Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 13:18
Static task
static1
Behavioral task
behavioral1
Sample
e292013659dfe912e09b363391f6ff4f_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e292013659dfe912e09b363391f6ff4f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e292013659dfe912e09b363391f6ff4f_JaffaCakes118.exe
-
Size
319KB
-
MD5
e292013659dfe912e09b363391f6ff4f
-
SHA1
b122e028455dda9b532fa54b59b64fa6a4ac0fa0
-
SHA256
3dcd13dcc17390d33b0b323eacf586523fda662a8f19f20b68a49702f3461640
-
SHA512
ed72b69c23b8ac9815f5776d2f086ed6b54529583ae1eb7c86b0aeac134f660b46b10c8a6f26dc3dd6a623b19cbba8a63b5b79b7e5be34591c70d024fb058e22
-
SSDEEP
6144:NT6GAxmPR9rgWa1/HBXx7IXSjw5+Q9qeVfxq4LcpOtReboZ:NtzVdW/Bh7ysw+Q9qe/vU4ebK
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2772 igfxdp32.exe -
Executes dropped EXE 64 IoCs
pid Process 2772 igfxdp32.exe 2748 igfxdp32.exe 2592 igfxdp32.exe 2360 igfxdp32.exe 1844 igfxdp32.exe 2208 igfxdp32.exe 2460 igfxdp32.exe 2840 igfxdp32.exe 448 igfxdp32.exe 2940 igfxdp32.exe 576 igfxdp32.exe 324 igfxdp32.exe 344 igfxdp32.exe 2008 igfxdp32.exe 1012 igfxdp32.exe 1088 igfxdp32.exe 1396 igfxdp32.exe 2104 igfxdp32.exe 2272 igfxdp32.exe 2196 igfxdp32.exe 1656 igfxdp32.exe 1672 igfxdp32.exe 2120 igfxdp32.exe 872 igfxdp32.exe 2188 igfxdp32.exe 3004 igfxdp32.exe 2636 igfxdp32.exe 1572 igfxdp32.exe 2512 igfxdp32.exe 3064 igfxdp32.exe 1884 igfxdp32.exe 568 igfxdp32.exe 1728 igfxdp32.exe 804 igfxdp32.exe 2124 igfxdp32.exe 332 igfxdp32.exe 536 igfxdp32.exe 1524 igfxdp32.exe 884 igfxdp32.exe 2356 igfxdp32.exe 2368 igfxdp32.exe 924 igfxdp32.exe 824 igfxdp32.exe 1700 igfxdp32.exe 1620 igfxdp32.exe 1852 igfxdp32.exe 920 igfxdp32.exe 988 igfxdp32.exe 2428 igfxdp32.exe 1656 igfxdp32.exe 1492 igfxdp32.exe 2692 igfxdp32.exe 2856 igfxdp32.exe 2936 igfxdp32.exe 2868 igfxdp32.exe 1228 igfxdp32.exe 2408 igfxdp32.exe 1844 igfxdp32.exe 2240 igfxdp32.exe 1868 igfxdp32.exe 1520 igfxdp32.exe 2864 igfxdp32.exe 2316 igfxdp32.exe 1200 igfxdp32.exe -
Loads dropped DLL 64 IoCs
pid Process 2904 e292013659dfe912e09b363391f6ff4f_JaffaCakes118.exe 2904 e292013659dfe912e09b363391f6ff4f_JaffaCakes118.exe 2772 igfxdp32.exe 2772 igfxdp32.exe 2748 igfxdp32.exe 2748 igfxdp32.exe 2592 igfxdp32.exe 2592 igfxdp32.exe 2360 igfxdp32.exe 2360 igfxdp32.exe 1844 igfxdp32.exe 1844 igfxdp32.exe 2208 igfxdp32.exe 2208 igfxdp32.exe 2460 igfxdp32.exe 2460 igfxdp32.exe 2840 igfxdp32.exe 2840 igfxdp32.exe 448 igfxdp32.exe 448 igfxdp32.exe 2940 igfxdp32.exe 2940 igfxdp32.exe 576 igfxdp32.exe 576 igfxdp32.exe 324 igfxdp32.exe 324 igfxdp32.exe 344 igfxdp32.exe 344 igfxdp32.exe 2008 igfxdp32.exe 2008 igfxdp32.exe 1012 igfxdp32.exe 1012 igfxdp32.exe 1088 igfxdp32.exe 1088 igfxdp32.exe 1396 igfxdp32.exe 1396 igfxdp32.exe 2104 igfxdp32.exe 2104 igfxdp32.exe 2272 igfxdp32.exe 2272 igfxdp32.exe 2196 igfxdp32.exe 2196 igfxdp32.exe 1656 igfxdp32.exe 1656 igfxdp32.exe 1672 igfxdp32.exe 1672 igfxdp32.exe 2120 igfxdp32.exe 2120 igfxdp32.exe 872 igfxdp32.exe 872 igfxdp32.exe 2188 igfxdp32.exe 2188 igfxdp32.exe 3004 igfxdp32.exe 3004 igfxdp32.exe 2636 igfxdp32.exe 2636 igfxdp32.exe 1572 igfxdp32.exe 1572 igfxdp32.exe 2512 igfxdp32.exe 2512 igfxdp32.exe 3064 igfxdp32.exe 3064 igfxdp32.exe 1884 igfxdp32.exe 1884 igfxdp32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum e292013659dfe912e09b363391f6ff4f_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 e292013659dfe912e09b363391f6ff4f_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe e292013659dfe912e09b363391f6ff4f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe e292013659dfe912e09b363391f6ff4f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e292013659dfe912e09b363391f6ff4f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2904 e292013659dfe912e09b363391f6ff4f_JaffaCakes118.exe 2904 e292013659dfe912e09b363391f6ff4f_JaffaCakes118.exe 2772 igfxdp32.exe 2772 igfxdp32.exe 2748 igfxdp32.exe 2748 igfxdp32.exe 2592 igfxdp32.exe 2592 igfxdp32.exe 2360 igfxdp32.exe 2360 igfxdp32.exe 1844 igfxdp32.exe 1844 igfxdp32.exe 2208 igfxdp32.exe 2208 igfxdp32.exe 2460 igfxdp32.exe 2460 igfxdp32.exe 2840 igfxdp32.exe 2840 igfxdp32.exe 448 igfxdp32.exe 448 igfxdp32.exe 2940 igfxdp32.exe 2940 igfxdp32.exe 576 igfxdp32.exe 576 igfxdp32.exe 324 igfxdp32.exe 324 igfxdp32.exe 344 igfxdp32.exe 344 igfxdp32.exe 2008 igfxdp32.exe 2008 igfxdp32.exe 1012 igfxdp32.exe 1012 igfxdp32.exe 1088 igfxdp32.exe 1088 igfxdp32.exe 1396 igfxdp32.exe 1396 igfxdp32.exe 2104 igfxdp32.exe 2104 igfxdp32.exe 2272 igfxdp32.exe 2272 igfxdp32.exe 2196 igfxdp32.exe 2196 igfxdp32.exe 1656 igfxdp32.exe 1656 igfxdp32.exe 1672 igfxdp32.exe 1672 igfxdp32.exe 2120 igfxdp32.exe 2120 igfxdp32.exe 872 igfxdp32.exe 872 igfxdp32.exe 2188 igfxdp32.exe 2188 igfxdp32.exe 3004 igfxdp32.exe 3004 igfxdp32.exe 2636 igfxdp32.exe 2636 igfxdp32.exe 1572 igfxdp32.exe 1572 igfxdp32.exe 2512 igfxdp32.exe 2512 igfxdp32.exe 3064 igfxdp32.exe 3064 igfxdp32.exe 1884 igfxdp32.exe 1884 igfxdp32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2772 2904 e292013659dfe912e09b363391f6ff4f_JaffaCakes118.exe 30 PID 2904 wrote to memory of 2772 2904 e292013659dfe912e09b363391f6ff4f_JaffaCakes118.exe 30 PID 2904 wrote to memory of 2772 2904 e292013659dfe912e09b363391f6ff4f_JaffaCakes118.exe 30 PID 2904 wrote to memory of 2772 2904 e292013659dfe912e09b363391f6ff4f_JaffaCakes118.exe 30 PID 2772 wrote to memory of 2748 2772 igfxdp32.exe 31 PID 2772 wrote to memory of 2748 2772 igfxdp32.exe 31 PID 2772 wrote to memory of 2748 2772 igfxdp32.exe 31 PID 2772 wrote to memory of 2748 2772 igfxdp32.exe 31 PID 2748 wrote to memory of 2592 2748 igfxdp32.exe 32 PID 2748 wrote to memory of 2592 2748 igfxdp32.exe 32 PID 2748 wrote to memory of 2592 2748 igfxdp32.exe 32 PID 2748 wrote to memory of 2592 2748 igfxdp32.exe 32 PID 2592 wrote to memory of 2360 2592 igfxdp32.exe 33 PID 2592 wrote to memory of 2360 2592 igfxdp32.exe 33 PID 2592 wrote to memory of 2360 2592 igfxdp32.exe 33 PID 2592 wrote to memory of 2360 2592 igfxdp32.exe 33 PID 2360 wrote to memory of 1844 2360 igfxdp32.exe 34 PID 2360 wrote to memory of 1844 2360 igfxdp32.exe 34 PID 2360 wrote to memory of 1844 2360 igfxdp32.exe 34 PID 2360 wrote to memory of 1844 2360 igfxdp32.exe 34 PID 1844 wrote to memory of 2208 1844 igfxdp32.exe 35 PID 1844 wrote to memory of 2208 1844 igfxdp32.exe 35 PID 1844 wrote to memory of 2208 1844 igfxdp32.exe 35 PID 1844 wrote to memory of 2208 1844 igfxdp32.exe 35 PID 2208 wrote to memory of 2460 2208 igfxdp32.exe 36 PID 2208 wrote to memory of 2460 2208 igfxdp32.exe 36 PID 2208 wrote to memory of 2460 2208 igfxdp32.exe 36 PID 2208 wrote to memory of 2460 2208 igfxdp32.exe 36 PID 2460 wrote to memory of 2840 2460 igfxdp32.exe 37 PID 2460 wrote to memory of 2840 2460 igfxdp32.exe 37 PID 2460 wrote to memory of 2840 2460 igfxdp32.exe 37 PID 2460 wrote to memory of 2840 2460 igfxdp32.exe 37 PID 2840 wrote to memory of 448 2840 igfxdp32.exe 38 PID 2840 wrote to memory of 448 2840 igfxdp32.exe 38 PID 2840 wrote to memory of 448 2840 igfxdp32.exe 38 PID 2840 wrote to memory of 448 2840 igfxdp32.exe 38 PID 448 wrote to memory of 2940 448 igfxdp32.exe 39 PID 448 wrote to memory of 2940 448 igfxdp32.exe 39 PID 448 wrote to memory of 2940 448 igfxdp32.exe 39 PID 448 wrote to memory of 2940 448 igfxdp32.exe 39 PID 2940 wrote to memory of 576 2940 igfxdp32.exe 40 PID 2940 wrote to memory of 576 2940 igfxdp32.exe 40 PID 2940 wrote to memory of 576 2940 igfxdp32.exe 40 PID 2940 wrote to memory of 576 2940 igfxdp32.exe 40 PID 576 wrote to memory of 324 576 igfxdp32.exe 41 PID 576 wrote to memory of 324 576 igfxdp32.exe 41 PID 576 wrote to memory of 324 576 igfxdp32.exe 41 PID 576 wrote to memory of 324 576 igfxdp32.exe 41 PID 324 wrote to memory of 344 324 igfxdp32.exe 42 PID 324 wrote to memory of 344 324 igfxdp32.exe 42 PID 324 wrote to memory of 344 324 igfxdp32.exe 42 PID 324 wrote to memory of 344 324 igfxdp32.exe 42 PID 344 wrote to memory of 2008 344 igfxdp32.exe 43 PID 344 wrote to memory of 2008 344 igfxdp32.exe 43 PID 344 wrote to memory of 2008 344 igfxdp32.exe 43 PID 344 wrote to memory of 2008 344 igfxdp32.exe 43 PID 2008 wrote to memory of 1012 2008 igfxdp32.exe 44 PID 2008 wrote to memory of 1012 2008 igfxdp32.exe 44 PID 2008 wrote to memory of 1012 2008 igfxdp32.exe 44 PID 2008 wrote to memory of 1012 2008 igfxdp32.exe 44 PID 1012 wrote to memory of 1088 1012 igfxdp32.exe 45 PID 1012 wrote to memory of 1088 1012 igfxdp32.exe 45 PID 1012 wrote to memory of 1088 1012 igfxdp32.exe 45 PID 1012 wrote to memory of 1088 1012 igfxdp32.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\e292013659dfe912e09b363391f6ff4f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e292013659dfe912e09b363391f6ff4f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Users\Admin\AppData\Local\Temp\E29201~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1088 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1396 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2104 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2272 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2196 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1656 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:1672 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2120 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:872 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2188 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3004 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2636 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1572 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2512 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3064 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1884 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:568 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1728 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:804 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2124 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:332 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:536 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1524 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:884 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2356 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2368 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:924 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:824 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1700 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1620 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe47⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1852 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe48⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:920 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe49⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:988 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe50⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2428 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1656 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe52⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1492 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2692 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2856 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe55⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2936 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe56⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2868 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe57⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1228 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe58⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2408 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe59⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1844 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe60⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2240 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe61⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1868 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe62⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1520 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe63⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2864 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe64⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
PID:2316 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe65⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1200 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe66⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2140 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe67⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2084 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe68⤵
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1648
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
319KB
MD5e292013659dfe912e09b363391f6ff4f
SHA1b122e028455dda9b532fa54b59b64fa6a4ac0fa0
SHA2563dcd13dcc17390d33b0b323eacf586523fda662a8f19f20b68a49702f3461640
SHA512ed72b69c23b8ac9815f5776d2f086ed6b54529583ae1eb7c86b0aeac134f660b46b10c8a6f26dc3dd6a623b19cbba8a63b5b79b7e5be34591c70d024fb058e22