Analysis
-
max time kernel
149s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 14:46
Behavioral task
behavioral1
Sample
e06849df654449e1ad8f6a66bcd1a319_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
e06849df654449e1ad8f6a66bcd1a319_JaffaCakes118.exe
-
Size
673KB
-
MD5
e06849df654449e1ad8f6a66bcd1a319
-
SHA1
da1627774e55ee7fe61765c2ad70f94f3213c7d4
-
SHA256
c59971449f953bb86c6788c5d6bff183cce1c7fd74749093ce33ca20031fcb7c
-
SHA512
11f1890561786ee0b6f5029b0be991456739c70b7f4e67a0ba6d1e2eaa04210028e1f2520aa235d21f8bbb5ba39e77c9f5d100de5427299023a6d52a4afa058d
-
SSDEEP
6144:WgDby9XWrnblDonFoKj9+hKwf/E7x4QMJgzxS9:WgNqPkhKwGx4FD9
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2336 igfxpd32.exe -
Executes dropped EXE 64 IoCs
pid Process 2336 igfxpd32.exe 2836 igfxpd32.exe 2052 igfxpd32.exe 2756 igfxpd32.exe 2712 igfxpd32.exe 1000 igfxpd32.exe 2256 igfxpd32.exe 2448 igfxpd32.exe 2692 igfxpd32.exe 2920 igfxpd32.exe 1544 igfxpd32.exe 2060 igfxpd32.exe 1720 igfxpd32.exe 1504 igfxpd32.exe 940 igfxpd32.exe 2496 igfxpd32.exe 2348 igfxpd32.exe 2132 igfxpd32.exe 2004 igfxpd32.exe 1520 igfxpd32.exe 2912 igfxpd32.exe 1744 igfxpd32.exe 836 igfxpd32.exe 2820 igfxpd32.exe 2724 igfxpd32.exe 1724 igfxpd32.exe 2760 igfxpd32.exe 2596 igfxpd32.exe 2660 igfxpd32.exe 932 igfxpd32.exe 840 igfxpd32.exe 2784 igfxpd32.exe 2448 igfxpd32.exe 684 igfxpd32.exe 2804 igfxpd32.exe 1956 igfxpd32.exe 1044 igfxpd32.exe 2408 igfxpd32.exe 1940 igfxpd32.exe 1504 igfxpd32.exe 1548 igfxpd32.exe 1372 igfxpd32.exe 2148 igfxpd32.exe 2360 igfxpd32.exe 2080 igfxpd32.exe 3028 igfxpd32.exe 2524 igfxpd32.exe 1716 igfxpd32.exe 1744 igfxpd32.exe 2740 igfxpd32.exe 2876 igfxpd32.exe 2724 igfxpd32.exe 1676 igfxpd32.exe 2640 igfxpd32.exe 2504 igfxpd32.exe 2560 igfxpd32.exe 1644 igfxpd32.exe 1064 igfxpd32.exe 1560 igfxpd32.exe 2040 igfxpd32.exe 2480 igfxpd32.exe 2448 igfxpd32.exe 2692 igfxpd32.exe 1324 igfxpd32.exe -
Loads dropped DLL 64 IoCs
pid Process 2412 e06849df654449e1ad8f6a66bcd1a319_JaffaCakes118.exe 2412 e06849df654449e1ad8f6a66bcd1a319_JaffaCakes118.exe 2336 igfxpd32.exe 2336 igfxpd32.exe 2836 igfxpd32.exe 2836 igfxpd32.exe 2052 igfxpd32.exe 2052 igfxpd32.exe 2756 igfxpd32.exe 2756 igfxpd32.exe 2712 igfxpd32.exe 2712 igfxpd32.exe 1000 igfxpd32.exe 1000 igfxpd32.exe 2256 igfxpd32.exe 2256 igfxpd32.exe 2448 igfxpd32.exe 2448 igfxpd32.exe 2692 igfxpd32.exe 2692 igfxpd32.exe 2920 igfxpd32.exe 2920 igfxpd32.exe 1544 igfxpd32.exe 1544 igfxpd32.exe 2060 igfxpd32.exe 2060 igfxpd32.exe 1720 igfxpd32.exe 1720 igfxpd32.exe 1504 igfxpd32.exe 1504 igfxpd32.exe 940 igfxpd32.exe 940 igfxpd32.exe 2496 igfxpd32.exe 2496 igfxpd32.exe 2348 igfxpd32.exe 2348 igfxpd32.exe 2132 igfxpd32.exe 2132 igfxpd32.exe 2004 igfxpd32.exe 2004 igfxpd32.exe 1520 igfxpd32.exe 1520 igfxpd32.exe 2912 igfxpd32.exe 2912 igfxpd32.exe 1744 igfxpd32.exe 1744 igfxpd32.exe 836 igfxpd32.exe 836 igfxpd32.exe 2820 igfxpd32.exe 2820 igfxpd32.exe 2724 igfxpd32.exe 2724 igfxpd32.exe 1724 igfxpd32.exe 1724 igfxpd32.exe 2760 igfxpd32.exe 2760 igfxpd32.exe 2596 igfxpd32.exe 2596 igfxpd32.exe 2660 igfxpd32.exe 2660 igfxpd32.exe 932 igfxpd32.exe 932 igfxpd32.exe 840 igfxpd32.exe 840 igfxpd32.exe -
resource yara_rule behavioral1/memory/2412-0-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/files/0x000f000000012015-5.dat upx behavioral1/memory/2336-16-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/2336-22-0x0000000004A40000-0x0000000004AE9000-memory.dmp upx behavioral1/memory/2052-31-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/1000-49-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/2256-62-0x00000000034C0000-0x0000000003569000-memory.dmp upx behavioral1/memory/1544-82-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/940-109-0x0000000003440000-0x00000000034E9000-memory.dmp upx behavioral1/memory/1724-141-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/2660-148-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/840-152-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/2804-167-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/1940-179-0x0000000000400000-0x00000000004A9000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum e06849df654449e1ad8f6a66bcd1a319_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e06849df654449e1ad8f6a66bcd1a319_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2412 e06849df654449e1ad8f6a66bcd1a319_JaffaCakes118.exe 2412 e06849df654449e1ad8f6a66bcd1a319_JaffaCakes118.exe 2336 igfxpd32.exe 2336 igfxpd32.exe 2836 igfxpd32.exe 2836 igfxpd32.exe 2052 igfxpd32.exe 2052 igfxpd32.exe 2756 igfxpd32.exe 2756 igfxpd32.exe 2712 igfxpd32.exe 2712 igfxpd32.exe 1000 igfxpd32.exe 1000 igfxpd32.exe 2256 igfxpd32.exe 2256 igfxpd32.exe 2448 igfxpd32.exe 2448 igfxpd32.exe 2692 igfxpd32.exe 2692 igfxpd32.exe 2920 igfxpd32.exe 2920 igfxpd32.exe 1544 igfxpd32.exe 1544 igfxpd32.exe 2060 igfxpd32.exe 2060 igfxpd32.exe 1720 igfxpd32.exe 1720 igfxpd32.exe 1504 igfxpd32.exe 1504 igfxpd32.exe 940 igfxpd32.exe 940 igfxpd32.exe 2496 igfxpd32.exe 2496 igfxpd32.exe 2348 igfxpd32.exe 2348 igfxpd32.exe 2132 igfxpd32.exe 2132 igfxpd32.exe 2004 igfxpd32.exe 2004 igfxpd32.exe 1520 igfxpd32.exe 1520 igfxpd32.exe 2912 igfxpd32.exe 2912 igfxpd32.exe 1744 igfxpd32.exe 1744 igfxpd32.exe 836 igfxpd32.exe 836 igfxpd32.exe 2820 igfxpd32.exe 2820 igfxpd32.exe 2724 igfxpd32.exe 2724 igfxpd32.exe 1724 igfxpd32.exe 1724 igfxpd32.exe 2760 igfxpd32.exe 2760 igfxpd32.exe 2596 igfxpd32.exe 2596 igfxpd32.exe 2660 igfxpd32.exe 2660 igfxpd32.exe 932 igfxpd32.exe 932 igfxpd32.exe 840 igfxpd32.exe 840 igfxpd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2336 2412 e06849df654449e1ad8f6a66bcd1a319_JaffaCakes118.exe 29 PID 2412 wrote to memory of 2336 2412 e06849df654449e1ad8f6a66bcd1a319_JaffaCakes118.exe 29 PID 2412 wrote to memory of 2336 2412 e06849df654449e1ad8f6a66bcd1a319_JaffaCakes118.exe 29 PID 2412 wrote to memory of 2336 2412 e06849df654449e1ad8f6a66bcd1a319_JaffaCakes118.exe 29 PID 2336 wrote to memory of 2836 2336 igfxpd32.exe 30 PID 2336 wrote to memory of 2836 2336 igfxpd32.exe 30 PID 2336 wrote to memory of 2836 2336 igfxpd32.exe 30 PID 2336 wrote to memory of 2836 2336 igfxpd32.exe 30 PID 2836 wrote to memory of 2052 2836 igfxpd32.exe 31 PID 2836 wrote to memory of 2052 2836 igfxpd32.exe 31 PID 2836 wrote to memory of 2052 2836 igfxpd32.exe 31 PID 2836 wrote to memory of 2052 2836 igfxpd32.exe 31 PID 2052 wrote to memory of 2756 2052 igfxpd32.exe 32 PID 2052 wrote to memory of 2756 2052 igfxpd32.exe 32 PID 2052 wrote to memory of 2756 2052 igfxpd32.exe 32 PID 2052 wrote to memory of 2756 2052 igfxpd32.exe 32 PID 2756 wrote to memory of 2712 2756 igfxpd32.exe 33 PID 2756 wrote to memory of 2712 2756 igfxpd32.exe 33 PID 2756 wrote to memory of 2712 2756 igfxpd32.exe 33 PID 2756 wrote to memory of 2712 2756 igfxpd32.exe 33 PID 2712 wrote to memory of 1000 2712 igfxpd32.exe 34 PID 2712 wrote to memory of 1000 2712 igfxpd32.exe 34 PID 2712 wrote to memory of 1000 2712 igfxpd32.exe 34 PID 2712 wrote to memory of 1000 2712 igfxpd32.exe 34 PID 1000 wrote to memory of 2256 1000 igfxpd32.exe 35 PID 1000 wrote to memory of 2256 1000 igfxpd32.exe 35 PID 1000 wrote to memory of 2256 1000 igfxpd32.exe 35 PID 1000 wrote to memory of 2256 1000 igfxpd32.exe 35 PID 2256 wrote to memory of 2448 2256 igfxpd32.exe 36 PID 2256 wrote to memory of 2448 2256 igfxpd32.exe 36 PID 2256 wrote to memory of 2448 2256 igfxpd32.exe 36 PID 2256 wrote to memory of 2448 2256 igfxpd32.exe 36 PID 2448 wrote to memory of 2692 2448 igfxpd32.exe 37 PID 2448 wrote to memory of 2692 2448 igfxpd32.exe 37 PID 2448 wrote to memory of 2692 2448 igfxpd32.exe 37 PID 2448 wrote to memory of 2692 2448 igfxpd32.exe 37 PID 2692 wrote to memory of 2920 2692 igfxpd32.exe 38 PID 2692 wrote to memory of 2920 2692 igfxpd32.exe 38 PID 2692 wrote to memory of 2920 2692 igfxpd32.exe 38 PID 2692 wrote to memory of 2920 2692 igfxpd32.exe 38 PID 2920 wrote to memory of 1544 2920 igfxpd32.exe 39 PID 2920 wrote to memory of 1544 2920 igfxpd32.exe 39 PID 2920 wrote to memory of 1544 2920 igfxpd32.exe 39 PID 2920 wrote to memory of 1544 2920 igfxpd32.exe 39 PID 1544 wrote to memory of 2060 1544 igfxpd32.exe 40 PID 1544 wrote to memory of 2060 1544 igfxpd32.exe 40 PID 1544 wrote to memory of 2060 1544 igfxpd32.exe 40 PID 1544 wrote to memory of 2060 1544 igfxpd32.exe 40 PID 2060 wrote to memory of 1720 2060 igfxpd32.exe 41 PID 2060 wrote to memory of 1720 2060 igfxpd32.exe 41 PID 2060 wrote to memory of 1720 2060 igfxpd32.exe 41 PID 2060 wrote to memory of 1720 2060 igfxpd32.exe 41 PID 1720 wrote to memory of 1504 1720 igfxpd32.exe 42 PID 1720 wrote to memory of 1504 1720 igfxpd32.exe 42 PID 1720 wrote to memory of 1504 1720 igfxpd32.exe 42 PID 1720 wrote to memory of 1504 1720 igfxpd32.exe 42 PID 1504 wrote to memory of 940 1504 igfxpd32.exe 43 PID 1504 wrote to memory of 940 1504 igfxpd32.exe 43 PID 1504 wrote to memory of 940 1504 igfxpd32.exe 43 PID 1504 wrote to memory of 940 1504 igfxpd32.exe 43 PID 940 wrote to memory of 2496 940 igfxpd32.exe 44 PID 940 wrote to memory of 2496 940 igfxpd32.exe 44 PID 940 wrote to memory of 2496 940 igfxpd32.exe 44 PID 940 wrote to memory of 2496 940 igfxpd32.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\e06849df654449e1ad8f6a66bcd1a319_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e06849df654449e1ad8f6a66bcd1a319_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Users\Admin\AppData\Local\Temp\E06849~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2496 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2348 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2132 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2004 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:1520 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2912 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1744 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:836 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2820 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2724 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1724 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2760 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2596 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2660 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:932 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:840 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2784 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2448 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:684 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2804 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1956 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1044 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2408 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1940 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1504 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1548 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1372 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2148 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2360 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2080 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3028 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe48⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
PID:2524 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe49⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1716 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe50⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1744 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe51⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2740 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe52⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2876 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe53⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2724 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe54⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1676 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe55⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2640 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe56⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2504 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe57⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2560 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe58⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1644 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe59⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1064 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe60⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1560 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe61⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2040 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe62⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2480 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe63⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2448 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2692 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe65⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1324 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe66⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2252 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe67⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1768 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe68⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2860 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe69⤵
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2244
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
673KB
MD5e06849df654449e1ad8f6a66bcd1a319
SHA1da1627774e55ee7fe61765c2ad70f94f3213c7d4
SHA256c59971449f953bb86c6788c5d6bff183cce1c7fd74749093ce33ca20031fcb7c
SHA51211f1890561786ee0b6f5029b0be991456739c70b7f4e67a0ba6d1e2eaa04210028e1f2520aa235d21f8bbb5ba39e77c9f5d100de5427299023a6d52a4afa058d