Analysis
-
max time kernel
148s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-09-2024 16:20
Behavioral task
behavioral1
Sample
e525b065c1597c8cea805c4b6d47ba0c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e525b065c1597c8cea805c4b6d47ba0c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e525b065c1597c8cea805c4b6d47ba0c_JaffaCakes118.exe
-
Size
125KB
-
MD5
e525b065c1597c8cea805c4b6d47ba0c
-
SHA1
6532616d43504ad8024e6413372d24f47a07014e
-
SHA256
8bf34df617821470cb2041374eb5933a38d6a46c1880d611e153f2e422b3eeac
-
SHA512
6e6ebc889eccbe0008cec85a445f2fc20668185264fe26224b6d85bde278f5dc19f2cc1a38df0bd1a86f7b3d1ec2cc6dc9f4cff0456fc2fc67094b2e7450cd3d
-
SSDEEP
3072:XrFVrY0G5DycvwgTjo9oYkOU0XIj9xGX8/oJcdOx4byqout:70FwguRXJXeI0WqoS
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2392 igfxsk32.exe -
Executes dropped EXE 64 IoCs
pid Process 2392 igfxsk32.exe 2812 igfxsk32.exe 2968 igfxsk32.exe 2908 igfxsk32.exe 2116 igfxsk32.exe 540 igfxsk32.exe 296 igfxsk32.exe 692 igfxsk32.exe 1100 igfxsk32.exe 1952 igfxsk32.exe 2052 igfxsk32.exe 2252 igfxsk32.exe 1180 igfxsk32.exe 1968 igfxsk32.exe 2424 igfxsk32.exe 2184 igfxsk32.exe 344 igfxsk32.exe 992 igfxsk32.exe 2396 igfxsk32.exe 1620 igfxsk32.exe 2084 igfxsk32.exe 2840 igfxsk32.exe 2820 igfxsk32.exe 2764 igfxsk32.exe 2872 igfxsk32.exe 2656 igfxsk32.exe 668 igfxsk32.exe 2136 igfxsk32.exe 2796 igfxsk32.exe 1056 igfxsk32.exe 1696 igfxsk32.exe 1828 igfxsk32.exe 1744 igfxsk32.exe 1708 igfxsk32.exe 348 igfxsk32.exe 1464 igfxsk32.exe 784 igfxsk32.exe 2112 igfxsk32.exe 1908 igfxsk32.exe 2424 igfxsk32.exe 1780 igfxsk32.exe 1928 igfxsk32.exe 2528 igfxsk32.exe 1640 igfxsk32.exe 2028 igfxsk32.exe 2828 igfxsk32.exe 2420 igfxsk32.exe 2760 igfxsk32.exe 2884 igfxsk32.exe 2356 igfxsk32.exe 2328 igfxsk32.exe 1404 igfxsk32.exe 540 igfxsk32.exe 592 igfxsk32.exe 2100 igfxsk32.exe 572 igfxsk32.exe 2072 igfxsk32.exe 2436 igfxsk32.exe 2080 igfxsk32.exe 2168 igfxsk32.exe 2016 igfxsk32.exe 1772 igfxsk32.exe 2784 igfxsk32.exe 1216 igfxsk32.exe -
Loads dropped DLL 64 IoCs
pid Process 2348 e525b065c1597c8cea805c4b6d47ba0c_JaffaCakes118.exe 2348 e525b065c1597c8cea805c4b6d47ba0c_JaffaCakes118.exe 2392 igfxsk32.exe 2392 igfxsk32.exe 2812 igfxsk32.exe 2812 igfxsk32.exe 2968 igfxsk32.exe 2968 igfxsk32.exe 2908 igfxsk32.exe 2908 igfxsk32.exe 2116 igfxsk32.exe 2116 igfxsk32.exe 540 igfxsk32.exe 540 igfxsk32.exe 296 igfxsk32.exe 296 igfxsk32.exe 692 igfxsk32.exe 692 igfxsk32.exe 1100 igfxsk32.exe 1100 igfxsk32.exe 1952 igfxsk32.exe 1952 igfxsk32.exe 2052 igfxsk32.exe 2052 igfxsk32.exe 2252 igfxsk32.exe 2252 igfxsk32.exe 1180 igfxsk32.exe 1180 igfxsk32.exe 1968 igfxsk32.exe 1968 igfxsk32.exe 2424 igfxsk32.exe 2424 igfxsk32.exe 2184 igfxsk32.exe 2184 igfxsk32.exe 344 igfxsk32.exe 344 igfxsk32.exe 992 igfxsk32.exe 992 igfxsk32.exe 2396 igfxsk32.exe 2396 igfxsk32.exe 1620 igfxsk32.exe 1620 igfxsk32.exe 2084 igfxsk32.exe 2084 igfxsk32.exe 2840 igfxsk32.exe 2840 igfxsk32.exe 2820 igfxsk32.exe 2820 igfxsk32.exe 2764 igfxsk32.exe 2764 igfxsk32.exe 2872 igfxsk32.exe 2872 igfxsk32.exe 2656 igfxsk32.exe 2656 igfxsk32.exe 668 igfxsk32.exe 668 igfxsk32.exe 2136 igfxsk32.exe 2136 igfxsk32.exe 2796 igfxsk32.exe 2796 igfxsk32.exe 1056 igfxsk32.exe 1056 igfxsk32.exe 1696 igfxsk32.exe 1696 igfxsk32.exe -
resource yara_rule behavioral1/memory/2348-0-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/files/0x000a00000001202a-10.dat upx behavioral1/memory/2392-12-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2348-14-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2812-20-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2392-22-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2968-29-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2812-28-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2968-34-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2908-41-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2116-43-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2116-48-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/540-49-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/296-55-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/540-54-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/296-61-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1100-67-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/692-66-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1952-74-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1100-73-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2052-80-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1952-79-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2052-86-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2252-88-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2252-94-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1180-95-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1180-102-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2424-110-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1968-109-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2424-115-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2184-123-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/992-130-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/344-132-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/992-136-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2396-137-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2396-139-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1620-141-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2840-144-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2084-143-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2840-147-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2820-145-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2764-148-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2820-150-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2764-153-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2764-151-0x0000000003240000-0x00000000032A6000-memory.dmp upx behavioral1/memory/2872-154-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/668-157-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2656-156-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2872-158-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/668-160-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2136-162-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2656-163-0x00000000032E0000-0x0000000003346000-memory.dmp upx behavioral1/memory/2796-164-0x0000000003240000-0x00000000032A6000-memory.dmp upx behavioral1/memory/2796-166-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1056-169-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1696-173-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1828-175-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1744-176-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1744-178-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1708-179-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1708-181-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/348-184-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1464-187-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/784-185-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\ igfxsk32.exe File opened for modification C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\ igfxsk32.exe File opened for modification C:\Windows\SysWOW64\ igfxsk32.exe File opened for modification C:\Windows\SysWOW64\ igfxsk32.exe File opened for modification C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\ igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe e525b065c1597c8cea805c4b6d47ba0c_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\ igfxsk32.exe File opened for modification C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\ igfxsk32.exe File opened for modification C:\Windows\SysWOW64\ igfxsk32.exe File opened for modification C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\ igfxsk32.exe File opened for modification C:\Windows\SysWOW64\ igfxsk32.exe File opened for modification C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\ igfxsk32.exe File opened for modification C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\ igfxsk32.exe File opened for modification C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\ igfxsk32.exe File opened for modification C:\Windows\SysWOW64\ igfxsk32.exe File opened for modification C:\Windows\SysWOW64\ igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\ igfxsk32.exe File opened for modification C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\ e525b065c1597c8cea805c4b6d47ba0c_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\ igfxsk32.exe File opened for modification C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\ igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\ igfxsk32.exe File opened for modification C:\Windows\SysWOW64\ igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e525b065c1597c8cea805c4b6d47ba0c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2348 e525b065c1597c8cea805c4b6d47ba0c_JaffaCakes118.exe 2348 e525b065c1597c8cea805c4b6d47ba0c_JaffaCakes118.exe 2392 igfxsk32.exe 2392 igfxsk32.exe 2812 igfxsk32.exe 2812 igfxsk32.exe 2968 igfxsk32.exe 2968 igfxsk32.exe 2908 igfxsk32.exe 2908 igfxsk32.exe 2116 igfxsk32.exe 2116 igfxsk32.exe 540 igfxsk32.exe 540 igfxsk32.exe 296 igfxsk32.exe 296 igfxsk32.exe 692 igfxsk32.exe 692 igfxsk32.exe 1100 igfxsk32.exe 1100 igfxsk32.exe 1952 igfxsk32.exe 1952 igfxsk32.exe 2052 igfxsk32.exe 2052 igfxsk32.exe 2252 igfxsk32.exe 2252 igfxsk32.exe 1180 igfxsk32.exe 1180 igfxsk32.exe 1968 igfxsk32.exe 1968 igfxsk32.exe 2424 igfxsk32.exe 2424 igfxsk32.exe 2184 igfxsk32.exe 2184 igfxsk32.exe 344 igfxsk32.exe 344 igfxsk32.exe 992 igfxsk32.exe 992 igfxsk32.exe 2396 igfxsk32.exe 2396 igfxsk32.exe 1620 igfxsk32.exe 1620 igfxsk32.exe 2084 igfxsk32.exe 2084 igfxsk32.exe 2840 igfxsk32.exe 2840 igfxsk32.exe 2820 igfxsk32.exe 2820 igfxsk32.exe 2764 igfxsk32.exe 2764 igfxsk32.exe 2872 igfxsk32.exe 2872 igfxsk32.exe 2656 igfxsk32.exe 2656 igfxsk32.exe 668 igfxsk32.exe 668 igfxsk32.exe 2136 igfxsk32.exe 2136 igfxsk32.exe 2796 igfxsk32.exe 2796 igfxsk32.exe 1056 igfxsk32.exe 1056 igfxsk32.exe 1696 igfxsk32.exe 1696 igfxsk32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2392 2348 e525b065c1597c8cea805c4b6d47ba0c_JaffaCakes118.exe 30 PID 2348 wrote to memory of 2392 2348 e525b065c1597c8cea805c4b6d47ba0c_JaffaCakes118.exe 30 PID 2348 wrote to memory of 2392 2348 e525b065c1597c8cea805c4b6d47ba0c_JaffaCakes118.exe 30 PID 2348 wrote to memory of 2392 2348 e525b065c1597c8cea805c4b6d47ba0c_JaffaCakes118.exe 30 PID 2392 wrote to memory of 2812 2392 igfxsk32.exe 31 PID 2392 wrote to memory of 2812 2392 igfxsk32.exe 31 PID 2392 wrote to memory of 2812 2392 igfxsk32.exe 31 PID 2392 wrote to memory of 2812 2392 igfxsk32.exe 31 PID 2812 wrote to memory of 2968 2812 igfxsk32.exe 32 PID 2812 wrote to memory of 2968 2812 igfxsk32.exe 32 PID 2812 wrote to memory of 2968 2812 igfxsk32.exe 32 PID 2812 wrote to memory of 2968 2812 igfxsk32.exe 32 PID 2968 wrote to memory of 2908 2968 igfxsk32.exe 33 PID 2968 wrote to memory of 2908 2968 igfxsk32.exe 33 PID 2968 wrote to memory of 2908 2968 igfxsk32.exe 33 PID 2968 wrote to memory of 2908 2968 igfxsk32.exe 33 PID 2908 wrote to memory of 2116 2908 igfxsk32.exe 35 PID 2908 wrote to memory of 2116 2908 igfxsk32.exe 35 PID 2908 wrote to memory of 2116 2908 igfxsk32.exe 35 PID 2908 wrote to memory of 2116 2908 igfxsk32.exe 35 PID 2116 wrote to memory of 540 2116 igfxsk32.exe 36 PID 2116 wrote to memory of 540 2116 igfxsk32.exe 36 PID 2116 wrote to memory of 540 2116 igfxsk32.exe 36 PID 2116 wrote to memory of 540 2116 igfxsk32.exe 36 PID 540 wrote to memory of 296 540 igfxsk32.exe 37 PID 540 wrote to memory of 296 540 igfxsk32.exe 37 PID 540 wrote to memory of 296 540 igfxsk32.exe 37 PID 540 wrote to memory of 296 540 igfxsk32.exe 37 PID 296 wrote to memory of 692 296 igfxsk32.exe 38 PID 296 wrote to memory of 692 296 igfxsk32.exe 38 PID 296 wrote to memory of 692 296 igfxsk32.exe 38 PID 296 wrote to memory of 692 296 igfxsk32.exe 38 PID 692 wrote to memory of 1100 692 igfxsk32.exe 39 PID 692 wrote to memory of 1100 692 igfxsk32.exe 39 PID 692 wrote to memory of 1100 692 igfxsk32.exe 39 PID 692 wrote to memory of 1100 692 igfxsk32.exe 39 PID 1100 wrote to memory of 1952 1100 igfxsk32.exe 40 PID 1100 wrote to memory of 1952 1100 igfxsk32.exe 40 PID 1100 wrote to memory of 1952 1100 igfxsk32.exe 40 PID 1100 wrote to memory of 1952 1100 igfxsk32.exe 40 PID 1952 wrote to memory of 2052 1952 igfxsk32.exe 41 PID 1952 wrote to memory of 2052 1952 igfxsk32.exe 41 PID 1952 wrote to memory of 2052 1952 igfxsk32.exe 41 PID 1952 wrote to memory of 2052 1952 igfxsk32.exe 41 PID 2052 wrote to memory of 2252 2052 igfxsk32.exe 42 PID 2052 wrote to memory of 2252 2052 igfxsk32.exe 42 PID 2052 wrote to memory of 2252 2052 igfxsk32.exe 42 PID 2052 wrote to memory of 2252 2052 igfxsk32.exe 42 PID 2252 wrote to memory of 1180 2252 igfxsk32.exe 43 PID 2252 wrote to memory of 1180 2252 igfxsk32.exe 43 PID 2252 wrote to memory of 1180 2252 igfxsk32.exe 43 PID 2252 wrote to memory of 1180 2252 igfxsk32.exe 43 PID 1180 wrote to memory of 1968 1180 igfxsk32.exe 44 PID 1180 wrote to memory of 1968 1180 igfxsk32.exe 44 PID 1180 wrote to memory of 1968 1180 igfxsk32.exe 44 PID 1180 wrote to memory of 1968 1180 igfxsk32.exe 44 PID 1968 wrote to memory of 2424 1968 igfxsk32.exe 45 PID 1968 wrote to memory of 2424 1968 igfxsk32.exe 45 PID 1968 wrote to memory of 2424 1968 igfxsk32.exe 45 PID 1968 wrote to memory of 2424 1968 igfxsk32.exe 45 PID 2424 wrote to memory of 2184 2424 igfxsk32.exe 46 PID 2424 wrote to memory of 2184 2424 igfxsk32.exe 46 PID 2424 wrote to memory of 2184 2424 igfxsk32.exe 46 PID 2424 wrote to memory of 2184 2424 igfxsk32.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\e525b065c1597c8cea805c4b6d47ba0c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e525b065c1597c8cea805c4b6d47ba0c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Users\Admin\AppData\Local\Temp\E525B0~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:296 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2184 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:344 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:992 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2396 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1620 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2084 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2840 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2820 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2764 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2872 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2656 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:668 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2136 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2796 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1056 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1696 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1828 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1744 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1708 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:348 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1464 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:784 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2112 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1908 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2424 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1780 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1928 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2528 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1640 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2028 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe47⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2828 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe48⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2420 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2760 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe50⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2884 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe51⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
PID:2356 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe52⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2328 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1404 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe54⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:540 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe55⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:592 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe56⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2100 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe57⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:572 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe58⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2072 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe59⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2436 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe60⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2080 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe61⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
PID:2168 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe62⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2016 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe63⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1772 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2784 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe65⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1216 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe66⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1968 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe67⤵
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2144 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe68⤵
- System Location Discovery: System Language Discovery
PID:2184 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe69⤵
- Maps connected drives based on registry
PID:2148
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
125KB
MD5e525b065c1597c8cea805c4b6d47ba0c
SHA16532616d43504ad8024e6413372d24f47a07014e
SHA2568bf34df617821470cb2041374eb5933a38d6a46c1880d611e153f2e422b3eeac
SHA5126e6ebc889eccbe0008cec85a445f2fc20668185264fe26224b6d85bde278f5dc19f2cc1a38df0bd1a86f7b3d1ec2cc6dc9f4cff0456fc2fc67094b2e7450cd3d