Analysis
-
max time kernel
150s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 11:42
Static task
static1
Behavioral task
behavioral1
Sample
dc40396ba7a60db040dc0cc8a5f50b62_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc40396ba7a60db040dc0cc8a5f50b62_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dc40396ba7a60db040dc0cc8a5f50b62_JaffaCakes118.exe
-
Size
296KB
-
MD5
dc40396ba7a60db040dc0cc8a5f50b62
-
SHA1
4aa7f692e7b19338932785e403bb1a798552f2fa
-
SHA256
2115f6f9e274b823456ef662cc6b511952596e82c908738da0e2dca57d8550b0
-
SHA512
5c8bcd36508fb95b0e048c3ebdf196a33fd30307b207dbd965dc6fddfe1568df9114172cffe637605c7cab42b58fcb713091c7f7e923dde3a1aaf4d3b4c9f28b
-
SSDEEP
3072:j7g00jC8lIT5EDwVLRfbAfmQWJg+1R5xUxb3P0QgcsHkxw/////////////////5:Y00jC8lIKyLt8WCtx7M3cYk
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings 2 TTPs 46 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation dc40396ba7a60db040dc0cc8a5f50b62_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdvb32.exe -
Deletes itself 1 IoCs
pid Process 4804 igfxdvb32.exe -
Executes dropped EXE 64 IoCs
pid Process 4276 igfxdvb32.exe 4804 igfxdvb32.exe 5056 igfxdvb32.exe 1092 igfxdvb32.exe 4092 igfxdvb32.exe 3712 igfxdvb32.exe 1536 igfxdvb32.exe 2488 igfxdvb32.exe 32 igfxdvb32.exe 2180 igfxdvb32.exe 2964 igfxdvb32.exe 2896 igfxdvb32.exe 3004 igfxdvb32.exe 632 igfxdvb32.exe 3616 igfxdvb32.exe 3608 igfxdvb32.exe 4452 igfxdvb32.exe 1164 igfxdvb32.exe 4116 igfxdvb32.exe 1660 igfxdvb32.exe 3468 igfxdvb32.exe 2260 igfxdvb32.exe 4304 igfxdvb32.exe 1484 igfxdvb32.exe 2208 igfxdvb32.exe 2080 igfxdvb32.exe 2256 igfxdvb32.exe 4748 igfxdvb32.exe 4260 igfxdvb32.exe 2140 igfxdvb32.exe 4248 igfxdvb32.exe 1536 igfxdvb32.exe 804 igfxdvb32.exe 1776 igfxdvb32.exe 3044 igfxdvb32.exe 32 igfxdvb32.exe 4712 igfxdvb32.exe 2252 igfxdvb32.exe 5024 igfxdvb32.exe 4420 igfxdvb32.exe 4460 igfxdvb32.exe 4044 igfxdvb32.exe 3816 igfxdvb32.exe 832 igfxdvb32.exe 64 igfxdvb32.exe 1644 igfxdvb32.exe 1228 igfxdvb32.exe 2348 igfxdvb32.exe 4116 igfxdvb32.exe 436 igfxdvb32.exe 2224 igfxdvb32.exe 3388 igfxdvb32.exe 2964 igfxdvb32.exe 5012 igfxdvb32.exe 4320 igfxdvb32.exe 5024 igfxdvb32.exe 2580 igfxdvb32.exe 4460 igfxdvb32.exe 3716 igfxdvb32.exe 5000 igfxdvb32.exe 1516 igfxdvb32.exe 4448 igfxdvb32.exe 4020 igfxdvb32.exe 1732 igfxdvb32.exe -
resource yara_rule behavioral2/memory/4036-3-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/4036-6-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/4036-7-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/4036-8-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/4036-71-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/4804-77-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/4804-79-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/4804-78-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/4804-82-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/1092-89-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/1092-91-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/1092-90-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/1092-96-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/3712-103-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/3712-102-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/3712-104-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/3712-109-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/2488-121-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/2180-133-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/2896-146-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/632-160-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/3608-171-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/1164-185-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/1660-194-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/1660-200-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/2260-213-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/1484-226-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/2080-240-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/4748-252-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/2140-266-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/1536-279-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/1776-292-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/32-301-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/32-306-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/2252-319-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/4420-332-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/4044-345-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/832-359-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/1644-370-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/2348-381-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/436-392-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/3388-403-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/5012-414-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/5024-425-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/4460-436-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/5000-447-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/4448-458-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/1732-470-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/3620-480-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/4624-491-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/2868-502-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/4560-513-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/4304-524-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/4840-535-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/5064-545-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/1888-556-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/964-567-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/4984-580-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/4876-589-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/2832-600-0x0000000000400000-0x000000000045F000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdvb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdvb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdvb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdvb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdvb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdvb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdvb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdvb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdvb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdvb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdvb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdvb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdvb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdvb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdvb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdvb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdvb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdvb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdvb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdvb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum dc40396ba7a60db040dc0cc8a5f50b62_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdvb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdvb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdvb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdvb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdvb32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdvb32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxdvb32.exe dc40396ba7a60db040dc0cc8a5f50b62_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxdvb32.exe igfxdvb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdvb32.exe File created C:\Windows\SysWOW64\igfxdvb32.exe igfxdvb32.exe File created C:\Windows\SysWOW64\igfxdvb32.exe igfxdvb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdvb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdvb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdvb32.exe File created C:\Windows\SysWOW64\igfxdvb32.exe igfxdvb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdvb32.exe File opened for modification C:\Windows\SysWOW64\igfxdvb32.exe igfxdvb32.exe File created C:\Windows\SysWOW64\igfxdvb32.exe igfxdvb32.exe File opened for modification C:\Windows\SysWOW64\igfxdvb32.exe igfxdvb32.exe File created C:\Windows\SysWOW64\igfxdvb32.exe igfxdvb32.exe File created C:\Windows\SysWOW64\igfxdvb32.exe igfxdvb32.exe File created C:\Windows\SysWOW64\igfxdvb32.exe igfxdvb32.exe File opened for modification C:\Windows\SysWOW64\igfxdvb32.exe igfxdvb32.exe File opened for modification C:\Windows\SysWOW64\igfxdvb32.exe igfxdvb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdvb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdvb32.exe File opened for modification C:\Windows\SysWOW64\igfxdvb32.exe igfxdvb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdvb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdvb32.exe File opened for modification C:\Windows\SysWOW64\igfxdvb32.exe igfxdvb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdvb32.exe File created C:\Windows\SysWOW64\igfxdvb32.exe igfxdvb32.exe File created C:\Windows\SysWOW64\igfxdvb32.exe igfxdvb32.exe File created C:\Windows\SysWOW64\igfxdvb32.exe igfxdvb32.exe File opened for modification C:\Windows\SysWOW64\igfxdvb32.exe igfxdvb32.exe File created C:\Windows\SysWOW64\igfxdvb32.exe igfxdvb32.exe File opened for modification C:\Windows\SysWOW64\igfxdvb32.exe igfxdvb32.exe File created C:\Windows\SysWOW64\igfxdvb32.exe igfxdvb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdvb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdvb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdvb32.exe File created C:\Windows\SysWOW64\igfxdvb32.exe igfxdvb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdvb32.exe File created C:\Windows\SysWOW64\igfxdvb32.exe igfxdvb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdvb32.exe File opened for modification C:\Windows\SysWOW64\igfxdvb32.exe igfxdvb32.exe File created C:\Windows\SysWOW64\igfxdvb32.exe igfxdvb32.exe File opened for modification C:\Windows\SysWOW64\igfxdvb32.exe igfxdvb32.exe File opened for modification C:\Windows\SysWOW64\igfxdvb32.exe igfxdvb32.exe File created C:\Windows\SysWOW64\igfxdvb32.exe igfxdvb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdvb32.exe File opened for modification C:\Windows\SysWOW64\igfxdvb32.exe igfxdvb32.exe File opened for modification C:\Windows\SysWOW64\igfxdvb32.exe igfxdvb32.exe File created C:\Windows\SysWOW64\igfxdvb32.exe igfxdvb32.exe File opened for modification C:\Windows\SysWOW64\igfxdvb32.exe igfxdvb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdvb32.exe File created C:\Windows\SysWOW64\igfxdvb32.exe igfxdvb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdvb32.exe File created C:\Windows\SysWOW64\igfxdvb32.exe igfxdvb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdvb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdvb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdvb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdvb32.exe File opened for modification C:\Windows\SysWOW64\igfxdvb32.exe igfxdvb32.exe File created C:\Windows\SysWOW64\igfxdvb32.exe igfxdvb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdvb32.exe File created C:\Windows\SysWOW64\igfxdvb32.exe igfxdvb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdvb32.exe File created C:\Windows\SysWOW64\igfxdvb32.exe igfxdvb32.exe File opened for modification C:\Windows\SysWOW64\ igfxdvb32.exe -
Suspicious use of SetThreadContext 46 IoCs
description pid Process procid_target PID 1164 set thread context of 4036 1164 dc40396ba7a60db040dc0cc8a5f50b62_JaffaCakes118.exe 91 PID 4276 set thread context of 4804 4276 igfxdvb32.exe 97 PID 5056 set thread context of 1092 5056 igfxdvb32.exe 101 PID 4092 set thread context of 3712 4092 igfxdvb32.exe 104 PID 1536 set thread context of 2488 1536 igfxdvb32.exe 109 PID 32 set thread context of 2180 32 igfxdvb32.exe 111 PID 2964 set thread context of 2896 2964 igfxdvb32.exe 113 PID 3004 set thread context of 632 3004 igfxdvb32.exe 115 PID 3616 set thread context of 3608 3616 igfxdvb32.exe 117 PID 4452 set thread context of 1164 4452 igfxdvb32.exe 119 PID 4116 set thread context of 1660 4116 igfxdvb32.exe 122 PID 3468 set thread context of 2260 3468 igfxdvb32.exe 125 PID 4304 set thread context of 1484 4304 igfxdvb32.exe 127 PID 2208 set thread context of 2080 2208 igfxdvb32.exe 129 PID 2256 set thread context of 4748 2256 igfxdvb32.exe 131 PID 4260 set thread context of 2140 4260 igfxdvb32.exe 133 PID 4248 set thread context of 1536 4248 igfxdvb32.exe 135 PID 804 set thread context of 1776 804 igfxdvb32.exe 137 PID 3044 set thread context of 32 3044 igfxdvb32.exe 139 PID 4712 set thread context of 2252 4712 igfxdvb32.exe 141 PID 5024 set thread context of 4420 5024 igfxdvb32.exe 143 PID 4460 set thread context of 4044 4460 igfxdvb32.exe 145 PID 3816 set thread context of 832 3816 igfxdvb32.exe 147 PID 64 set thread context of 1644 64 igfxdvb32.exe 149 PID 1228 set thread context of 2348 1228 igfxdvb32.exe 151 PID 4116 set thread context of 436 4116 igfxdvb32.exe 153 PID 2224 set thread context of 3388 2224 igfxdvb32.exe 155 PID 2964 set thread context of 5012 2964 igfxdvb32.exe 157 PID 4320 set thread context of 5024 4320 igfxdvb32.exe 159 PID 2580 set thread context of 4460 2580 igfxdvb32.exe 161 PID 3716 set thread context of 5000 3716 igfxdvb32.exe 163 PID 1516 set thread context of 4448 1516 igfxdvb32.exe 165 PID 4020 set thread context of 1732 4020 igfxdvb32.exe 167 PID 2916 set thread context of 3620 2916 igfxdvb32.exe 169 PID 1320 set thread context of 4624 1320 igfxdvb32.exe 171 PID 2816 set thread context of 2868 2816 igfxdvb32.exe 173 PID 3824 set thread context of 4560 3824 igfxdvb32.exe 175 PID 4968 set thread context of 4304 4968 igfxdvb32.exe 177 PID 2964 set thread context of 4840 2964 igfxdvb32.exe 179 PID 3876 set thread context of 5064 3876 igfxdvb32.exe 181 PID 1464 set thread context of 1888 1464 igfxdvb32.exe 183 PID 3716 set thread context of 964 3716 igfxdvb32.exe 185 PID 1516 set thread context of 4984 1516 igfxdvb32.exe 187 PID 4708 set thread context of 4876 4708 igfxdvb32.exe 189 PID 3884 set thread context of 2832 3884 igfxdvb32.exe 191 PID 1320 set thread context of 4376 1320 igfxdvb32.exe 193 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc40396ba7a60db040dc0cc8a5f50b62_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdvb32.exe -
Modifies registry class 46 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ dc40396ba7a60db040dc0cc8a5f50b62_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdvb32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4036 dc40396ba7a60db040dc0cc8a5f50b62_JaffaCakes118.exe 4036 dc40396ba7a60db040dc0cc8a5f50b62_JaffaCakes118.exe 4804 igfxdvb32.exe 4804 igfxdvb32.exe 1092 igfxdvb32.exe 1092 igfxdvb32.exe 3712 igfxdvb32.exe 3712 igfxdvb32.exe 2488 igfxdvb32.exe 2488 igfxdvb32.exe 2180 igfxdvb32.exe 2180 igfxdvb32.exe 2896 igfxdvb32.exe 2896 igfxdvb32.exe 632 igfxdvb32.exe 632 igfxdvb32.exe 3608 igfxdvb32.exe 3608 igfxdvb32.exe 1164 igfxdvb32.exe 1164 igfxdvb32.exe 1660 igfxdvb32.exe 1660 igfxdvb32.exe 2260 igfxdvb32.exe 2260 igfxdvb32.exe 1484 igfxdvb32.exe 1484 igfxdvb32.exe 2080 igfxdvb32.exe 2080 igfxdvb32.exe 4748 igfxdvb32.exe 4748 igfxdvb32.exe 2140 igfxdvb32.exe 2140 igfxdvb32.exe 1536 igfxdvb32.exe 1536 igfxdvb32.exe 1776 igfxdvb32.exe 1776 igfxdvb32.exe 32 igfxdvb32.exe 32 igfxdvb32.exe 2252 igfxdvb32.exe 2252 igfxdvb32.exe 4420 igfxdvb32.exe 4420 igfxdvb32.exe 4044 igfxdvb32.exe 4044 igfxdvb32.exe 832 igfxdvb32.exe 832 igfxdvb32.exe 1644 igfxdvb32.exe 1644 igfxdvb32.exe 2348 igfxdvb32.exe 2348 igfxdvb32.exe 436 igfxdvb32.exe 436 igfxdvb32.exe 3388 igfxdvb32.exe 3388 igfxdvb32.exe 5012 igfxdvb32.exe 5012 igfxdvb32.exe 5024 igfxdvb32.exe 5024 igfxdvb32.exe 4460 igfxdvb32.exe 4460 igfxdvb32.exe 5000 igfxdvb32.exe 5000 igfxdvb32.exe 4448 igfxdvb32.exe 4448 igfxdvb32.exe -
Suspicious use of SetWindowsHookEx 46 IoCs
pid Process 1164 dc40396ba7a60db040dc0cc8a5f50b62_JaffaCakes118.exe 4276 igfxdvb32.exe 5056 igfxdvb32.exe 4092 igfxdvb32.exe 1536 igfxdvb32.exe 32 igfxdvb32.exe 2964 igfxdvb32.exe 3004 igfxdvb32.exe 3616 igfxdvb32.exe 4452 igfxdvb32.exe 4116 igfxdvb32.exe 3468 igfxdvb32.exe 4304 igfxdvb32.exe 2208 igfxdvb32.exe 2256 igfxdvb32.exe 4260 igfxdvb32.exe 4248 igfxdvb32.exe 804 igfxdvb32.exe 3044 igfxdvb32.exe 4712 igfxdvb32.exe 5024 igfxdvb32.exe 4460 igfxdvb32.exe 3816 igfxdvb32.exe 64 igfxdvb32.exe 1228 igfxdvb32.exe 4116 igfxdvb32.exe 2224 igfxdvb32.exe 2964 igfxdvb32.exe 4320 igfxdvb32.exe 2580 igfxdvb32.exe 3716 igfxdvb32.exe 1516 igfxdvb32.exe 4020 igfxdvb32.exe 2916 igfxdvb32.exe 1320 igfxdvb32.exe 2816 igfxdvb32.exe 3824 igfxdvb32.exe 4968 igfxdvb32.exe 2964 igfxdvb32.exe 3876 igfxdvb32.exe 1464 igfxdvb32.exe 3716 igfxdvb32.exe 1516 igfxdvb32.exe 4708 igfxdvb32.exe 3884 igfxdvb32.exe 1320 igfxdvb32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1164 wrote to memory of 4036 1164 dc40396ba7a60db040dc0cc8a5f50b62_JaffaCakes118.exe 91 PID 1164 wrote to memory of 4036 1164 dc40396ba7a60db040dc0cc8a5f50b62_JaffaCakes118.exe 91 PID 1164 wrote to memory of 4036 1164 dc40396ba7a60db040dc0cc8a5f50b62_JaffaCakes118.exe 91 PID 1164 wrote to memory of 4036 1164 dc40396ba7a60db040dc0cc8a5f50b62_JaffaCakes118.exe 91 PID 1164 wrote to memory of 4036 1164 dc40396ba7a60db040dc0cc8a5f50b62_JaffaCakes118.exe 91 PID 1164 wrote to memory of 4036 1164 dc40396ba7a60db040dc0cc8a5f50b62_JaffaCakes118.exe 91 PID 1164 wrote to memory of 4036 1164 dc40396ba7a60db040dc0cc8a5f50b62_JaffaCakes118.exe 91 PID 1164 wrote to memory of 4036 1164 dc40396ba7a60db040dc0cc8a5f50b62_JaffaCakes118.exe 91 PID 4036 wrote to memory of 4276 4036 dc40396ba7a60db040dc0cc8a5f50b62_JaffaCakes118.exe 96 PID 4036 wrote to memory of 4276 4036 dc40396ba7a60db040dc0cc8a5f50b62_JaffaCakes118.exe 96 PID 4036 wrote to memory of 4276 4036 dc40396ba7a60db040dc0cc8a5f50b62_JaffaCakes118.exe 96 PID 4276 wrote to memory of 4804 4276 igfxdvb32.exe 97 PID 4276 wrote to memory of 4804 4276 igfxdvb32.exe 97 PID 4276 wrote to memory of 4804 4276 igfxdvb32.exe 97 PID 4276 wrote to memory of 4804 4276 igfxdvb32.exe 97 PID 4276 wrote to memory of 4804 4276 igfxdvb32.exe 97 PID 4276 wrote to memory of 4804 4276 igfxdvb32.exe 97 PID 4276 wrote to memory of 4804 4276 igfxdvb32.exe 97 PID 4276 wrote to memory of 4804 4276 igfxdvb32.exe 97 PID 4804 wrote to memory of 5056 4804 igfxdvb32.exe 100 PID 4804 wrote to memory of 5056 4804 igfxdvb32.exe 100 PID 4804 wrote to memory of 5056 4804 igfxdvb32.exe 100 PID 5056 wrote to memory of 1092 5056 igfxdvb32.exe 101 PID 5056 wrote to memory of 1092 5056 igfxdvb32.exe 101 PID 5056 wrote to memory of 1092 5056 igfxdvb32.exe 101 PID 5056 wrote to memory of 1092 5056 igfxdvb32.exe 101 PID 5056 wrote to memory of 1092 5056 igfxdvb32.exe 101 PID 5056 wrote to memory of 1092 5056 igfxdvb32.exe 101 PID 5056 wrote to memory of 1092 5056 igfxdvb32.exe 101 PID 5056 wrote to memory of 1092 5056 igfxdvb32.exe 101 PID 1092 wrote to memory of 4092 1092 igfxdvb32.exe 103 PID 1092 wrote to memory of 4092 1092 igfxdvb32.exe 103 PID 1092 wrote to memory of 4092 1092 igfxdvb32.exe 103 PID 4092 wrote to memory of 3712 4092 igfxdvb32.exe 104 PID 4092 wrote to memory of 3712 4092 igfxdvb32.exe 104 PID 4092 wrote to memory of 3712 4092 igfxdvb32.exe 104 PID 4092 wrote to memory of 3712 4092 igfxdvb32.exe 104 PID 4092 wrote to memory of 3712 4092 igfxdvb32.exe 104 PID 4092 wrote to memory of 3712 4092 igfxdvb32.exe 104 PID 4092 wrote to memory of 3712 4092 igfxdvb32.exe 104 PID 4092 wrote to memory of 3712 4092 igfxdvb32.exe 104 PID 3712 wrote to memory of 1536 3712 igfxdvb32.exe 108 PID 3712 wrote to memory of 1536 3712 igfxdvb32.exe 108 PID 3712 wrote to memory of 1536 3712 igfxdvb32.exe 108 PID 1536 wrote to memory of 2488 1536 igfxdvb32.exe 109 PID 1536 wrote to memory of 2488 1536 igfxdvb32.exe 109 PID 1536 wrote to memory of 2488 1536 igfxdvb32.exe 109 PID 1536 wrote to memory of 2488 1536 igfxdvb32.exe 109 PID 1536 wrote to memory of 2488 1536 igfxdvb32.exe 109 PID 1536 wrote to memory of 2488 1536 igfxdvb32.exe 109 PID 1536 wrote to memory of 2488 1536 igfxdvb32.exe 109 PID 1536 wrote to memory of 2488 1536 igfxdvb32.exe 109 PID 2488 wrote to memory of 32 2488 igfxdvb32.exe 110 PID 2488 wrote to memory of 32 2488 igfxdvb32.exe 110 PID 2488 wrote to memory of 32 2488 igfxdvb32.exe 110 PID 32 wrote to memory of 2180 32 igfxdvb32.exe 111 PID 32 wrote to memory of 2180 32 igfxdvb32.exe 111 PID 32 wrote to memory of 2180 32 igfxdvb32.exe 111 PID 32 wrote to memory of 2180 32 igfxdvb32.exe 111 PID 32 wrote to memory of 2180 32 igfxdvb32.exe 111 PID 32 wrote to memory of 2180 32 igfxdvb32.exe 111 PID 32 wrote to memory of 2180 32 igfxdvb32.exe 111 PID 32 wrote to memory of 2180 32 igfxdvb32.exe 111 PID 2180 wrote to memory of 2964 2180 igfxdvb32.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc40396ba7a60db040dc0cc8a5f50b62_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dc40396ba7a60db040dc0cc8a5f50b62_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\dc40396ba7a60db040dc0cc8a5f50b62_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\dc40396ba7a60db040dc0cc8a5f50b62_JaffaCakes118.exe2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Users\Admin\AppData\Local\Temp\DC4039~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Users\Admin\AppData\Local\Temp\DC4039~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2964 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2896 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3004 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:632 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3616 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3608 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4452 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1164 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4116 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1660 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3468 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2260 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4304 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1484 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2208 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2080 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2256 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4748 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4260 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2140 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4248 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1536 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:804 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1776 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3044 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:32 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4712 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE40⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2252 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5024 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4420 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4460 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE44⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4044 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3816 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE46⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:832 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:64 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE48⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1644 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1228 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE50⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2348 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4116 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE52⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:436 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2224 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE54⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3388 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2964 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE56⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5012 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4320 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE58⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5024 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2580 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE60⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4460 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3716 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE62⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5000 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1516 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE64⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4448 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4020 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE66⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1732 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE67⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2916 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE68⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3620 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE69⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1320 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE70⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4624 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE71⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2816 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE72⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2868 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE73⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3824 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE74⤵
- Checks computer location settings
- Maps connected drives based on registry
- Modifies registry class
PID:4560 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE75⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4968 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE76⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4304 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE77⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2964 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE78⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:4840 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE79⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3876 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE80⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5064 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE81⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1464 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE82⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1888 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE83⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3716 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE84⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:964 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE85⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1516 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE86⤵
- Checks computer location settings
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4984 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE87⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4708 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE88⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4876 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE89⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3884 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE90⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:2832 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\system32\igfxdvb32.exe" C:\Windows\SysWOW64\IGFXDV~1.EXE91⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1320 -
C:\Windows\SysWOW64\igfxdvb32.exe"C:\Windows\SysWOW64\igfxdvb32.exe " C:\Windows\SysWOW64\IGFXDV~1.EXE92⤵
- Checks computer location settings
- Maps connected drives based on registry
- Modifies registry class
PID:4376
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4336,i,16316361669272684588,6171287487746154806,262144 --variations-seed-version --mojo-platform-channel-handle=1040 /prefetch:81⤵PID:3224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
296KB
MD5dc40396ba7a60db040dc0cc8a5f50b62
SHA14aa7f692e7b19338932785e403bb1a798552f2fa
SHA2562115f6f9e274b823456ef662cc6b511952596e82c908738da0e2dca57d8550b0
SHA5125c8bcd36508fb95b0e048c3ebdf196a33fd30307b207dbd965dc6fddfe1568df9114172cffe637605c7cab42b58fcb713091c7f7e923dde3a1aaf4d3b4c9f28b