Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 21:17
Static task
static1
Behavioral task
behavioral1
Sample
a83ddb6a21a60ec45cdb17ced88772ae_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a83ddb6a21a60ec45cdb17ced88772ae_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a83ddb6a21a60ec45cdb17ced88772ae_JaffaCakes118.exe
-
Size
192KB
-
MD5
a83ddb6a21a60ec45cdb17ced88772ae
-
SHA1
49663b7dbcc4621edc010f47e436217a9a917a2c
-
SHA256
439a9c51f346399432b7c8511dfcc1f8d15243f8f2bc343c866a678a18bd32eb
-
SHA512
918ff8a895b786921841aee8e244b13578574e716fe47b533053d2b6bda9d3f916efc30607c0df69fe22aae8ed4df819c4be817806689ef4eb6d88e9262d45fc
-
SSDEEP
3072:mgqewHN3H1tyiYSprgEZ9Ok9QevwA3yHFa271w9lIyngufyAhhb:Se8N3H1tyiJrrj9PkE27q5gODhh
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2840 igfxqvs32.exe -
Executes dropped EXE 44 IoCs
pid Process 2840 igfxqvs32.exe 916 igfxqvs32.exe 2220 igfxqvs32.exe 2644 igfxqvs32.exe 1408 igfxqvs32.exe 2480 igfxqvs32.exe 732 igfxqvs32.exe 1760 igfxqvs32.exe 2452 igfxqvs32.exe 2520 igfxqvs32.exe 2744 igfxqvs32.exe 1060 igfxqvs32.exe 1988 igfxqvs32.exe 2900 igfxqvs32.exe 2172 igfxqvs32.exe 2196 igfxqvs32.exe 2032 igfxqvs32.exe 884 igfxqvs32.exe 2280 igfxqvs32.exe 924 igfxqvs32.exe 2788 igfxqvs32.exe 2768 igfxqvs32.exe 3044 igfxqvs32.exe 2272 igfxqvs32.exe 2976 igfxqvs32.exe 1424 igfxqvs32.exe 2512 igfxqvs32.exe 2100 igfxqvs32.exe 2484 igfxqvs32.exe 2796 igfxqvs32.exe 1432 igfxqvs32.exe 2224 igfxqvs32.exe 2496 igfxqvs32.exe 864 igfxqvs32.exe 1576 igfxqvs32.exe 904 igfxqvs32.exe 2468 igfxqvs32.exe 2420 igfxqvs32.exe 2976 igfxqvs32.exe 520 igfxqvs32.exe 2512 igfxqvs32.exe 960 igfxqvs32.exe 980 igfxqvs32.exe 2796 igfxqvs32.exe -
Loads dropped DLL 64 IoCs
pid Process 2732 a83ddb6a21a60ec45cdb17ced88772ae_JaffaCakes118.exe 2732 a83ddb6a21a60ec45cdb17ced88772ae_JaffaCakes118.exe 2840 igfxqvs32.exe 2840 igfxqvs32.exe 916 igfxqvs32.exe 916 igfxqvs32.exe 2220 igfxqvs32.exe 2220 igfxqvs32.exe 2644 igfxqvs32.exe 2644 igfxqvs32.exe 1408 igfxqvs32.exe 1408 igfxqvs32.exe 2480 igfxqvs32.exe 2480 igfxqvs32.exe 732 igfxqvs32.exe 732 igfxqvs32.exe 1760 igfxqvs32.exe 1760 igfxqvs32.exe 2452 igfxqvs32.exe 2452 igfxqvs32.exe 2520 igfxqvs32.exe 2520 igfxqvs32.exe 2744 igfxqvs32.exe 2744 igfxqvs32.exe 1060 igfxqvs32.exe 1060 igfxqvs32.exe 1988 igfxqvs32.exe 1988 igfxqvs32.exe 2900 igfxqvs32.exe 2900 igfxqvs32.exe 2172 igfxqvs32.exe 2172 igfxqvs32.exe 2196 igfxqvs32.exe 2196 igfxqvs32.exe 2032 igfxqvs32.exe 2032 igfxqvs32.exe 884 igfxqvs32.exe 884 igfxqvs32.exe 2280 igfxqvs32.exe 2280 igfxqvs32.exe 924 igfxqvs32.exe 924 igfxqvs32.exe 2788 igfxqvs32.exe 2788 igfxqvs32.exe 2768 igfxqvs32.exe 2768 igfxqvs32.exe 3044 igfxqvs32.exe 3044 igfxqvs32.exe 2272 igfxqvs32.exe 2272 igfxqvs32.exe 2976 igfxqvs32.exe 2976 igfxqvs32.exe 1424 igfxqvs32.exe 1424 igfxqvs32.exe 2512 igfxqvs32.exe 2512 igfxqvs32.exe 2100 igfxqvs32.exe 2100 igfxqvs32.exe 2484 igfxqvs32.exe 2484 igfxqvs32.exe 2796 igfxqvs32.exe 2796 igfxqvs32.exe 1432 igfxqvs32.exe 1432 igfxqvs32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxqvs32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxqvs32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxqvs32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxqvs32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxqvs32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxqvs32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxqvs32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxqvs32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxqvs32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxqvs32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxqvs32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxqvs32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum a83ddb6a21a60ec45cdb17ced88772ae_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxqvs32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxqvs32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxqvs32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxqvs32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxqvs32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxqvs32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxqvs32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxqvs32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxqvs32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxqvs32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 a83ddb6a21a60ec45cdb17ced88772ae_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxqvs32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxqvs32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxqvs32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxqvs32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxqvs32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxqvs32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxqvs32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxqvs32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxqvs32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxqvs32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxqvs32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxqvs32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxqvs32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxqvs32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\igfxqvs32.exe igfxqvs32.exe File created C:\Windows\SysWOW64\igfxqvs32.exe igfxqvs32.exe File created C:\Windows\SysWOW64\igfxqvs32.exe igfxqvs32.exe File opened for modification C:\Windows\SysWOW64\ igfxqvs32.exe File created C:\Windows\SysWOW64\igfxqvs32.exe igfxqvs32.exe File created C:\Windows\SysWOW64\igfxqvs32.exe igfxqvs32.exe File opened for modification C:\Windows\SysWOW64\ igfxqvs32.exe File created C:\Windows\SysWOW64\igfxqvs32.exe igfxqvs32.exe File opened for modification C:\Windows\SysWOW64\igfxqvs32.exe igfxqvs32.exe File opened for modification C:\Windows\SysWOW64\ igfxqvs32.exe File opened for modification C:\Windows\SysWOW64\ igfxqvs32.exe File opened for modification C:\Windows\SysWOW64\igfxqvs32.exe igfxqvs32.exe File opened for modification C:\Windows\SysWOW64\igfxqvs32.exe igfxqvs32.exe File opened for modification C:\Windows\SysWOW64\ igfxqvs32.exe File opened for modification C:\Windows\SysWOW64\ igfxqvs32.exe File created C:\Windows\SysWOW64\igfxqvs32.exe igfxqvs32.exe File opened for modification C:\Windows\SysWOW64\igfxqvs32.exe igfxqvs32.exe File created C:\Windows\SysWOW64\igfxqvs32.exe igfxqvs32.exe File opened for modification C:\Windows\SysWOW64\ igfxqvs32.exe File opened for modification C:\Windows\SysWOW64\igfxqvs32.exe igfxqvs32.exe File created C:\Windows\SysWOW64\igfxqvs32.exe igfxqvs32.exe File opened for modification C:\Windows\SysWOW64\ igfxqvs32.exe File opened for modification C:\Windows\SysWOW64\igfxqvs32.exe igfxqvs32.exe File opened for modification C:\Windows\SysWOW64\ igfxqvs32.exe File created C:\Windows\SysWOW64\igfxqvs32.exe igfxqvs32.exe File created C:\Windows\SysWOW64\igfxqvs32.exe igfxqvs32.exe File created C:\Windows\SysWOW64\igfxqvs32.exe a83ddb6a21a60ec45cdb17ced88772ae_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxqvs32.exe File opened for modification C:\Windows\SysWOW64\ igfxqvs32.exe File opened for modification C:\Windows\SysWOW64\ igfxqvs32.exe File opened for modification C:\Windows\SysWOW64\ igfxqvs32.exe File opened for modification C:\Windows\SysWOW64\ igfxqvs32.exe File opened for modification C:\Windows\SysWOW64\ a83ddb6a21a60ec45cdb17ced88772ae_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxqvs32.exe File opened for modification C:\Windows\SysWOW64\igfxqvs32.exe igfxqvs32.exe File created C:\Windows\SysWOW64\igfxqvs32.exe igfxqvs32.exe File opened for modification C:\Windows\SysWOW64\igfxqvs32.exe igfxqvs32.exe File opened for modification C:\Windows\SysWOW64\igfxqvs32.exe igfxqvs32.exe File opened for modification C:\Windows\SysWOW64\ igfxqvs32.exe File created C:\Windows\SysWOW64\igfxqvs32.exe igfxqvs32.exe File created C:\Windows\SysWOW64\igfxqvs32.exe igfxqvs32.exe File created C:\Windows\SysWOW64\igfxqvs32.exe igfxqvs32.exe File created C:\Windows\SysWOW64\igfxqvs32.exe igfxqvs32.exe File opened for modification C:\Windows\SysWOW64\igfxqvs32.exe igfxqvs32.exe File created C:\Windows\SysWOW64\igfxqvs32.exe igfxqvs32.exe File created C:\Windows\SysWOW64\igfxqvs32.exe igfxqvs32.exe File opened for modification C:\Windows\SysWOW64\ igfxqvs32.exe File opened for modification C:\Windows\SysWOW64\igfxqvs32.exe igfxqvs32.exe File opened for modification C:\Windows\SysWOW64\igfxqvs32.exe a83ddb6a21a60ec45cdb17ced88772ae_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxqvs32.exe igfxqvs32.exe File opened for modification C:\Windows\SysWOW64\igfxqvs32.exe igfxqvs32.exe File opened for modification C:\Windows\SysWOW64\igfxqvs32.exe igfxqvs32.exe File created C:\Windows\SysWOW64\igfxqvs32.exe igfxqvs32.exe File opened for modification C:\Windows\SysWOW64\igfxqvs32.exe igfxqvs32.exe File opened for modification C:\Windows\SysWOW64\igfxqvs32.exe igfxqvs32.exe File opened for modification C:\Windows\SysWOW64\igfxqvs32.exe igfxqvs32.exe File opened for modification C:\Windows\SysWOW64\igfxqvs32.exe igfxqvs32.exe File opened for modification C:\Windows\SysWOW64\ igfxqvs32.exe File opened for modification C:\Windows\SysWOW64\igfxqvs32.exe igfxqvs32.exe File opened for modification C:\Windows\SysWOW64\ igfxqvs32.exe File opened for modification C:\Windows\SysWOW64\ igfxqvs32.exe File created C:\Windows\SysWOW64\igfxqvs32.exe igfxqvs32.exe File opened for modification C:\Windows\SysWOW64\ igfxqvs32.exe File created C:\Windows\SysWOW64\igfxqvs32.exe igfxqvs32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 45 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a83ddb6a21a60ec45cdb17ced88772ae_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxqvs32.exe -
Suspicious behavior: EnumeratesProcesses 45 IoCs
pid Process 2732 a83ddb6a21a60ec45cdb17ced88772ae_JaffaCakes118.exe 2840 igfxqvs32.exe 916 igfxqvs32.exe 2220 igfxqvs32.exe 2644 igfxqvs32.exe 1408 igfxqvs32.exe 2480 igfxqvs32.exe 732 igfxqvs32.exe 1760 igfxqvs32.exe 2452 igfxqvs32.exe 2520 igfxqvs32.exe 2744 igfxqvs32.exe 1060 igfxqvs32.exe 1988 igfxqvs32.exe 2900 igfxqvs32.exe 2172 igfxqvs32.exe 2196 igfxqvs32.exe 2032 igfxqvs32.exe 884 igfxqvs32.exe 2280 igfxqvs32.exe 924 igfxqvs32.exe 2788 igfxqvs32.exe 2768 igfxqvs32.exe 3044 igfxqvs32.exe 2272 igfxqvs32.exe 2976 igfxqvs32.exe 1424 igfxqvs32.exe 2512 igfxqvs32.exe 2100 igfxqvs32.exe 2484 igfxqvs32.exe 2796 igfxqvs32.exe 1432 igfxqvs32.exe 2224 igfxqvs32.exe 2496 igfxqvs32.exe 864 igfxqvs32.exe 1576 igfxqvs32.exe 904 igfxqvs32.exe 2468 igfxqvs32.exe 2420 igfxqvs32.exe 2976 igfxqvs32.exe 520 igfxqvs32.exe 2512 igfxqvs32.exe 960 igfxqvs32.exe 980 igfxqvs32.exe 2796 igfxqvs32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2840 2732 a83ddb6a21a60ec45cdb17ced88772ae_JaffaCakes118.exe 30 PID 2732 wrote to memory of 2840 2732 a83ddb6a21a60ec45cdb17ced88772ae_JaffaCakes118.exe 30 PID 2732 wrote to memory of 2840 2732 a83ddb6a21a60ec45cdb17ced88772ae_JaffaCakes118.exe 30 PID 2732 wrote to memory of 2840 2732 a83ddb6a21a60ec45cdb17ced88772ae_JaffaCakes118.exe 30 PID 2840 wrote to memory of 916 2840 igfxqvs32.exe 31 PID 2840 wrote to memory of 916 2840 igfxqvs32.exe 31 PID 2840 wrote to memory of 916 2840 igfxqvs32.exe 31 PID 2840 wrote to memory of 916 2840 igfxqvs32.exe 31 PID 916 wrote to memory of 2220 916 igfxqvs32.exe 32 PID 916 wrote to memory of 2220 916 igfxqvs32.exe 32 PID 916 wrote to memory of 2220 916 igfxqvs32.exe 32 PID 916 wrote to memory of 2220 916 igfxqvs32.exe 32 PID 2220 wrote to memory of 2644 2220 igfxqvs32.exe 33 PID 2220 wrote to memory of 2644 2220 igfxqvs32.exe 33 PID 2220 wrote to memory of 2644 2220 igfxqvs32.exe 33 PID 2220 wrote to memory of 2644 2220 igfxqvs32.exe 33 PID 2644 wrote to memory of 1408 2644 igfxqvs32.exe 34 PID 2644 wrote to memory of 1408 2644 igfxqvs32.exe 34 PID 2644 wrote to memory of 1408 2644 igfxqvs32.exe 34 PID 2644 wrote to memory of 1408 2644 igfxqvs32.exe 34 PID 1408 wrote to memory of 2480 1408 igfxqvs32.exe 35 PID 1408 wrote to memory of 2480 1408 igfxqvs32.exe 35 PID 1408 wrote to memory of 2480 1408 igfxqvs32.exe 35 PID 1408 wrote to memory of 2480 1408 igfxqvs32.exe 35 PID 2480 wrote to memory of 732 2480 igfxqvs32.exe 36 PID 2480 wrote to memory of 732 2480 igfxqvs32.exe 36 PID 2480 wrote to memory of 732 2480 igfxqvs32.exe 36 PID 2480 wrote to memory of 732 2480 igfxqvs32.exe 36 PID 732 wrote to memory of 1760 732 igfxqvs32.exe 37 PID 732 wrote to memory of 1760 732 igfxqvs32.exe 37 PID 732 wrote to memory of 1760 732 igfxqvs32.exe 37 PID 732 wrote to memory of 1760 732 igfxqvs32.exe 37 PID 1760 wrote to memory of 2452 1760 igfxqvs32.exe 38 PID 1760 wrote to memory of 2452 1760 igfxqvs32.exe 38 PID 1760 wrote to memory of 2452 1760 igfxqvs32.exe 38 PID 1760 wrote to memory of 2452 1760 igfxqvs32.exe 38 PID 2452 wrote to memory of 2520 2452 igfxqvs32.exe 39 PID 2452 wrote to memory of 2520 2452 igfxqvs32.exe 39 PID 2452 wrote to memory of 2520 2452 igfxqvs32.exe 39 PID 2452 wrote to memory of 2520 2452 igfxqvs32.exe 39 PID 2520 wrote to memory of 2744 2520 igfxqvs32.exe 40 PID 2520 wrote to memory of 2744 2520 igfxqvs32.exe 40 PID 2520 wrote to memory of 2744 2520 igfxqvs32.exe 40 PID 2520 wrote to memory of 2744 2520 igfxqvs32.exe 40 PID 2744 wrote to memory of 1060 2744 igfxqvs32.exe 41 PID 2744 wrote to memory of 1060 2744 igfxqvs32.exe 41 PID 2744 wrote to memory of 1060 2744 igfxqvs32.exe 41 PID 2744 wrote to memory of 1060 2744 igfxqvs32.exe 41 PID 1060 wrote to memory of 1988 1060 igfxqvs32.exe 42 PID 1060 wrote to memory of 1988 1060 igfxqvs32.exe 42 PID 1060 wrote to memory of 1988 1060 igfxqvs32.exe 42 PID 1060 wrote to memory of 1988 1060 igfxqvs32.exe 42 PID 1988 wrote to memory of 2900 1988 igfxqvs32.exe 43 PID 1988 wrote to memory of 2900 1988 igfxqvs32.exe 43 PID 1988 wrote to memory of 2900 1988 igfxqvs32.exe 43 PID 1988 wrote to memory of 2900 1988 igfxqvs32.exe 43 PID 2900 wrote to memory of 2172 2900 igfxqvs32.exe 44 PID 2900 wrote to memory of 2172 2900 igfxqvs32.exe 44 PID 2900 wrote to memory of 2172 2900 igfxqvs32.exe 44 PID 2900 wrote to memory of 2172 2900 igfxqvs32.exe 44 PID 2172 wrote to memory of 2196 2172 igfxqvs32.exe 45 PID 2172 wrote to memory of 2196 2172 igfxqvs32.exe 45 PID 2172 wrote to memory of 2196 2172 igfxqvs32.exe 45 PID 2172 wrote to memory of 2196 2172 igfxqvs32.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\a83ddb6a21a60ec45cdb17ced88772ae_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a83ddb6a21a60ec45cdb17ced88772ae_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Users\Admin\AppData\Local\Temp\A83DDB~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2196 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2032 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:884 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2280 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:924 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2788 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2768 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3044 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2272 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2976 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1424 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2512 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE29⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2100 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2484 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2796 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1432 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2224 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2496 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:864 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1576 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:904 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2468 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2420 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2976 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE41⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:520 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE42⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2512 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:960 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:980 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2796 -
C:\Windows\SysWOW64\igfxqvs32.exe"C:\Windows\system32\igfxqvs32.exe" C:\Windows\SysWOW64\IGFXQV~1.EXE46⤵PID:1692
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD5a83ddb6a21a60ec45cdb17ced88772ae
SHA149663b7dbcc4621edc010f47e436217a9a917a2c
SHA256439a9c51f346399432b7c8511dfcc1f8d15243f8f2bc343c866a678a18bd32eb
SHA512918ff8a895b786921841aee8e244b13578574e716fe47b533053d2b6bda9d3f916efc30607c0df69fe22aae8ed4df819c4be817806689ef4eb6d88e9262d45fc