Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 10:09
Static task
static1
Behavioral task
behavioral1
Sample
a2221498582330202580cb43e4f23be3_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a2221498582330202580cb43e4f23be3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a2221498582330202580cb43e4f23be3_JaffaCakes118.exe
-
Size
273KB
-
MD5
a2221498582330202580cb43e4f23be3
-
SHA1
8f6362634a31dc04ba67e1902e284251d761334b
-
SHA256
7f31c9cd43f003db06ab0aaace5e43cfc574fb3c3103b3dd8d33b0020e54fcda
-
SHA512
3cbd99ac3f08884347ce2ac3cb87375b46775ab386296c7f49dfdcd3064cc091f1e4d2307400bd4ad75e9ee322e0ca5b6b95d5b39d6401d0c060bfb1f91c1455
-
SSDEEP
6144:D6pnD+Dvi6HiME1oL/0MBUTyjT9MdqhYIaZ:unD+DveMbYj4cIaZ
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2304 igfxdkc32.exe -
Executes dropped EXE 46 IoCs
pid Process 2304 igfxdkc32.exe 2064 igfxdkc32.exe 2916 igfxdkc32.exe 2748 igfxdkc32.exe 2632 igfxdkc32.exe 1932 igfxdkc32.exe 2856 igfxdkc32.exe 2552 igfxdkc32.exe 1808 igfxdkc32.exe 1320 igfxdkc32.exe 3020 igfxdkc32.exe 2052 igfxdkc32.exe 2244 igfxdkc32.exe 724 igfxdkc32.exe 1020 igfxdkc32.exe 2140 igfxdkc32.exe 2352 igfxdkc32.exe 2144 igfxdkc32.exe 1012 igfxdkc32.exe 1952 igfxdkc32.exe 2036 igfxdkc32.exe 2428 igfxdkc32.exe 2508 igfxdkc32.exe 2908 igfxdkc32.exe 2832 igfxdkc32.exe 2852 igfxdkc32.exe 3016 igfxdkc32.exe 2592 igfxdkc32.exe 600 igfxdkc32.exe 1580 igfxdkc32.exe 1288 igfxdkc32.exe 2764 igfxdkc32.exe 2872 igfxdkc32.exe 596 igfxdkc32.exe 2264 igfxdkc32.exe 2328 igfxdkc32.exe 1624 igfxdkc32.exe 2108 igfxdkc32.exe 1308 igfxdkc32.exe 1976 igfxdkc32.exe 848 igfxdkc32.exe 1900 igfxdkc32.exe 2256 igfxdkc32.exe 2352 igfxdkc32.exe 1076 igfxdkc32.exe 1340 igfxdkc32.exe -
Loads dropped DLL 64 IoCs
pid Process 1908 a2221498582330202580cb43e4f23be3_JaffaCakes118.exe 1908 a2221498582330202580cb43e4f23be3_JaffaCakes118.exe 2304 igfxdkc32.exe 2304 igfxdkc32.exe 2064 igfxdkc32.exe 2064 igfxdkc32.exe 2916 igfxdkc32.exe 2916 igfxdkc32.exe 2748 igfxdkc32.exe 2748 igfxdkc32.exe 2632 igfxdkc32.exe 2632 igfxdkc32.exe 1932 igfxdkc32.exe 1932 igfxdkc32.exe 2856 igfxdkc32.exe 2856 igfxdkc32.exe 2552 igfxdkc32.exe 2552 igfxdkc32.exe 1808 igfxdkc32.exe 1808 igfxdkc32.exe 1320 igfxdkc32.exe 1320 igfxdkc32.exe 3020 igfxdkc32.exe 3020 igfxdkc32.exe 2052 igfxdkc32.exe 2052 igfxdkc32.exe 2244 igfxdkc32.exe 2244 igfxdkc32.exe 724 igfxdkc32.exe 724 igfxdkc32.exe 1020 igfxdkc32.exe 1020 igfxdkc32.exe 2140 igfxdkc32.exe 2140 igfxdkc32.exe 2352 igfxdkc32.exe 2352 igfxdkc32.exe 2144 igfxdkc32.exe 2144 igfxdkc32.exe 1012 igfxdkc32.exe 1012 igfxdkc32.exe 1952 igfxdkc32.exe 1952 igfxdkc32.exe 2036 igfxdkc32.exe 2036 igfxdkc32.exe 2428 igfxdkc32.exe 2428 igfxdkc32.exe 2508 igfxdkc32.exe 2508 igfxdkc32.exe 2908 igfxdkc32.exe 2908 igfxdkc32.exe 2832 igfxdkc32.exe 2832 igfxdkc32.exe 2852 igfxdkc32.exe 2852 igfxdkc32.exe 3016 igfxdkc32.exe 3016 igfxdkc32.exe 2592 igfxdkc32.exe 2592 igfxdkc32.exe 600 igfxdkc32.exe 600 igfxdkc32.exe 1580 igfxdkc32.exe 1580 igfxdkc32.exe 1288 igfxdkc32.exe 1288 igfxdkc32.exe -
resource yara_rule behavioral1/memory/1908-1-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/1908-13-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2304-15-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2304-14-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2304-21-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2064-25-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2916-30-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2748-34-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2632-38-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/1932-41-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2856-46-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2552-51-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/1808-55-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/1320-59-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/3020-63-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2052-67-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2244-71-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/724-76-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/1020-80-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2140-83-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2352-85-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2144-86-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/1012-87-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/1952-88-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2036-89-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2428-95-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2508-96-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2908-97-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2832-98-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2852-99-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/3016-100-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2592-101-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/600-102-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/1580-103-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/1288-104-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2764-105-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2872-106-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/596-107-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2264-108-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2328-109-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/1624-110-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2108-111-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/1308-112-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/1976-113-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/848-114-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/1900-115-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2256-116-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2352-117-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/1076-118-0x0000000000400000-0x000000000047E000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum a2221498582330202580cb43e4f23be3_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 a2221498582330202580cb43e4f23be3_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File created C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File created C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File created C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe a2221498582330202580cb43e4f23be3_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File created C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File created C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File created C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File created C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File created C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File created C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File created C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File created C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ a2221498582330202580cb43e4f23be3_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File created C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File created C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File created C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File created C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File created C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File created C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 47 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2221498582330202580cb43e4f23be3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1908 a2221498582330202580cb43e4f23be3_JaffaCakes118.exe 1908 a2221498582330202580cb43e4f23be3_JaffaCakes118.exe 2304 igfxdkc32.exe 2304 igfxdkc32.exe 2064 igfxdkc32.exe 2064 igfxdkc32.exe 2916 igfxdkc32.exe 2916 igfxdkc32.exe 2748 igfxdkc32.exe 2748 igfxdkc32.exe 2632 igfxdkc32.exe 2632 igfxdkc32.exe 1932 igfxdkc32.exe 1932 igfxdkc32.exe 2856 igfxdkc32.exe 2856 igfxdkc32.exe 2552 igfxdkc32.exe 2552 igfxdkc32.exe 1808 igfxdkc32.exe 1808 igfxdkc32.exe 1320 igfxdkc32.exe 1320 igfxdkc32.exe 3020 igfxdkc32.exe 3020 igfxdkc32.exe 2052 igfxdkc32.exe 2052 igfxdkc32.exe 2244 igfxdkc32.exe 2244 igfxdkc32.exe 724 igfxdkc32.exe 724 igfxdkc32.exe 1020 igfxdkc32.exe 1020 igfxdkc32.exe 2140 igfxdkc32.exe 2140 igfxdkc32.exe 2352 igfxdkc32.exe 2352 igfxdkc32.exe 2144 igfxdkc32.exe 2144 igfxdkc32.exe 1012 igfxdkc32.exe 1012 igfxdkc32.exe 1952 igfxdkc32.exe 1952 igfxdkc32.exe 2428 igfxdkc32.exe 2428 igfxdkc32.exe 2508 igfxdkc32.exe 2508 igfxdkc32.exe 2908 igfxdkc32.exe 2908 igfxdkc32.exe 2832 igfxdkc32.exe 2832 igfxdkc32.exe 2852 igfxdkc32.exe 2852 igfxdkc32.exe 3016 igfxdkc32.exe 3016 igfxdkc32.exe 2592 igfxdkc32.exe 2592 igfxdkc32.exe 600 igfxdkc32.exe 600 igfxdkc32.exe 1580 igfxdkc32.exe 1580 igfxdkc32.exe 1288 igfxdkc32.exe 1288 igfxdkc32.exe 2764 igfxdkc32.exe 2764 igfxdkc32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1908 wrote to memory of 2304 1908 a2221498582330202580cb43e4f23be3_JaffaCakes118.exe 31 PID 1908 wrote to memory of 2304 1908 a2221498582330202580cb43e4f23be3_JaffaCakes118.exe 31 PID 1908 wrote to memory of 2304 1908 a2221498582330202580cb43e4f23be3_JaffaCakes118.exe 31 PID 1908 wrote to memory of 2304 1908 a2221498582330202580cb43e4f23be3_JaffaCakes118.exe 31 PID 2304 wrote to memory of 2064 2304 igfxdkc32.exe 32 PID 2304 wrote to memory of 2064 2304 igfxdkc32.exe 32 PID 2304 wrote to memory of 2064 2304 igfxdkc32.exe 32 PID 2304 wrote to memory of 2064 2304 igfxdkc32.exe 32 PID 2064 wrote to memory of 2916 2064 igfxdkc32.exe 33 PID 2064 wrote to memory of 2916 2064 igfxdkc32.exe 33 PID 2064 wrote to memory of 2916 2064 igfxdkc32.exe 33 PID 2064 wrote to memory of 2916 2064 igfxdkc32.exe 33 PID 2916 wrote to memory of 2748 2916 igfxdkc32.exe 34 PID 2916 wrote to memory of 2748 2916 igfxdkc32.exe 34 PID 2916 wrote to memory of 2748 2916 igfxdkc32.exe 34 PID 2916 wrote to memory of 2748 2916 igfxdkc32.exe 34 PID 2748 wrote to memory of 2632 2748 igfxdkc32.exe 35 PID 2748 wrote to memory of 2632 2748 igfxdkc32.exe 35 PID 2748 wrote to memory of 2632 2748 igfxdkc32.exe 35 PID 2748 wrote to memory of 2632 2748 igfxdkc32.exe 35 PID 2632 wrote to memory of 1932 2632 igfxdkc32.exe 36 PID 2632 wrote to memory of 1932 2632 igfxdkc32.exe 36 PID 2632 wrote to memory of 1932 2632 igfxdkc32.exe 36 PID 2632 wrote to memory of 1932 2632 igfxdkc32.exe 36 PID 1932 wrote to memory of 2856 1932 igfxdkc32.exe 37 PID 1932 wrote to memory of 2856 1932 igfxdkc32.exe 37 PID 1932 wrote to memory of 2856 1932 igfxdkc32.exe 37 PID 1932 wrote to memory of 2856 1932 igfxdkc32.exe 37 PID 2856 wrote to memory of 2552 2856 igfxdkc32.exe 38 PID 2856 wrote to memory of 2552 2856 igfxdkc32.exe 38 PID 2856 wrote to memory of 2552 2856 igfxdkc32.exe 38 PID 2856 wrote to memory of 2552 2856 igfxdkc32.exe 38 PID 2552 wrote to memory of 1808 2552 igfxdkc32.exe 39 PID 2552 wrote to memory of 1808 2552 igfxdkc32.exe 39 PID 2552 wrote to memory of 1808 2552 igfxdkc32.exe 39 PID 2552 wrote to memory of 1808 2552 igfxdkc32.exe 39 PID 1808 wrote to memory of 1320 1808 igfxdkc32.exe 40 PID 1808 wrote to memory of 1320 1808 igfxdkc32.exe 40 PID 1808 wrote to memory of 1320 1808 igfxdkc32.exe 40 PID 1808 wrote to memory of 1320 1808 igfxdkc32.exe 40 PID 1320 wrote to memory of 3020 1320 igfxdkc32.exe 41 PID 1320 wrote to memory of 3020 1320 igfxdkc32.exe 41 PID 1320 wrote to memory of 3020 1320 igfxdkc32.exe 41 PID 1320 wrote to memory of 3020 1320 igfxdkc32.exe 41 PID 3020 wrote to memory of 2052 3020 igfxdkc32.exe 42 PID 3020 wrote to memory of 2052 3020 igfxdkc32.exe 42 PID 3020 wrote to memory of 2052 3020 igfxdkc32.exe 42 PID 3020 wrote to memory of 2052 3020 igfxdkc32.exe 42 PID 2052 wrote to memory of 2244 2052 igfxdkc32.exe 43 PID 2052 wrote to memory of 2244 2052 igfxdkc32.exe 43 PID 2052 wrote to memory of 2244 2052 igfxdkc32.exe 43 PID 2052 wrote to memory of 2244 2052 igfxdkc32.exe 43 PID 2244 wrote to memory of 724 2244 igfxdkc32.exe 44 PID 2244 wrote to memory of 724 2244 igfxdkc32.exe 44 PID 2244 wrote to memory of 724 2244 igfxdkc32.exe 44 PID 2244 wrote to memory of 724 2244 igfxdkc32.exe 44 PID 724 wrote to memory of 1020 724 igfxdkc32.exe 45 PID 724 wrote to memory of 1020 724 igfxdkc32.exe 45 PID 724 wrote to memory of 1020 724 igfxdkc32.exe 45 PID 724 wrote to memory of 1020 724 igfxdkc32.exe 45 PID 1020 wrote to memory of 2140 1020 igfxdkc32.exe 46 PID 1020 wrote to memory of 2140 1020 igfxdkc32.exe 46 PID 1020 wrote to memory of 2140 1020 igfxdkc32.exe 46 PID 1020 wrote to memory of 2140 1020 igfxdkc32.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2221498582330202580cb43e4f23be3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a2221498582330202580cb43e4f23be3_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Users\Admin\AppData\Local\Temp\A22214~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2140 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2352 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2144 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1012 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1952 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2036 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2428 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2508 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2908 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2832 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2852 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3016 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE29⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2592 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:600 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1580 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1288 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE33⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2764 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2872 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:596 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2264 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE37⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2328 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1624 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2108 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1308 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1976 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE42⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:848 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE43⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1900 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2256 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2352 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1076 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE47⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1340
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
273KB
MD5a2221498582330202580cb43e4f23be3
SHA18f6362634a31dc04ba67e1902e284251d761334b
SHA2567f31c9cd43f003db06ab0aaace5e43cfc574fb3c3103b3dd8d33b0020e54fcda
SHA5123cbd99ac3f08884347ce2ac3cb87375b46775ab386296c7f49dfdcd3064cc091f1e4d2307400bd4ad75e9ee322e0ca5b6b95d5b39d6401d0c060bfb1f91c1455