Analysis
-
max time kernel
148s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 02:15
Static task
static1
Behavioral task
behavioral1
Sample
dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe
-
Size
528KB
-
MD5
dd7739debcc86b185525754bf0285d2c
-
SHA1
828d8bb036f952dba2b1846a239ef1e833fc5654
-
SHA256
2b51f15f63b25db5fa9cc9bbf94fd17728a117853ff4e7889b85109365f25f5f
-
SHA512
132c860ec79ede1ab7c971d4c960cd94e5322e69a69aceacaa06771d0d76aa260d0f068ff6870843596d1cf5fb1ae6f0b7bd7f612575111e0d46fb0320bd4b08
-
SSDEEP
12288:F/1L+W3eEQKhksGN5qrdSgiUjEevMWif3gG:F/x+wGUGN5qUgiUjEevxG
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings 2 TTPs 40 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation igfxdpc32.exe -
Deletes itself 1 IoCs
pid Process 4284 igfxdpc32.exe -
Executes dropped EXE 40 IoCs
pid Process 4284 igfxdpc32.exe 1040 igfxdpc32.exe 536 igfxdpc32.exe 5056 igfxdpc32.exe 3272 igfxdpc32.exe 2920 igfxdpc32.exe 1524 igfxdpc32.exe 2464 igfxdpc32.exe 3764 igfxdpc32.exe 1964 igfxdpc32.exe 4556 igfxdpc32.exe 232 igfxdpc32.exe 4016 igfxdpc32.exe 1568 igfxdpc32.exe 4548 igfxdpc32.exe 3600 igfxdpc32.exe 2640 igfxdpc32.exe 1944 igfxdpc32.exe 3232 igfxdpc32.exe 220 igfxdpc32.exe 4160 igfxdpc32.exe 1320 igfxdpc32.exe 812 igfxdpc32.exe 1228 igfxdpc32.exe 2648 igfxdpc32.exe 2976 igfxdpc32.exe 4016 igfxdpc32.exe 624 igfxdpc32.exe 4548 igfxdpc32.exe 3068 igfxdpc32.exe 3104 igfxdpc32.exe 4496 igfxdpc32.exe 2104 igfxdpc32.exe 2464 igfxdpc32.exe 1400 igfxdpc32.exe 4884 igfxdpc32.exe 3244 igfxdpc32.exe 3932 igfxdpc32.exe 1940 igfxdpc32.exe 4896 igfxdpc32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 40 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe -
Modifies registry class 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdpc32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1488 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 1488 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 1488 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 1488 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 1488 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 1488 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 1488 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 1488 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 1488 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 1488 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 1488 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 1488 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 1488 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 1488 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 1488 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 1488 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 1488 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 1488 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 1488 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 1488 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 1488 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 1488 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 1488 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 1488 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 1488 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 1488 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 1488 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 1488 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 1488 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 1488 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 1488 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 1488 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 4284 igfxdpc32.exe 4284 igfxdpc32.exe 4284 igfxdpc32.exe 4284 igfxdpc32.exe 4284 igfxdpc32.exe 4284 igfxdpc32.exe 4284 igfxdpc32.exe 4284 igfxdpc32.exe 4284 igfxdpc32.exe 4284 igfxdpc32.exe 4284 igfxdpc32.exe 4284 igfxdpc32.exe 4284 igfxdpc32.exe 4284 igfxdpc32.exe 4284 igfxdpc32.exe 4284 igfxdpc32.exe 4284 igfxdpc32.exe 4284 igfxdpc32.exe 4284 igfxdpc32.exe 4284 igfxdpc32.exe 4284 igfxdpc32.exe 4284 igfxdpc32.exe 4284 igfxdpc32.exe 4284 igfxdpc32.exe 4284 igfxdpc32.exe 4284 igfxdpc32.exe 4284 igfxdpc32.exe 4284 igfxdpc32.exe 4284 igfxdpc32.exe 4284 igfxdpc32.exe 4284 igfxdpc32.exe 4284 igfxdpc32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1488 wrote to memory of 4284 1488 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 94 PID 1488 wrote to memory of 4284 1488 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 94 PID 1488 wrote to memory of 4284 1488 dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe 94 PID 4284 wrote to memory of 1040 4284 igfxdpc32.exe 97 PID 4284 wrote to memory of 1040 4284 igfxdpc32.exe 97 PID 4284 wrote to memory of 1040 4284 igfxdpc32.exe 97 PID 1040 wrote to memory of 536 1040 igfxdpc32.exe 100 PID 1040 wrote to memory of 536 1040 igfxdpc32.exe 100 PID 1040 wrote to memory of 536 1040 igfxdpc32.exe 100 PID 536 wrote to memory of 5056 536 igfxdpc32.exe 105 PID 536 wrote to memory of 5056 536 igfxdpc32.exe 105 PID 536 wrote to memory of 5056 536 igfxdpc32.exe 105 PID 5056 wrote to memory of 3272 5056 igfxdpc32.exe 106 PID 5056 wrote to memory of 3272 5056 igfxdpc32.exe 106 PID 5056 wrote to memory of 3272 5056 igfxdpc32.exe 106 PID 3272 wrote to memory of 2920 3272 igfxdpc32.exe 107 PID 3272 wrote to memory of 2920 3272 igfxdpc32.exe 107 PID 3272 wrote to memory of 2920 3272 igfxdpc32.exe 107 PID 2920 wrote to memory of 1524 2920 igfxdpc32.exe 108 PID 2920 wrote to memory of 1524 2920 igfxdpc32.exe 108 PID 2920 wrote to memory of 1524 2920 igfxdpc32.exe 108 PID 1524 wrote to memory of 2464 1524 igfxdpc32.exe 109 PID 1524 wrote to memory of 2464 1524 igfxdpc32.exe 109 PID 1524 wrote to memory of 2464 1524 igfxdpc32.exe 109 PID 2464 wrote to memory of 3764 2464 igfxdpc32.exe 111 PID 2464 wrote to memory of 3764 2464 igfxdpc32.exe 111 PID 2464 wrote to memory of 3764 2464 igfxdpc32.exe 111 PID 3764 wrote to memory of 1964 3764 igfxdpc32.exe 113 PID 3764 wrote to memory of 1964 3764 igfxdpc32.exe 113 PID 3764 wrote to memory of 1964 3764 igfxdpc32.exe 113 PID 1964 wrote to memory of 4556 1964 igfxdpc32.exe 114 PID 1964 wrote to memory of 4556 1964 igfxdpc32.exe 114 PID 1964 wrote to memory of 4556 1964 igfxdpc32.exe 114 PID 4556 wrote to memory of 232 4556 igfxdpc32.exe 115 PID 4556 wrote to memory of 232 4556 igfxdpc32.exe 115 PID 4556 wrote to memory of 232 4556 igfxdpc32.exe 115 PID 232 wrote to memory of 4016 232 igfxdpc32.exe 116 PID 232 wrote to memory of 4016 232 igfxdpc32.exe 116 PID 232 wrote to memory of 4016 232 igfxdpc32.exe 116 PID 4016 wrote to memory of 1568 4016 igfxdpc32.exe 117 PID 4016 wrote to memory of 1568 4016 igfxdpc32.exe 117 PID 4016 wrote to memory of 1568 4016 igfxdpc32.exe 117 PID 1568 wrote to memory of 4548 1568 igfxdpc32.exe 118 PID 1568 wrote to memory of 4548 1568 igfxdpc32.exe 118 PID 1568 wrote to memory of 4548 1568 igfxdpc32.exe 118 PID 4548 wrote to memory of 3600 4548 igfxdpc32.exe 119 PID 4548 wrote to memory of 3600 4548 igfxdpc32.exe 119 PID 4548 wrote to memory of 3600 4548 igfxdpc32.exe 119 PID 3600 wrote to memory of 2640 3600 igfxdpc32.exe 120 PID 3600 wrote to memory of 2640 3600 igfxdpc32.exe 120 PID 3600 wrote to memory of 2640 3600 igfxdpc32.exe 120 PID 2640 wrote to memory of 1944 2640 igfxdpc32.exe 121 PID 2640 wrote to memory of 1944 2640 igfxdpc32.exe 121 PID 2640 wrote to memory of 1944 2640 igfxdpc32.exe 121 PID 1944 wrote to memory of 3232 1944 igfxdpc32.exe 122 PID 1944 wrote to memory of 3232 1944 igfxdpc32.exe 122 PID 1944 wrote to memory of 3232 1944 igfxdpc32.exe 122 PID 3232 wrote to memory of 220 3232 igfxdpc32.exe 123 PID 3232 wrote to memory of 220 3232 igfxdpc32.exe 123 PID 3232 wrote to memory of 220 3232 igfxdpc32.exe 123 PID 220 wrote to memory of 4160 220 igfxdpc32.exe 124 PID 220 wrote to memory of 4160 220 igfxdpc32.exe 124 PID 220 wrote to memory of 4160 220 igfxdpc32.exe 124 PID 4160 wrote to memory of 1320 4160 igfxdpc32.exe 125
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dd7739debcc86b185525754bf0285d2c_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Users\Admin\AppData\Local\Temp\DD7739~1.EXE2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE3⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE5⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE7⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE9⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE11⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE13⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE15⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE17⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE19⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE21⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE23⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1320 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:812 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE25⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1228 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2648 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE27⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2976 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4016 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE29⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:624 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4548 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE31⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3068 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3104 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE33⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4496 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2104 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE35⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2464 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1400 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE37⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4884 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3244 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE39⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3932 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE40⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1940 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE41⤵
- Executes dropped EXE
- Maps connected drives based on registry
PID:4896
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4328,i,12198811467968044966,17227406646827438786,262144 --variations-seed-version --mojo-platform-channel-handle=4076 /prefetch:81⤵PID:4564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
528KB
MD5dd7739debcc86b185525754bf0285d2c
SHA1828d8bb036f952dba2b1846a239ef1e833fc5654
SHA2562b51f15f63b25db5fa9cc9bbf94fd17728a117853ff4e7889b85109365f25f5f
SHA512132c860ec79ede1ab7c971d4c960cd94e5322e69a69aceacaa06771d0d76aa260d0f068ff6870843596d1cf5fb1ae6f0b7bd7f612575111e0d46fb0320bd4b08