Analysis
-
max time kernel
150s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 02:15
Static task
static1
Behavioral task
behavioral1
Sample
dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe
-
Size
528KB
-
MD5
dd7739debcc86b185525754bf0285d2c
-
SHA1
828d8bb036f952dba2b1846a239ef1e833fc5654
-
SHA256
2b51f15f63b25db5fa9cc9bbf94fd17728a117853ff4e7889b85109365f25f5f
-
SHA512
132c860ec79ede1ab7c971d4c960cd94e5322e69a69aceacaa06771d0d76aa260d0f068ff6870843596d1cf5fb1ae6f0b7bd7f612575111e0d46fb0320bd4b08
-
SSDEEP
12288:F/1L+W3eEQKhksGN5qrdSgiUjEevMWif3gG:F/x+wGUGN5qUgiUjEevxG
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 1416 igfxdpc32.exe -
Executes dropped EXE 48 IoCs
pid Process 1416 igfxdpc32.exe 2912 igfxdpc32.exe 2616 igfxdpc32.exe 2888 igfxdpc32.exe 1608 igfxdpc32.exe 2856 igfxdpc32.exe 2664 igfxdpc32.exe 2244 igfxdpc32.exe 2484 igfxdpc32.exe 2276 igfxdpc32.exe 2192 igfxdpc32.exe 1960 igfxdpc32.exe 2488 igfxdpc32.exe 3032 igfxdpc32.exe 980 igfxdpc32.exe 1660 igfxdpc32.exe 2544 igfxdpc32.exe 2064 igfxdpc32.exe 2756 igfxdpc32.exe 2140 igfxdpc32.exe 2648 igfxdpc32.exe 2620 igfxdpc32.exe 1456 igfxdpc32.exe 1132 igfxdpc32.exe 2704 igfxdpc32.exe 1708 igfxdpc32.exe 2428 igfxdpc32.exe 1280 igfxdpc32.exe 1632 igfxdpc32.exe 2484 igfxdpc32.exe 2324 igfxdpc32.exe 1088 igfxdpc32.exe 2504 igfxdpc32.exe 2964 igfxdpc32.exe 264 igfxdpc32.exe 1592 igfxdpc32.exe 352 igfxdpc32.exe 748 igfxdpc32.exe 2792 igfxdpc32.exe 2288 igfxdpc32.exe 2880 igfxdpc32.exe 2852 igfxdpc32.exe 2660 igfxdpc32.exe 1544 igfxdpc32.exe 2616 igfxdpc32.exe 2740 igfxdpc32.exe 2996 igfxdpc32.exe 1608 igfxdpc32.exe -
Loads dropped DLL 64 IoCs
pid Process 2684 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 2684 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 1416 igfxdpc32.exe 1416 igfxdpc32.exe 2912 igfxdpc32.exe 2912 igfxdpc32.exe 2616 igfxdpc32.exe 2616 igfxdpc32.exe 2888 igfxdpc32.exe 2888 igfxdpc32.exe 1608 igfxdpc32.exe 1608 igfxdpc32.exe 2856 igfxdpc32.exe 2856 igfxdpc32.exe 2664 igfxdpc32.exe 2664 igfxdpc32.exe 2244 igfxdpc32.exe 2244 igfxdpc32.exe 2484 igfxdpc32.exe 2484 igfxdpc32.exe 2276 igfxdpc32.exe 2276 igfxdpc32.exe 2192 igfxdpc32.exe 2192 igfxdpc32.exe 1960 igfxdpc32.exe 1960 igfxdpc32.exe 2488 igfxdpc32.exe 2488 igfxdpc32.exe 3032 igfxdpc32.exe 3032 igfxdpc32.exe 980 igfxdpc32.exe 980 igfxdpc32.exe 1660 igfxdpc32.exe 1660 igfxdpc32.exe 2544 igfxdpc32.exe 2544 igfxdpc32.exe 2064 igfxdpc32.exe 2064 igfxdpc32.exe 2756 igfxdpc32.exe 2756 igfxdpc32.exe 2140 igfxdpc32.exe 2140 igfxdpc32.exe 2648 igfxdpc32.exe 2648 igfxdpc32.exe 2620 igfxdpc32.exe 2620 igfxdpc32.exe 1456 igfxdpc32.exe 1456 igfxdpc32.exe 1132 igfxdpc32.exe 1132 igfxdpc32.exe 2704 igfxdpc32.exe 2704 igfxdpc32.exe 1708 igfxdpc32.exe 1708 igfxdpc32.exe 2428 igfxdpc32.exe 2428 igfxdpc32.exe 1280 igfxdpc32.exe 1280 igfxdpc32.exe 1632 igfxdpc32.exe 1632 igfxdpc32.exe 2484 igfxdpc32.exe 2484 igfxdpc32.exe 2324 igfxdpc32.exe 2324 igfxdpc32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 49 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2684 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 2684 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 2684 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 2684 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 2684 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 2684 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 2684 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 2684 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 2684 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 2684 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 2684 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 2684 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 2684 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 2684 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 2684 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 2684 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 1416 igfxdpc32.exe 1416 igfxdpc32.exe 1416 igfxdpc32.exe 1416 igfxdpc32.exe 1416 igfxdpc32.exe 1416 igfxdpc32.exe 1416 igfxdpc32.exe 1416 igfxdpc32.exe 1416 igfxdpc32.exe 1416 igfxdpc32.exe 1416 igfxdpc32.exe 1416 igfxdpc32.exe 1416 igfxdpc32.exe 1416 igfxdpc32.exe 1416 igfxdpc32.exe 1416 igfxdpc32.exe 2912 igfxdpc32.exe 2912 igfxdpc32.exe 2912 igfxdpc32.exe 2912 igfxdpc32.exe 2912 igfxdpc32.exe 2912 igfxdpc32.exe 2912 igfxdpc32.exe 2912 igfxdpc32.exe 2912 igfxdpc32.exe 2912 igfxdpc32.exe 2912 igfxdpc32.exe 2912 igfxdpc32.exe 2912 igfxdpc32.exe 2912 igfxdpc32.exe 2912 igfxdpc32.exe 2912 igfxdpc32.exe 2616 igfxdpc32.exe 2616 igfxdpc32.exe 2616 igfxdpc32.exe 2616 igfxdpc32.exe 2616 igfxdpc32.exe 2616 igfxdpc32.exe 2616 igfxdpc32.exe 2616 igfxdpc32.exe 2616 igfxdpc32.exe 2616 igfxdpc32.exe 2616 igfxdpc32.exe 2616 igfxdpc32.exe 2616 igfxdpc32.exe 2616 igfxdpc32.exe 2616 igfxdpc32.exe 2616 igfxdpc32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2684 wrote to memory of 1416 2684 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 30 PID 2684 wrote to memory of 1416 2684 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 30 PID 2684 wrote to memory of 1416 2684 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 30 PID 2684 wrote to memory of 1416 2684 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 30 PID 1416 wrote to memory of 2912 1416 igfxdpc32.exe 31 PID 1416 wrote to memory of 2912 1416 igfxdpc32.exe 31 PID 1416 wrote to memory of 2912 1416 igfxdpc32.exe 31 PID 1416 wrote to memory of 2912 1416 igfxdpc32.exe 31 PID 2912 wrote to memory of 2616 2912 igfxdpc32.exe 32 PID 2912 wrote to memory of 2616 2912 igfxdpc32.exe 32 PID 2912 wrote to memory of 2616 2912 igfxdpc32.exe 32 PID 2912 wrote to memory of 2616 2912 igfxdpc32.exe 32 PID 2616 wrote to memory of 2888 2616 igfxdpc32.exe 33 PID 2616 wrote to memory of 2888 2616 igfxdpc32.exe 33 PID 2616 wrote to memory of 2888 2616 igfxdpc32.exe 33 PID 2616 wrote to memory of 2888 2616 igfxdpc32.exe 33 PID 2888 wrote to memory of 1608 2888 igfxdpc32.exe 34 PID 2888 wrote to memory of 1608 2888 igfxdpc32.exe 34 PID 2888 wrote to memory of 1608 2888 igfxdpc32.exe 34 PID 2888 wrote to memory of 1608 2888 igfxdpc32.exe 34 PID 1608 wrote to memory of 2856 1608 igfxdpc32.exe 35 PID 1608 wrote to memory of 2856 1608 igfxdpc32.exe 35 PID 1608 wrote to memory of 2856 1608 igfxdpc32.exe 35 PID 1608 wrote to memory of 2856 1608 igfxdpc32.exe 35 PID 2856 wrote to memory of 2664 2856 igfxdpc32.exe 36 PID 2856 wrote to memory of 2664 2856 igfxdpc32.exe 36 PID 2856 wrote to memory of 2664 2856 igfxdpc32.exe 36 PID 2856 wrote to memory of 2664 2856 igfxdpc32.exe 36 PID 2664 wrote to memory of 2244 2664 igfxdpc32.exe 37 PID 2664 wrote to memory of 2244 2664 igfxdpc32.exe 37 PID 2664 wrote to memory of 2244 2664 igfxdpc32.exe 37 PID 2664 wrote to memory of 2244 2664 igfxdpc32.exe 37 PID 2244 wrote to memory of 2484 2244 igfxdpc32.exe 38 PID 2244 wrote to memory of 2484 2244 igfxdpc32.exe 38 PID 2244 wrote to memory of 2484 2244 igfxdpc32.exe 38 PID 2244 wrote to memory of 2484 2244 igfxdpc32.exe 38 PID 2484 wrote to memory of 2276 2484 igfxdpc32.exe 39 PID 2484 wrote to memory of 2276 2484 igfxdpc32.exe 39 PID 2484 wrote to memory of 2276 2484 igfxdpc32.exe 39 PID 2484 wrote to memory of 2276 2484 igfxdpc32.exe 39 PID 2276 wrote to memory of 2192 2276 igfxdpc32.exe 40 PID 2276 wrote to memory of 2192 2276 igfxdpc32.exe 40 PID 2276 wrote to memory of 2192 2276 igfxdpc32.exe 40 PID 2276 wrote to memory of 2192 2276 igfxdpc32.exe 40 PID 2192 wrote to memory of 1960 2192 igfxdpc32.exe 41 PID 2192 wrote to memory of 1960 2192 igfxdpc32.exe 41 PID 2192 wrote to memory of 1960 2192 igfxdpc32.exe 41 PID 2192 wrote to memory of 1960 2192 igfxdpc32.exe 41 PID 1960 wrote to memory of 2488 1960 igfxdpc32.exe 42 PID 1960 wrote to memory of 2488 1960 igfxdpc32.exe 42 PID 1960 wrote to memory of 2488 1960 igfxdpc32.exe 42 PID 1960 wrote to memory of 2488 1960 igfxdpc32.exe 42 PID 2488 wrote to memory of 3032 2488 igfxdpc32.exe 43 PID 2488 wrote to memory of 3032 2488 igfxdpc32.exe 43 PID 2488 wrote to memory of 3032 2488 igfxdpc32.exe 43 PID 2488 wrote to memory of 3032 2488 igfxdpc32.exe 43 PID 3032 wrote to memory of 980 3032 igfxdpc32.exe 44 PID 3032 wrote to memory of 980 3032 igfxdpc32.exe 44 PID 3032 wrote to memory of 980 3032 igfxdpc32.exe 44 PID 3032 wrote to memory of 980 3032 igfxdpc32.exe 44 PID 980 wrote to memory of 1660 980 igfxdpc32.exe 45 PID 980 wrote to memory of 1660 980 igfxdpc32.exe 45 PID 980 wrote to memory of 1660 980 igfxdpc32.exe 45 PID 980 wrote to memory of 1660 980 igfxdpc32.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Users\Admin\AppData\Local\Temp\DD7739~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1660 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2544 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2064 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2756 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2140 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2648 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2620 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1456 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1132 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2704 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1708 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE28⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2428 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE29⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1280 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1632 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2484 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2324 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1088 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2504 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2964 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:264 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1592 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE38⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:352 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:748 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2792 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2288 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE42⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2880 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2852 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2660 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1544 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE46⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2616 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE47⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2740 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE48⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2996 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE49⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1608 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE50⤵PID:1784
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
528KB
MD5dd7739debcc86b185525754bf0285d2c
SHA1828d8bb036f952dba2b1846a239ef1e833fc5654
SHA2562b51f15f63b25db5fa9cc9bbf94fd17728a117853ff4e7889b85109365f25f5f
SHA512132c860ec79ede1ab7c971d4c960cd94e5322e69a69aceacaa06771d0d76aa260d0f068ff6870843596d1cf5fb1ae6f0b7bd7f612575111e0d46fb0320bd4b08