Analysis
-
max time kernel
149s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16-09-2024 16:20
Behavioral task
behavioral1
Sample
e525b065c1597c8cea805c4b6d47ba0c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e525b065c1597c8cea805c4b6d47ba0c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e525b065c1597c8cea805c4b6d47ba0c_JaffaCakes118.exe
-
Size
125KB
-
MD5
e525b065c1597c8cea805c4b6d47ba0c
-
SHA1
6532616d43504ad8024e6413372d24f47a07014e
-
SHA256
8bf34df617821470cb2041374eb5933a38d6a46c1880d611e153f2e422b3eeac
-
SHA512
6e6ebc889eccbe0008cec85a445f2fc20668185264fe26224b6d85bde278f5dc19f2cc1a38df0bd1a86f7b3d1ec2cc6dc9f4cff0456fc2fc67094b2e7450cd3d
-
SSDEEP
3072:XrFVrY0G5DycvwgTjo9oYkOU0XIj9xGX8/oJcdOx4byqout:70FwguRXJXeI0WqoS
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings 2 TTPs 60 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation e525b065c1597c8cea805c4b6d47ba0c_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation igfxsk32.exe -
Deletes itself 1 IoCs
pid Process 2136 igfxsk32.exe -
Executes dropped EXE 60 IoCs
pid Process 2136 igfxsk32.exe 2868 igfxsk32.exe 3424 igfxsk32.exe 4044 igfxsk32.exe 4268 igfxsk32.exe 2540 igfxsk32.exe 4364 igfxsk32.exe 4388 igfxsk32.exe 3652 igfxsk32.exe 5096 igfxsk32.exe 4240 igfxsk32.exe 400 igfxsk32.exe 3504 igfxsk32.exe 4012 igfxsk32.exe 2700 igfxsk32.exe 5056 igfxsk32.exe 4608 igfxsk32.exe 4916 igfxsk32.exe 4372 igfxsk32.exe 1664 igfxsk32.exe 1560 igfxsk32.exe 2888 igfxsk32.exe 4552 igfxsk32.exe 2124 igfxsk32.exe 4180 igfxsk32.exe 2744 igfxsk32.exe 3900 igfxsk32.exe 4212 igfxsk32.exe 2624 igfxsk32.exe 4280 igfxsk32.exe 5032 igfxsk32.exe 4956 igfxsk32.exe 3444 igfxsk32.exe 2148 igfxsk32.exe 4880 igfxsk32.exe 3360 igfxsk32.exe 4612 igfxsk32.exe 1396 igfxsk32.exe 3112 igfxsk32.exe 3548 igfxsk32.exe 1732 igfxsk32.exe 4004 igfxsk32.exe 3384 igfxsk32.exe 3320 igfxsk32.exe 4032 igfxsk32.exe 3896 igfxsk32.exe 808 igfxsk32.exe 3468 igfxsk32.exe 2224 igfxsk32.exe 2776 igfxsk32.exe 2240 igfxsk32.exe 4180 igfxsk32.exe 540 igfxsk32.exe 1516 igfxsk32.exe 1624 igfxsk32.exe 2516 igfxsk32.exe 1572 igfxsk32.exe 3696 igfxsk32.exe 732 igfxsk32.exe 2840 igfxsk32.exe -
resource yara_rule behavioral2/memory/2160-0-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/files/0x00080000000233f7-5.dat upx behavioral2/memory/2160-35-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2136-38-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2868-42-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3424-45-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4044-49-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4268-47-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4268-53-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2540-56-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4364-59-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4388-62-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3652-65-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/5096-68-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/400-71-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4240-73-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/400-76-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3504-79-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4012-82-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2700-85-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/5056-88-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4608-91-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4916-94-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4372-97-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1664-100-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1560-104-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2888-107-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4552-111-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2124-114-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4180-117-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2744-120-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3900-123-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4212-127-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2624-130-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4280-133-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/5032-136-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4956-139-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3444-142-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2148-145-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4880-147-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3360-149-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4612-151-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3112-152-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1396-154-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3548-155-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3112-157-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1732-158-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3548-160-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1732-162-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4004-164-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3384-165-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3320-167-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4032-169-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3896-171-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/808-173-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3468-174-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2224-176-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2776-178-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2240-180-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4180-182-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/540-184-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1516-186-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1624-188-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2516-190-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 e525b065c1597c8cea805c4b6d47ba0c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum e525b065c1597c8cea805c4b6d47ba0c_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxsk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxsk32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ igfxsk32.exe File opened for modification C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\ igfxsk32.exe File opened for modification C:\Windows\SysWOW64\ igfxsk32.exe File opened for modification C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe e525b065c1597c8cea805c4b6d47ba0c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\ igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\ igfxsk32.exe File opened for modification C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\ igfxsk32.exe File opened for modification C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\ igfxsk32.exe File opened for modification C:\Windows\SysWOW64\ igfxsk32.exe File opened for modification C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\ igfxsk32.exe File opened for modification C:\Windows\SysWOW64\ igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\ igfxsk32.exe File opened for modification C:\Windows\SysWOW64\ igfxsk32.exe File opened for modification C:\Windows\SysWOW64\ igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\ igfxsk32.exe File opened for modification C:\Windows\SysWOW64\ igfxsk32.exe File opened for modification C:\Windows\SysWOW64\ igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\ igfxsk32.exe File opened for modification C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\ igfxsk32.exe File opened for modification C:\Windows\SysWOW64\ igfxsk32.exe File opened for modification C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File created C:\Windows\SysWOW64\igfxsk32.exe igfxsk32.exe File opened for modification C:\Windows\SysWOW64\ igfxsk32.exe File opened for modification C:\Windows\SysWOW64\ igfxsk32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 60 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e525b065c1597c8cea805c4b6d47ba0c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxsk32.exe -
Modifies registry class 60 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ e525b065c1597c8cea805c4b6d47ba0c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxsk32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2160 e525b065c1597c8cea805c4b6d47ba0c_JaffaCakes118.exe 2160 e525b065c1597c8cea805c4b6d47ba0c_JaffaCakes118.exe 2160 e525b065c1597c8cea805c4b6d47ba0c_JaffaCakes118.exe 2160 e525b065c1597c8cea805c4b6d47ba0c_JaffaCakes118.exe 2136 igfxsk32.exe 2136 igfxsk32.exe 2136 igfxsk32.exe 2136 igfxsk32.exe 2868 igfxsk32.exe 2868 igfxsk32.exe 2868 igfxsk32.exe 2868 igfxsk32.exe 3424 igfxsk32.exe 3424 igfxsk32.exe 3424 igfxsk32.exe 3424 igfxsk32.exe 4044 igfxsk32.exe 4044 igfxsk32.exe 4044 igfxsk32.exe 4044 igfxsk32.exe 4268 igfxsk32.exe 4268 igfxsk32.exe 4268 igfxsk32.exe 4268 igfxsk32.exe 2540 igfxsk32.exe 2540 igfxsk32.exe 2540 igfxsk32.exe 2540 igfxsk32.exe 4364 igfxsk32.exe 4364 igfxsk32.exe 4364 igfxsk32.exe 4364 igfxsk32.exe 4388 igfxsk32.exe 4388 igfxsk32.exe 4388 igfxsk32.exe 4388 igfxsk32.exe 3652 igfxsk32.exe 3652 igfxsk32.exe 3652 igfxsk32.exe 3652 igfxsk32.exe 5096 igfxsk32.exe 5096 igfxsk32.exe 5096 igfxsk32.exe 5096 igfxsk32.exe 4240 igfxsk32.exe 4240 igfxsk32.exe 4240 igfxsk32.exe 4240 igfxsk32.exe 400 igfxsk32.exe 400 igfxsk32.exe 400 igfxsk32.exe 400 igfxsk32.exe 3504 igfxsk32.exe 3504 igfxsk32.exe 3504 igfxsk32.exe 3504 igfxsk32.exe 4012 igfxsk32.exe 4012 igfxsk32.exe 4012 igfxsk32.exe 4012 igfxsk32.exe 2700 igfxsk32.exe 2700 igfxsk32.exe 2700 igfxsk32.exe 2700 igfxsk32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2136 2160 e525b065c1597c8cea805c4b6d47ba0c_JaffaCakes118.exe 82 PID 2160 wrote to memory of 2136 2160 e525b065c1597c8cea805c4b6d47ba0c_JaffaCakes118.exe 82 PID 2160 wrote to memory of 2136 2160 e525b065c1597c8cea805c4b6d47ba0c_JaffaCakes118.exe 82 PID 2136 wrote to memory of 2868 2136 igfxsk32.exe 87 PID 2136 wrote to memory of 2868 2136 igfxsk32.exe 87 PID 2136 wrote to memory of 2868 2136 igfxsk32.exe 87 PID 2868 wrote to memory of 3424 2868 igfxsk32.exe 89 PID 2868 wrote to memory of 3424 2868 igfxsk32.exe 89 PID 2868 wrote to memory of 3424 2868 igfxsk32.exe 89 PID 3424 wrote to memory of 4044 3424 igfxsk32.exe 92 PID 3424 wrote to memory of 4044 3424 igfxsk32.exe 92 PID 3424 wrote to memory of 4044 3424 igfxsk32.exe 92 PID 4044 wrote to memory of 4268 4044 igfxsk32.exe 93 PID 4044 wrote to memory of 4268 4044 igfxsk32.exe 93 PID 4044 wrote to memory of 4268 4044 igfxsk32.exe 93 PID 4268 wrote to memory of 2540 4268 igfxsk32.exe 94 PID 4268 wrote to memory of 2540 4268 igfxsk32.exe 94 PID 4268 wrote to memory of 2540 4268 igfxsk32.exe 94 PID 2540 wrote to memory of 4364 2540 igfxsk32.exe 95 PID 2540 wrote to memory of 4364 2540 igfxsk32.exe 95 PID 2540 wrote to memory of 4364 2540 igfxsk32.exe 95 PID 4364 wrote to memory of 4388 4364 igfxsk32.exe 96 PID 4364 wrote to memory of 4388 4364 igfxsk32.exe 96 PID 4364 wrote to memory of 4388 4364 igfxsk32.exe 96 PID 4388 wrote to memory of 3652 4388 igfxsk32.exe 97 PID 4388 wrote to memory of 3652 4388 igfxsk32.exe 97 PID 4388 wrote to memory of 3652 4388 igfxsk32.exe 97 PID 3652 wrote to memory of 5096 3652 igfxsk32.exe 98 PID 3652 wrote to memory of 5096 3652 igfxsk32.exe 98 PID 3652 wrote to memory of 5096 3652 igfxsk32.exe 98 PID 5096 wrote to memory of 4240 5096 igfxsk32.exe 99 PID 5096 wrote to memory of 4240 5096 igfxsk32.exe 99 PID 5096 wrote to memory of 4240 5096 igfxsk32.exe 99 PID 4240 wrote to memory of 400 4240 igfxsk32.exe 101 PID 4240 wrote to memory of 400 4240 igfxsk32.exe 101 PID 4240 wrote to memory of 400 4240 igfxsk32.exe 101 PID 400 wrote to memory of 3504 400 igfxsk32.exe 102 PID 400 wrote to memory of 3504 400 igfxsk32.exe 102 PID 400 wrote to memory of 3504 400 igfxsk32.exe 102 PID 3504 wrote to memory of 4012 3504 igfxsk32.exe 104 PID 3504 wrote to memory of 4012 3504 igfxsk32.exe 104 PID 3504 wrote to memory of 4012 3504 igfxsk32.exe 104 PID 4012 wrote to memory of 2700 4012 igfxsk32.exe 105 PID 4012 wrote to memory of 2700 4012 igfxsk32.exe 105 PID 4012 wrote to memory of 2700 4012 igfxsk32.exe 105 PID 2700 wrote to memory of 5056 2700 igfxsk32.exe 106 PID 2700 wrote to memory of 5056 2700 igfxsk32.exe 106 PID 2700 wrote to memory of 5056 2700 igfxsk32.exe 106 PID 5056 wrote to memory of 4608 5056 igfxsk32.exe 107 PID 5056 wrote to memory of 4608 5056 igfxsk32.exe 107 PID 5056 wrote to memory of 4608 5056 igfxsk32.exe 107 PID 4608 wrote to memory of 4916 4608 igfxsk32.exe 108 PID 4608 wrote to memory of 4916 4608 igfxsk32.exe 108 PID 4608 wrote to memory of 4916 4608 igfxsk32.exe 108 PID 4916 wrote to memory of 4372 4916 igfxsk32.exe 109 PID 4916 wrote to memory of 4372 4916 igfxsk32.exe 109 PID 4916 wrote to memory of 4372 4916 igfxsk32.exe 109 PID 4372 wrote to memory of 1664 4372 igfxsk32.exe 110 PID 4372 wrote to memory of 1664 4372 igfxsk32.exe 110 PID 4372 wrote to memory of 1664 4372 igfxsk32.exe 110 PID 1664 wrote to memory of 1560 1664 igfxsk32.exe 111 PID 1664 wrote to memory of 1560 1664 igfxsk32.exe 111 PID 1664 wrote to memory of 1560 1664 igfxsk32.exe 111 PID 1560 wrote to memory of 2888 1560 igfxsk32.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\e525b065c1597c8cea805c4b6d47ba0c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e525b065c1597c8cea805c4b6d47ba0c_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Users\Admin\AppData\Local\Temp\E525B0~1.EXE2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe7⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe9⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe11⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe13⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe15⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe17⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe19⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe21⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe23⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2888 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4552 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe25⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2124 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4180 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe27⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2744 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3900 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe29⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4212 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2624 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe31⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4280 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe32⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5032 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe33⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4956 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe34⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3444 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe35⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2148 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe36⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4880 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe37⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3360 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe38⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4612 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe39⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1396 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe40⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3112 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe41⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3548 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe42⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1732 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe43⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4004 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe44⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3384 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe45⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3320 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe46⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4032 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe47⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3896 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe48⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:808 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe49⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3468 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe50⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2224 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe51⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2776 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe52⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2240 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe53⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4180 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe54⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:540 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe55⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1516 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe56⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1624 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe57⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2516 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe58⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1572 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe59⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3696 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe60⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:732 -
C:\Windows\SysWOW64\igfxsk32.exe"C:\Windows\system32\igfxsk32.exe" C:\Windows\SysWOW64\igfxsk32.exe61⤵
- Executes dropped EXE
- Maps connected drives based on registry
PID:2840
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
125KB
MD5e525b065c1597c8cea805c4b6d47ba0c
SHA16532616d43504ad8024e6413372d24f47a07014e
SHA2568bf34df617821470cb2041374eb5933a38d6a46c1880d611e153f2e422b3eeac
SHA5126e6ebc889eccbe0008cec85a445f2fc20668185264fe26224b6d85bde278f5dc19f2cc1a38df0bd1a86f7b3d1ec2cc6dc9f4cff0456fc2fc67094b2e7450cd3d