Analysis
-
max time kernel
148s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 13:59
Static task
static1
Behavioral task
behavioral1
Sample
dc60397a30f6289a22f2acd6622f566b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc60397a30f6289a22f2acd6622f566b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dc60397a30f6289a22f2acd6622f566b_JaffaCakes118.exe
-
Size
272KB
-
MD5
dc60397a30f6289a22f2acd6622f566b
-
SHA1
c5f35c53d06066802365df7cb76631c08c971cb4
-
SHA256
5a829175ac0891f802f73e4c3a826e00455f38917bd726e582fbe0ac7cd7f549
-
SHA512
fb506d19c96fa35b23295f80c957cd2268d6088176609267132c4a02b2a922a4e870a446304f7e15d0952639b881c0c0dc723eea28d72e56adeb8113a26688be
-
SSDEEP
6144:7X96kBHAS267CRsYYVdN7abzblMolk5S78+VnfBY:73tASIsjN7e/aG8qpY
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 1908 igfxpc32.exe -
Executes dropped EXE 64 IoCs
pid Process 1908 igfxpc32.exe 2840 igfxpc32.exe 2728 igfxpc32.exe 2780 igfxpc32.exe 2688 igfxpc32.exe 1712 igfxpc32.exe 1444 igfxpc32.exe 1888 igfxpc32.exe 2948 igfxpc32.exe 352 igfxpc32.exe 1812 igfxpc32.exe 2092 igfxpc32.exe 2084 igfxpc32.exe 1104 igfxpc32.exe 1280 igfxpc32.exe 1784 igfxpc32.exe 1620 igfxpc32.exe 2348 igfxpc32.exe 1456 igfxpc32.exe 2192 igfxpc32.exe 1780 igfxpc32.exe 1956 igfxpc32.exe 2696 igfxpc32.exe 2520 igfxpc32.exe 1804 igfxpc32.exe 1908 igfxpc32.exe 2620 igfxpc32.exe 2964 igfxpc32.exe 2612 igfxpc32.exe 1960 igfxpc32.exe 2300 igfxpc32.exe 676 igfxpc32.exe 2916 igfxpc32.exe 2912 igfxpc32.exe 1540 igfxpc32.exe 2464 igfxpc32.exe 352 igfxpc32.exe 768 igfxpc32.exe 2876 igfxpc32.exe 2372 igfxpc32.exe 2568 igfxpc32.exe 680 igfxpc32.exe 2196 igfxpc32.exe 1588 igfxpc32.exe 688 igfxpc32.exe 2076 igfxpc32.exe 2080 igfxpc32.exe 268 igfxpc32.exe 2192 igfxpc32.exe 1920 igfxpc32.exe 1560 igfxpc32.exe 900 igfxpc32.exe 2520 igfxpc32.exe 1804 igfxpc32.exe 2736 igfxpc32.exe 2864 igfxpc32.exe 2136 igfxpc32.exe 1300 igfxpc32.exe 2732 igfxpc32.exe 2412 igfxpc32.exe 1544 igfxpc32.exe 2792 igfxpc32.exe 1444 igfxpc32.exe 2012 igfxpc32.exe -
Loads dropped DLL 64 IoCs
pid Process 1640 dc60397a30f6289a22f2acd6622f566b_JaffaCakes118.exe 1640 dc60397a30f6289a22f2acd6622f566b_JaffaCakes118.exe 1908 igfxpc32.exe 1908 igfxpc32.exe 2840 igfxpc32.exe 2840 igfxpc32.exe 2728 igfxpc32.exe 2728 igfxpc32.exe 2780 igfxpc32.exe 2780 igfxpc32.exe 2688 igfxpc32.exe 2688 igfxpc32.exe 1712 igfxpc32.exe 1712 igfxpc32.exe 1444 igfxpc32.exe 1444 igfxpc32.exe 1888 igfxpc32.exe 1888 igfxpc32.exe 2948 igfxpc32.exe 2948 igfxpc32.exe 352 igfxpc32.exe 352 igfxpc32.exe 1812 igfxpc32.exe 1812 igfxpc32.exe 2092 igfxpc32.exe 2092 igfxpc32.exe 2084 igfxpc32.exe 2084 igfxpc32.exe 1104 igfxpc32.exe 1104 igfxpc32.exe 1280 igfxpc32.exe 1280 igfxpc32.exe 1784 igfxpc32.exe 1784 igfxpc32.exe 1620 igfxpc32.exe 1620 igfxpc32.exe 2348 igfxpc32.exe 2348 igfxpc32.exe 1456 igfxpc32.exe 1456 igfxpc32.exe 2192 igfxpc32.exe 2192 igfxpc32.exe 1780 igfxpc32.exe 1780 igfxpc32.exe 1956 igfxpc32.exe 1956 igfxpc32.exe 2696 igfxpc32.exe 2696 igfxpc32.exe 2520 igfxpc32.exe 2520 igfxpc32.exe 1804 igfxpc32.exe 1804 igfxpc32.exe 1908 igfxpc32.exe 1908 igfxpc32.exe 2620 igfxpc32.exe 2620 igfxpc32.exe 2964 igfxpc32.exe 2964 igfxpc32.exe 2612 igfxpc32.exe 2612 igfxpc32.exe 1960 igfxpc32.exe 1960 igfxpc32.exe 2300 igfxpc32.exe 2300 igfxpc32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpc32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxpc32.exe igfxpc32.exe File opened for modification C:\Windows\SysWOW64\igfxpc32.exe igfxpc32.exe File opened for modification C:\Windows\SysWOW64\igfxpc32.exe igfxpc32.exe File created C:\Windows\SysWOW64\igfxpc32.exe igfxpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxpc32.exe File opened for modification C:\Windows\SysWOW64\igfxpc32.exe igfxpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxpc32.exe File opened for modification C:\Windows\SysWOW64\igfxpc32.exe igfxpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxpc32.exe File opened for modification C:\Windows\SysWOW64\igfxpc32.exe igfxpc32.exe File created C:\Windows\SysWOW64\igfxpc32.exe igfxpc32.exe File created C:\Windows\SysWOW64\igfxpc32.exe igfxpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxpc32.exe File created C:\Windows\SysWOW64\igfxpc32.exe igfxpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxpc32.exe File created C:\Windows\SysWOW64\igfxpc32.exe igfxpc32.exe File opened for modification C:\Windows\SysWOW64\igfxpc32.exe igfxpc32.exe File opened for modification C:\Windows\SysWOW64\igfxpc32.exe igfxpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxpc32.exe File opened for modification C:\Windows\SysWOW64\igfxpc32.exe igfxpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxpc32.exe File created C:\Windows\SysWOW64\igfxpc32.exe igfxpc32.exe File opened for modification C:\Windows\SysWOW64\igfxpc32.exe igfxpc32.exe File opened for modification C:\Windows\SysWOW64\igfxpc32.exe igfxpc32.exe File created C:\Windows\SysWOW64\igfxpc32.exe igfxpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxpc32.exe File created C:\Windows\SysWOW64\igfxpc32.exe igfxpc32.exe File opened for modification C:\Windows\SysWOW64\igfxpc32.exe igfxpc32.exe File created C:\Windows\SysWOW64\igfxpc32.exe igfxpc32.exe File opened for modification C:\Windows\SysWOW64\igfxpc32.exe igfxpc32.exe File opened for modification C:\Windows\SysWOW64\ dc60397a30f6289a22f2acd6622f566b_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxpc32.exe igfxpc32.exe File opened for modification C:\Windows\SysWOW64\igfxpc32.exe igfxpc32.exe File opened for modification C:\Windows\SysWOW64\igfxpc32.exe igfxpc32.exe File created C:\Windows\SysWOW64\igfxpc32.exe igfxpc32.exe File created C:\Windows\SysWOW64\igfxpc32.exe igfxpc32.exe File opened for modification C:\Windows\SysWOW64\igfxpc32.exe igfxpc32.exe File created C:\Windows\SysWOW64\igfxpc32.exe igfxpc32.exe File created C:\Windows\SysWOW64\igfxpc32.exe igfxpc32.exe File opened for modification C:\Windows\SysWOW64\igfxpc32.exe igfxpc32.exe File created C:\Windows\SysWOW64\igfxpc32.exe igfxpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxpc32.exe File opened for modification C:\Windows\SysWOW64\igfxpc32.exe igfxpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxpc32.exe File created C:\Windows\SysWOW64\igfxpc32.exe igfxpc32.exe File opened for modification C:\Windows\SysWOW64\igfxpc32.exe igfxpc32.exe File opened for modification C:\Windows\SysWOW64\igfxpc32.exe igfxpc32.exe File opened for modification C:\Windows\SysWOW64\igfxpc32.exe igfxpc32.exe File opened for modification C:\Windows\SysWOW64\igfxpc32.exe igfxpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxpc32.exe File opened for modification C:\Windows\SysWOW64\igfxpc32.exe igfxpc32.exe File created C:\Windows\SysWOW64\igfxpc32.exe igfxpc32.exe File created C:\Windows\SysWOW64\igfxpc32.exe igfxpc32.exe File created C:\Windows\SysWOW64\igfxpc32.exe igfxpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxpc32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc60397a30f6289a22f2acd6622f566b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpc32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1640 dc60397a30f6289a22f2acd6622f566b_JaffaCakes118.exe 1640 dc60397a30f6289a22f2acd6622f566b_JaffaCakes118.exe 1908 igfxpc32.exe 1908 igfxpc32.exe 2840 igfxpc32.exe 2840 igfxpc32.exe 2728 igfxpc32.exe 2728 igfxpc32.exe 2780 igfxpc32.exe 2780 igfxpc32.exe 2688 igfxpc32.exe 2688 igfxpc32.exe 1712 igfxpc32.exe 1712 igfxpc32.exe 1444 igfxpc32.exe 1444 igfxpc32.exe 1888 igfxpc32.exe 1888 igfxpc32.exe 2948 igfxpc32.exe 2948 igfxpc32.exe 352 igfxpc32.exe 352 igfxpc32.exe 1812 igfxpc32.exe 1812 igfxpc32.exe 2092 igfxpc32.exe 2092 igfxpc32.exe 2084 igfxpc32.exe 2084 igfxpc32.exe 1104 igfxpc32.exe 1104 igfxpc32.exe 1280 igfxpc32.exe 1280 igfxpc32.exe 1784 igfxpc32.exe 1784 igfxpc32.exe 1620 igfxpc32.exe 1620 igfxpc32.exe 2348 igfxpc32.exe 2348 igfxpc32.exe 1456 igfxpc32.exe 1456 igfxpc32.exe 2192 igfxpc32.exe 2192 igfxpc32.exe 1780 igfxpc32.exe 1780 igfxpc32.exe 1956 igfxpc32.exe 1956 igfxpc32.exe 2696 igfxpc32.exe 2696 igfxpc32.exe 2520 igfxpc32.exe 2520 igfxpc32.exe 1804 igfxpc32.exe 1804 igfxpc32.exe 1908 igfxpc32.exe 1908 igfxpc32.exe 2620 igfxpc32.exe 2620 igfxpc32.exe 2964 igfxpc32.exe 2964 igfxpc32.exe 2612 igfxpc32.exe 2612 igfxpc32.exe 1960 igfxpc32.exe 1960 igfxpc32.exe 2300 igfxpc32.exe 2300 igfxpc32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1640 wrote to memory of 1908 1640 dc60397a30f6289a22f2acd6622f566b_JaffaCakes118.exe 30 PID 1640 wrote to memory of 1908 1640 dc60397a30f6289a22f2acd6622f566b_JaffaCakes118.exe 30 PID 1640 wrote to memory of 1908 1640 dc60397a30f6289a22f2acd6622f566b_JaffaCakes118.exe 30 PID 1640 wrote to memory of 1908 1640 dc60397a30f6289a22f2acd6622f566b_JaffaCakes118.exe 30 PID 1908 wrote to memory of 2840 1908 igfxpc32.exe 31 PID 1908 wrote to memory of 2840 1908 igfxpc32.exe 31 PID 1908 wrote to memory of 2840 1908 igfxpc32.exe 31 PID 1908 wrote to memory of 2840 1908 igfxpc32.exe 31 PID 2840 wrote to memory of 2728 2840 igfxpc32.exe 32 PID 2840 wrote to memory of 2728 2840 igfxpc32.exe 32 PID 2840 wrote to memory of 2728 2840 igfxpc32.exe 32 PID 2840 wrote to memory of 2728 2840 igfxpc32.exe 32 PID 2728 wrote to memory of 2780 2728 igfxpc32.exe 33 PID 2728 wrote to memory of 2780 2728 igfxpc32.exe 33 PID 2728 wrote to memory of 2780 2728 igfxpc32.exe 33 PID 2728 wrote to memory of 2780 2728 igfxpc32.exe 33 PID 2780 wrote to memory of 2688 2780 igfxpc32.exe 34 PID 2780 wrote to memory of 2688 2780 igfxpc32.exe 34 PID 2780 wrote to memory of 2688 2780 igfxpc32.exe 34 PID 2780 wrote to memory of 2688 2780 igfxpc32.exe 34 PID 2688 wrote to memory of 1712 2688 igfxpc32.exe 35 PID 2688 wrote to memory of 1712 2688 igfxpc32.exe 35 PID 2688 wrote to memory of 1712 2688 igfxpc32.exe 35 PID 2688 wrote to memory of 1712 2688 igfxpc32.exe 35 PID 1712 wrote to memory of 1444 1712 igfxpc32.exe 36 PID 1712 wrote to memory of 1444 1712 igfxpc32.exe 36 PID 1712 wrote to memory of 1444 1712 igfxpc32.exe 36 PID 1712 wrote to memory of 1444 1712 igfxpc32.exe 36 PID 1444 wrote to memory of 1888 1444 igfxpc32.exe 38 PID 1444 wrote to memory of 1888 1444 igfxpc32.exe 38 PID 1444 wrote to memory of 1888 1444 igfxpc32.exe 38 PID 1444 wrote to memory of 1888 1444 igfxpc32.exe 38 PID 1888 wrote to memory of 2948 1888 igfxpc32.exe 39 PID 1888 wrote to memory of 2948 1888 igfxpc32.exe 39 PID 1888 wrote to memory of 2948 1888 igfxpc32.exe 39 PID 1888 wrote to memory of 2948 1888 igfxpc32.exe 39 PID 2948 wrote to memory of 352 2948 igfxpc32.exe 40 PID 2948 wrote to memory of 352 2948 igfxpc32.exe 40 PID 2948 wrote to memory of 352 2948 igfxpc32.exe 40 PID 2948 wrote to memory of 352 2948 igfxpc32.exe 40 PID 352 wrote to memory of 1812 352 igfxpc32.exe 41 PID 352 wrote to memory of 1812 352 igfxpc32.exe 41 PID 352 wrote to memory of 1812 352 igfxpc32.exe 41 PID 352 wrote to memory of 1812 352 igfxpc32.exe 41 PID 1812 wrote to memory of 2092 1812 igfxpc32.exe 42 PID 1812 wrote to memory of 2092 1812 igfxpc32.exe 42 PID 1812 wrote to memory of 2092 1812 igfxpc32.exe 42 PID 1812 wrote to memory of 2092 1812 igfxpc32.exe 42 PID 2092 wrote to memory of 2084 2092 igfxpc32.exe 43 PID 2092 wrote to memory of 2084 2092 igfxpc32.exe 43 PID 2092 wrote to memory of 2084 2092 igfxpc32.exe 43 PID 2092 wrote to memory of 2084 2092 igfxpc32.exe 43 PID 2084 wrote to memory of 1104 2084 igfxpc32.exe 44 PID 2084 wrote to memory of 1104 2084 igfxpc32.exe 44 PID 2084 wrote to memory of 1104 2084 igfxpc32.exe 44 PID 2084 wrote to memory of 1104 2084 igfxpc32.exe 44 PID 1104 wrote to memory of 1280 1104 igfxpc32.exe 45 PID 1104 wrote to memory of 1280 1104 igfxpc32.exe 45 PID 1104 wrote to memory of 1280 1104 igfxpc32.exe 45 PID 1104 wrote to memory of 1280 1104 igfxpc32.exe 45 PID 1280 wrote to memory of 1784 1280 igfxpc32.exe 46 PID 1280 wrote to memory of 1784 1280 igfxpc32.exe 46 PID 1280 wrote to memory of 1784 1280 igfxpc32.exe 46 PID 1280 wrote to memory of 1784 1280 igfxpc32.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc60397a30f6289a22f2acd6622f566b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dc60397a30f6289a22f2acd6622f566b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Users\Admin\AppData\Local\Temp\DC6039~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:352 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1784 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1620 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2348 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1456 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2192 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1780 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1956 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2696 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2520 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1804 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1908 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2620 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2964 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2612 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1960 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2300 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:676 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2916 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2912 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1540 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2464 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:352 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:768 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2876 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2372 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe42⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2568 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe43⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:680 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2196 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1588 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:688 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe47⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2076 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe48⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2080 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe49⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:268 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2192 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe51⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1920 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe52⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1560 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe53⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:900 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe54⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2520 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe55⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1804 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe56⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2736 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe57⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2864 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe58⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2136 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe59⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1300 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe60⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2732 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe61⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2412 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe62⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1544 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe63⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2792 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe64⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1444 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe65⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2012 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe66⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2600 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe67⤵
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2088 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe68⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:352 -
C:\Windows\SysWOW64\igfxpc32.exe"C:\Windows\system32\igfxpc32.exe" C:\Windows\SysWOW64\igfxpc32.exe69⤵
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1732
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
272KB
MD5dc60397a30f6289a22f2acd6622f566b
SHA1c5f35c53d06066802365df7cb76631c08c971cb4
SHA2565a829175ac0891f802f73e4c3a826e00455f38917bd726e582fbe0ac7cd7f549
SHA512fb506d19c96fa35b23295f80c957cd2268d6088176609267132c4a02b2a922a4e870a446304f7e15d0952639b881c0c0dc723eea28d72e56adeb8113a26688be