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\igfxdr32.exe"C:\Windows\system32\igfxdr32.exe" C:\Windows\SysWOW64\igfxdr32.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\SysWOW64\igfxdr32.exe"C:\Windows\system32\igfxdr32.exe" C:\Windows\SysWOW64\igfxdr32.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\igfxdr32.exe"C:\Windows\system32\igfxdr32.exe" C:\Windows\SysWOW64\igfxdr32.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\igfxdr32.exe"C:\Windows\system32\igfxdr32.exe" C:\Windows\SysWOW64\igfxdr32.exe7⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\igfxdr32.exe"C:\Windows\system32\igfxdr32.exe" C:\Windows\SysWOW64\igfxdr32.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\SysWOW64\igfxdr32.exe"C:\Windows\system32\igfxdr32.exe" C:\Windows\SysWOW64\igfxdr32.exe9⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\igfxdr32.exe"C:\Windows\system32\igfxdr32.exe" C:\Windows\SysWOW64\igfxdr32.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\igfxdr32.exe"C:\Windows\system32\igfxdr32.exe" C:\Windows\SysWOW64\igfxdr32.exe11⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\SysWOW64\igfxdr32.exe"C:\Windows\system32\igfxdr32.exe" C:\Windows\SysWOW64\igfxdr32.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\SysWOW64\igfxdr32.exe"C:\Windows\system32\igfxdr32.exe" C:\Windows\SysWOW64\igfxdr32.exe13⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\SysWOW64\igfxdr32.exe"C:\Windows\system32\igfxdr32.exe" C:\Windows\SysWOW64\igfxdr32.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\SysWOW64\igfxdr32.exe"C:\Windows\system32\igfxdr32.exe" C:\Windows\SysWOW64\igfxdr32.exe15⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\SysWOW64\igfxdr32.exe"C:\Windows\system32\igfxdr32.exe" C:\Windows\SysWOW64\igfxdr32.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Windows\SysWOW64\igfxdr32.exe"C:\Windows\system32\igfxdr32.exe" C:\Windows\SysWOW64\igfxdr32.exe17⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\SysWOW64\igfxdr32.exe"C:\Windows\system32\igfxdr32.exe" C:\Windows\SysWOW64\igfxdr32.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\igfxdr32.exe"C:\Windows\system32\igfxdr32.exe" C:\Windows\SysWOW64\igfxdr32.exe19⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\igfxdr32.exe"C:\Windows\system32\igfxdr32.exe" C:\Windows\SysWOW64\igfxdr32.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\SysWOW64\igfxdr32.exe"C:\Windows\system32\igfxdr32.exe" C:\Windows\SysWOW64\igfxdr32.exe21⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Windows\SysWOW64\igfxdr32.exe"C:\Windows\system32\igfxdr32.exe" C:\Windows\SysWOW64\igfxdr32.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\igfxdr32.exe"C:\Windows\system32\igfxdr32.exe" C:\Windows\SysWOW64\igfxdr32.exe23⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
PID:1188 -
C:\Windows\SysWOW64\igfxdr32.exe"C:\Windows\system32\igfxdr32.exe" C:\Windows\SysWOW64\igfxdr32.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
PID:2084 -
C:\Windows\SysWOW64\igfxdr32.exe"C:\Windows\system32\igfxdr32.exe" C:\Windows\SysWOW64\igfxdr32.exe25⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
PID:3740 -
C:\Windows\SysWOW64\igfxdr32.exe"C:\Windows\system32\igfxdr32.exe" C:\Windows\SysWOW64\igfxdr32.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
PID:3028 -
C:\Windows\SysWOW64\igfxdr32.exe"C:\Windows\system32\igfxdr32.exe" C:\Windows\SysWOW64\igfxdr32.exe27⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
PID:4956 -
C:\Windows\SysWOW64\igfxdr32.exe"C:\Windows\system32\igfxdr32.exe" C:\Windows\SysWOW64\igfxdr32.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
PID:2400 -
C:\Windows\SysWOW64\igfxdr32.exe"C:\Windows\system32\igfxdr32.exe" C:\Windows\SysWOW64\igfxdr32.exe29⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
PID:1764 -
C:\Windows\SysWOW64\igfxdr32.exe"C:\Windows\system32\igfxdr32.exe" C:\Windows\SysWOW64\igfxdr32.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
PID:1152 -
C:\Windows\SysWOW64\igfxdr32.exe"C:\Windows\system32\igfxdr32.exe" C:\Windows\SysWOW64\igfxdr32.exe31⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
PID:4244 -
C:\Windows\SysWOW64\igfxdr32.exe"C:\Windows\system32\igfxdr32.exe" C:\Windows\SysWOW64\igfxdr32.exe32⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
PID:452 -
C:\Windows\SysWOW64\igfxdr32.exe"C:\Windows\system32\igfxdr32.exe" C:\Windows\SysWOW64\igfxdr32.exe33⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
PID:2344 -
C:\Windows\SysWOW64\igfxdr32.exe"C:\Windows\system32\igfxdr32.exe" C:\Windows\SysWOW64\igfxdr32.exe34⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
PID:2732 -
C:\Windows\SysWOW64\igfxdr32.exe"C:\Windows\system32\igfxdr32.exe" C:\Windows\SysWOW64\igfxdr32.exe35⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
PID:224 -
C:\Windows\SysWOW64\igfxdr32.exe"C:\Windows\system32\igfxdr32.exe" C:\Windows\SysWOW64\igfxdr32.exe36⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
PID:5028 -
C:\Windows\SysWOW64\igfxdr32.exe"C:\Windows\system32\igfxdr32.exe" C:\Windows\SysWOW64\igfxdr32.exe37⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
PID:3460 -
C:\Windows\SysWOW64\igfxdr32.exe"C:\Windows\system32\igfxdr32.exe" C:\Windows\SysWOW64\igfxdr32.exe38⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
PID:2664 -
C:\Windows\SysWOW64\igfxdr32.exe"C:\Windows\system32\igfxdr32.exe" C:\Windows\SysWOW64\igfxdr32.exe39⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
PID:5048 -
C:\Windows\SysWOW64\igfxdr32.exe"C:\Windows\system32\igfxdr32.exe" C:\Windows\SysWOW64\igfxdr32.exe40⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
PID:3280 -
C:\Windows\SysWOW64\igfxdr32.exe"C:\Windows\system32\igfxdr32.exe" C:\Windows\SysWOW64\igfxdr32.exe41⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
PID:1660 -
C:\Windows\SysWOW64\igfxdr32.exe"C:\Windows\system32\igfxdr32.exe" C:\Windows\SysWOW64\igfxdr32.exe42⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3952
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202KB
MD5447018747bb1d4d1428075608440ad52
SHA173fc3ed65261e5f8455d03ff63b12d0e72833d0c
SHA2568328c10e0d2bffa1fd91956b47549f89b27ee560ceaa622b3ff4a205b31b4f33
SHA51202cb15d85a939c521e8de4ef6989f4704c421f2351cbc20d48f81f4b432d673e7ee2bead3e56d59448c203f7292e14e0cf1a27100aa46169600a4b4df4188605