Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 00:32
Behavioral task
behavioral1
Sample
84288560bcb297ea77f35af1fd74df59_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
84288560bcb297ea77f35af1fd74df59_JaffaCakes118.exe
-
Size
199KB
-
MD5
84288560bcb297ea77f35af1fd74df59
-
SHA1
4d511236a7e83f46986b6a61febeebf4b4487679
-
SHA256
79c92c2ebb525e262506063090767033c5f5abc3730976e0ea1f2a8722813681
-
SHA512
4cac52dcc2bd8cc9cb7266dfbf7b33633a9408316b5a22e886fe0b5435c671fc614ca04c410e7966c3699b84e37dd6f924b9c458b74adf08db264ad2f8050770
-
SSDEEP
6144:mQ6ZiWRd80thX1ef/t8VRHz8Mz9sze/+fnHaGg:mxiSdry2JzfaaGvg
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2112 igfxpd32.exe -
Executes dropped EXE 64 IoCs
pid Process 2112 igfxpd32.exe 2804 igfxpd32.exe 2120 igfxpd32.exe 2632 igfxpd32.exe 3060 igfxpd32.exe 1048 igfxpd32.exe 1660 igfxpd32.exe 1932 igfxpd32.exe 1776 igfxpd32.exe 1252 igfxpd32.exe 1688 igfxpd32.exe 1724 igfxpd32.exe 468 igfxpd32.exe 2584 igfxpd32.exe 1684 igfxpd32.exe 2456 igfxpd32.exe 2372 igfxpd32.exe 1756 igfxpd32.exe 2400 igfxpd32.exe 1728 igfxpd32.exe 2248 igfxpd32.exe 2816 igfxpd32.exe 2772 igfxpd32.exe 2616 igfxpd32.exe 2600 igfxpd32.exe 2100 igfxpd32.exe 3064 igfxpd32.exe 1992 igfxpd32.exe 2912 igfxpd32.exe 2480 igfxpd32.exe 2564 igfxpd32.exe 1776 igfxpd32.exe 1644 igfxpd32.exe 2116 igfxpd32.exe 2996 igfxpd32.exe 2992 igfxpd32.exe 1456 igfxpd32.exe 468 igfxpd32.exe 2584 igfxpd32.exe 1064 igfxpd32.exe 2488 igfxpd32.exe 1744 igfxpd32.exe 2440 igfxpd32.exe 1936 igfxpd32.exe 1572 igfxpd32.exe 2888 igfxpd32.exe 2636 igfxpd32.exe 2620 igfxpd32.exe 2676 igfxpd32.exe 2540 igfxpd32.exe 1368 igfxpd32.exe 1112 igfxpd32.exe 2000 igfxpd32.exe 2384 igfxpd32.exe 2912 igfxpd32.exe 2480 igfxpd32.exe 2752 igfxpd32.exe 2564 igfxpd32.exe 320 igfxpd32.exe 448 igfxpd32.exe 1184 igfxpd32.exe 2920 igfxpd32.exe 992 igfxpd32.exe 920 igfxpd32.exe -
Loads dropped DLL 64 IoCs
pid Process 2544 84288560bcb297ea77f35af1fd74df59_JaffaCakes118.exe 2544 84288560bcb297ea77f35af1fd74df59_JaffaCakes118.exe 2112 igfxpd32.exe 2112 igfxpd32.exe 2804 igfxpd32.exe 2804 igfxpd32.exe 2120 igfxpd32.exe 2120 igfxpd32.exe 2632 igfxpd32.exe 2632 igfxpd32.exe 3060 igfxpd32.exe 3060 igfxpd32.exe 1048 igfxpd32.exe 1048 igfxpd32.exe 1660 igfxpd32.exe 1660 igfxpd32.exe 1932 igfxpd32.exe 1932 igfxpd32.exe 1776 igfxpd32.exe 1776 igfxpd32.exe 1252 igfxpd32.exe 1252 igfxpd32.exe 1688 igfxpd32.exe 1688 igfxpd32.exe 1724 igfxpd32.exe 1724 igfxpd32.exe 468 igfxpd32.exe 468 igfxpd32.exe 2584 igfxpd32.exe 2584 igfxpd32.exe 1684 igfxpd32.exe 1684 igfxpd32.exe 2456 igfxpd32.exe 2456 igfxpd32.exe 2372 igfxpd32.exe 2372 igfxpd32.exe 1756 igfxpd32.exe 1756 igfxpd32.exe 2400 igfxpd32.exe 2400 igfxpd32.exe 1728 igfxpd32.exe 1728 igfxpd32.exe 2248 igfxpd32.exe 2248 igfxpd32.exe 2816 igfxpd32.exe 2816 igfxpd32.exe 2772 igfxpd32.exe 2772 igfxpd32.exe 2616 igfxpd32.exe 2616 igfxpd32.exe 2600 igfxpd32.exe 2600 igfxpd32.exe 2100 igfxpd32.exe 2100 igfxpd32.exe 3064 igfxpd32.exe 3064 igfxpd32.exe 1992 igfxpd32.exe 1992 igfxpd32.exe 2912 igfxpd32.exe 2912 igfxpd32.exe 2480 igfxpd32.exe 2480 igfxpd32.exe 2564 igfxpd32.exe 2564 igfxpd32.exe -
resource yara_rule behavioral1/files/0x000c000000012273-5.dat upx behavioral1/memory/2112-13-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/2112-20-0x00000000032C0000-0x000000000335C000-memory.dmp upx behavioral1/memory/2632-37-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/1048-51-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/1660-58-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/1932-64-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/1776-70-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/1252-77-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/1724-90-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/468-95-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/2584-104-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/2456-117-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/1756-129-0x0000000004A30000-0x0000000004ACC000-memory.dmp upx behavioral1/memory/1728-135-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/2616-146-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/1776-167-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/1744-191-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/1936-198-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/2888-203-0x0000000000400000-0x000000000049C000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 84288560bcb297ea77f35af1fd74df59_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe 84288560bcb297ea77f35af1fd74df59_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe 84288560bcb297ea77f35af1fd74df59_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84288560bcb297ea77f35af1fd74df59_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2544 84288560bcb297ea77f35af1fd74df59_JaffaCakes118.exe 2544 84288560bcb297ea77f35af1fd74df59_JaffaCakes118.exe 2112 igfxpd32.exe 2112 igfxpd32.exe 2804 igfxpd32.exe 2804 igfxpd32.exe 2120 igfxpd32.exe 2120 igfxpd32.exe 2632 igfxpd32.exe 2632 igfxpd32.exe 3060 igfxpd32.exe 3060 igfxpd32.exe 1048 igfxpd32.exe 1048 igfxpd32.exe 1660 igfxpd32.exe 1660 igfxpd32.exe 1932 igfxpd32.exe 1932 igfxpd32.exe 1776 igfxpd32.exe 1776 igfxpd32.exe 1252 igfxpd32.exe 1252 igfxpd32.exe 1688 igfxpd32.exe 1688 igfxpd32.exe 1724 igfxpd32.exe 1724 igfxpd32.exe 468 igfxpd32.exe 468 igfxpd32.exe 2584 igfxpd32.exe 2584 igfxpd32.exe 1684 igfxpd32.exe 1684 igfxpd32.exe 2456 igfxpd32.exe 2456 igfxpd32.exe 2372 igfxpd32.exe 2372 igfxpd32.exe 1756 igfxpd32.exe 1756 igfxpd32.exe 2400 igfxpd32.exe 2400 igfxpd32.exe 1728 igfxpd32.exe 1728 igfxpd32.exe 2248 igfxpd32.exe 2248 igfxpd32.exe 2816 igfxpd32.exe 2816 igfxpd32.exe 2772 igfxpd32.exe 2772 igfxpd32.exe 2616 igfxpd32.exe 2616 igfxpd32.exe 2600 igfxpd32.exe 2600 igfxpd32.exe 2100 igfxpd32.exe 2100 igfxpd32.exe 3064 igfxpd32.exe 3064 igfxpd32.exe 1992 igfxpd32.exe 1992 igfxpd32.exe 2912 igfxpd32.exe 2912 igfxpd32.exe 2480 igfxpd32.exe 2480 igfxpd32.exe 2564 igfxpd32.exe 2564 igfxpd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2112 2544 84288560bcb297ea77f35af1fd74df59_JaffaCakes118.exe 30 PID 2544 wrote to memory of 2112 2544 84288560bcb297ea77f35af1fd74df59_JaffaCakes118.exe 30 PID 2544 wrote to memory of 2112 2544 84288560bcb297ea77f35af1fd74df59_JaffaCakes118.exe 30 PID 2544 wrote to memory of 2112 2544 84288560bcb297ea77f35af1fd74df59_JaffaCakes118.exe 30 PID 2112 wrote to memory of 2804 2112 igfxpd32.exe 31 PID 2112 wrote to memory of 2804 2112 igfxpd32.exe 31 PID 2112 wrote to memory of 2804 2112 igfxpd32.exe 31 PID 2112 wrote to memory of 2804 2112 igfxpd32.exe 31 PID 2804 wrote to memory of 2120 2804 igfxpd32.exe 32 PID 2804 wrote to memory of 2120 2804 igfxpd32.exe 32 PID 2804 wrote to memory of 2120 2804 igfxpd32.exe 32 PID 2804 wrote to memory of 2120 2804 igfxpd32.exe 32 PID 2120 wrote to memory of 2632 2120 igfxpd32.exe 33 PID 2120 wrote to memory of 2632 2120 igfxpd32.exe 33 PID 2120 wrote to memory of 2632 2120 igfxpd32.exe 33 PID 2120 wrote to memory of 2632 2120 igfxpd32.exe 33 PID 2632 wrote to memory of 3060 2632 igfxpd32.exe 34 PID 2632 wrote to memory of 3060 2632 igfxpd32.exe 34 PID 2632 wrote to memory of 3060 2632 igfxpd32.exe 34 PID 2632 wrote to memory of 3060 2632 igfxpd32.exe 34 PID 3060 wrote to memory of 1048 3060 igfxpd32.exe 35 PID 3060 wrote to memory of 1048 3060 igfxpd32.exe 35 PID 3060 wrote to memory of 1048 3060 igfxpd32.exe 35 PID 3060 wrote to memory of 1048 3060 igfxpd32.exe 35 PID 1048 wrote to memory of 1660 1048 igfxpd32.exe 36 PID 1048 wrote to memory of 1660 1048 igfxpd32.exe 36 PID 1048 wrote to memory of 1660 1048 igfxpd32.exe 36 PID 1048 wrote to memory of 1660 1048 igfxpd32.exe 36 PID 1660 wrote to memory of 1932 1660 igfxpd32.exe 38 PID 1660 wrote to memory of 1932 1660 igfxpd32.exe 38 PID 1660 wrote to memory of 1932 1660 igfxpd32.exe 38 PID 1660 wrote to memory of 1932 1660 igfxpd32.exe 38 PID 1932 wrote to memory of 1776 1932 igfxpd32.exe 39 PID 1932 wrote to memory of 1776 1932 igfxpd32.exe 39 PID 1932 wrote to memory of 1776 1932 igfxpd32.exe 39 PID 1932 wrote to memory of 1776 1932 igfxpd32.exe 39 PID 1776 wrote to memory of 1252 1776 igfxpd32.exe 40 PID 1776 wrote to memory of 1252 1776 igfxpd32.exe 40 PID 1776 wrote to memory of 1252 1776 igfxpd32.exe 40 PID 1776 wrote to memory of 1252 1776 igfxpd32.exe 40 PID 1252 wrote to memory of 1688 1252 igfxpd32.exe 41 PID 1252 wrote to memory of 1688 1252 igfxpd32.exe 41 PID 1252 wrote to memory of 1688 1252 igfxpd32.exe 41 PID 1252 wrote to memory of 1688 1252 igfxpd32.exe 41 PID 1688 wrote to memory of 1724 1688 igfxpd32.exe 42 PID 1688 wrote to memory of 1724 1688 igfxpd32.exe 42 PID 1688 wrote to memory of 1724 1688 igfxpd32.exe 42 PID 1688 wrote to memory of 1724 1688 igfxpd32.exe 42 PID 1724 wrote to memory of 468 1724 igfxpd32.exe 43 PID 1724 wrote to memory of 468 1724 igfxpd32.exe 43 PID 1724 wrote to memory of 468 1724 igfxpd32.exe 43 PID 1724 wrote to memory of 468 1724 igfxpd32.exe 43 PID 468 wrote to memory of 2584 468 igfxpd32.exe 44 PID 468 wrote to memory of 2584 468 igfxpd32.exe 44 PID 468 wrote to memory of 2584 468 igfxpd32.exe 44 PID 468 wrote to memory of 2584 468 igfxpd32.exe 44 PID 2584 wrote to memory of 1684 2584 igfxpd32.exe 45 PID 2584 wrote to memory of 1684 2584 igfxpd32.exe 45 PID 2584 wrote to memory of 1684 2584 igfxpd32.exe 45 PID 2584 wrote to memory of 1684 2584 igfxpd32.exe 45 PID 1684 wrote to memory of 2456 1684 igfxpd32.exe 46 PID 1684 wrote to memory of 2456 1684 igfxpd32.exe 46 PID 1684 wrote to memory of 2456 1684 igfxpd32.exe 46 PID 1684 wrote to memory of 2456 1684 igfxpd32.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\84288560bcb297ea77f35af1fd74df59_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\84288560bcb297ea77f35af1fd74df59_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Users\Admin\AppData\Local\Temp\842885~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2456 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2372 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1756 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2400 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1728 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2248 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2816 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2772 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2616 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2600 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2100 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3064 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1992 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2912 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2480 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2564 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1776 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1644 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
PID:2116 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2996 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2992 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1456 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:468 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2584 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe41⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1064 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe42⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2488 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1744 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2440 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
PID:1936 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1572 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe47⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2888 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe48⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2636 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe49⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2620 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2676 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2540 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe52⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1368 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe53⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1112 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe54⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2000 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe55⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2384 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2912 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe57⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2480 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe58⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
PID:2752 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2564 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe60⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:320 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe61⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:448 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe62⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1184 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe63⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2920 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe64⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:992 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe65⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:920 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe66⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2532 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe67⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:756 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe68⤵
- System Location Discovery: System Language Discovery
PID:2304 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe69⤵
- System Location Discovery: System Language Discovery
PID:2256
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
199KB
MD584288560bcb297ea77f35af1fd74df59
SHA14d511236a7e83f46986b6a61febeebf4b4487679
SHA25679c92c2ebb525e262506063090767033c5f5abc3730976e0ea1f2a8722813681
SHA5124cac52dcc2bd8cc9cb7266dfbf7b33633a9408316b5a22e886fe0b5435c671fc614ca04c410e7966c3699b84e37dd6f924b9c458b74adf08db264ad2f8050770