Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
16-09-2024 19:23
Static task
static1
Behavioral task
behavioral1
Sample
e5715f682d3b1a90db5d7cd4fe571b71_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e5715f682d3b1a90db5d7cd4fe571b71_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e5715f682d3b1a90db5d7cd4fe571b71_JaffaCakes118.exe
-
Size
275KB
-
MD5
e5715f682d3b1a90db5d7cd4fe571b71
-
SHA1
802f3604f79f27408e370e42eb18afaba302ba15
-
SHA256
52e65fa9e8e204eac9a6f61c3b4ceb428ba7fbcc9e604a0645096de69fccc6c3
-
SHA512
8459f9b214c18cc1a47624a5e77457c108098ceeca8cabc3e5af9df9ce9c1ed884a1cd61be139873118115969ca2b102a9d76e67f0472d216fdb300fe4ad14c4
-
SSDEEP
6144:cFlDby9XWrnblDonFoKj9+hKwf/E7x4QMJgSW:c3NqPkhKwGx4FFW
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2724 igfxpd32.exe -
Executes dropped EXE 64 IoCs
pid Process 2724 igfxpd32.exe 2656 igfxpd32.exe 2632 igfxpd32.exe 2228 igfxpd32.exe 2552 igfxpd32.exe 1740 igfxpd32.exe 2872 igfxpd32.exe 3052 igfxpd32.exe 2376 igfxpd32.exe 1144 igfxpd32.exe 696 igfxpd32.exe 2080 igfxpd32.exe 580 igfxpd32.exe 964 igfxpd32.exe 1752 igfxpd32.exe 1792 igfxpd32.exe 2252 igfxpd32.exe 1984 igfxpd32.exe 2064 igfxpd32.exe 1804 igfxpd32.exe 1504 igfxpd32.exe 2804 igfxpd32.exe 1720 igfxpd32.exe 2468 igfxpd32.exe 2780 igfxpd32.exe 2724 igfxpd32.exe 2620 igfxpd32.exe 2636 igfxpd32.exe 2540 igfxpd32.exe 288 igfxpd32.exe 2076 igfxpd32.exe 2864 igfxpd32.exe 3060 igfxpd32.exe 3012 igfxpd32.exe 1300 igfxpd32.exe 1768 igfxpd32.exe 2256 igfxpd32.exe 2584 igfxpd32.exe 908 igfxpd32.exe 2424 igfxpd32.exe 1480 igfxpd32.exe 2008 igfxpd32.exe 1548 igfxpd32.exe 1384 igfxpd32.exe 1792 igfxpd32.exe 348 igfxpd32.exe 1984 igfxpd32.exe 984 igfxpd32.exe 1756 igfxpd32.exe 1092 igfxpd32.exe 1572 igfxpd32.exe 1720 igfxpd32.exe 2868 igfxpd32.exe 2644 igfxpd32.exe 2648 igfxpd32.exe 2620 igfxpd32.exe 2504 igfxpd32.exe 2384 igfxpd32.exe 2316 igfxpd32.exe 380 igfxpd32.exe 1704 igfxpd32.exe 3056 igfxpd32.exe 1940 igfxpd32.exe 1664 igfxpd32.exe -
Loads dropped DLL 64 IoCs
pid Process 2520 e5715f682d3b1a90db5d7cd4fe571b71_JaffaCakes118.exe 2520 e5715f682d3b1a90db5d7cd4fe571b71_JaffaCakes118.exe 2724 igfxpd32.exe 2724 igfxpd32.exe 2656 igfxpd32.exe 2656 igfxpd32.exe 2632 igfxpd32.exe 2632 igfxpd32.exe 2228 igfxpd32.exe 2228 igfxpd32.exe 2552 igfxpd32.exe 2552 igfxpd32.exe 1740 igfxpd32.exe 1740 igfxpd32.exe 2872 igfxpd32.exe 2872 igfxpd32.exe 3052 igfxpd32.exe 3052 igfxpd32.exe 2376 igfxpd32.exe 2376 igfxpd32.exe 1144 igfxpd32.exe 1144 igfxpd32.exe 696 igfxpd32.exe 696 igfxpd32.exe 2080 igfxpd32.exe 2080 igfxpd32.exe 580 igfxpd32.exe 580 igfxpd32.exe 964 igfxpd32.exe 964 igfxpd32.exe 1752 igfxpd32.exe 1752 igfxpd32.exe 1792 igfxpd32.exe 1792 igfxpd32.exe 2252 igfxpd32.exe 2252 igfxpd32.exe 1984 igfxpd32.exe 1984 igfxpd32.exe 2064 igfxpd32.exe 2064 igfxpd32.exe 1804 igfxpd32.exe 1804 igfxpd32.exe 1504 igfxpd32.exe 1504 igfxpd32.exe 2804 igfxpd32.exe 2804 igfxpd32.exe 1720 igfxpd32.exe 1720 igfxpd32.exe 2468 igfxpd32.exe 2468 igfxpd32.exe 2780 igfxpd32.exe 2780 igfxpd32.exe 2724 igfxpd32.exe 2724 igfxpd32.exe 2620 igfxpd32.exe 2620 igfxpd32.exe 2636 igfxpd32.exe 2636 igfxpd32.exe 2540 igfxpd32.exe 2540 igfxpd32.exe 288 igfxpd32.exe 288 igfxpd32.exe 2076 igfxpd32.exe 2076 igfxpd32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 e5715f682d3b1a90db5d7cd4fe571b71_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum e5715f682d3b1a90db5d7cd4fe571b71_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe e5715f682d3b1a90db5d7cd4fe571b71_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxpd32.exe e5715f682d3b1a90db5d7cd4fe571b71_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ e5715f682d3b1a90db5d7cd4fe571b71_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5715f682d3b1a90db5d7cd4fe571b71_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2520 e5715f682d3b1a90db5d7cd4fe571b71_JaffaCakes118.exe 2520 e5715f682d3b1a90db5d7cd4fe571b71_JaffaCakes118.exe 2724 igfxpd32.exe 2724 igfxpd32.exe 2656 igfxpd32.exe 2656 igfxpd32.exe 2632 igfxpd32.exe 2632 igfxpd32.exe 2228 igfxpd32.exe 2228 igfxpd32.exe 2552 igfxpd32.exe 2552 igfxpd32.exe 1740 igfxpd32.exe 1740 igfxpd32.exe 2872 igfxpd32.exe 2872 igfxpd32.exe 3052 igfxpd32.exe 3052 igfxpd32.exe 2376 igfxpd32.exe 2376 igfxpd32.exe 1144 igfxpd32.exe 1144 igfxpd32.exe 696 igfxpd32.exe 696 igfxpd32.exe 2080 igfxpd32.exe 2080 igfxpd32.exe 580 igfxpd32.exe 580 igfxpd32.exe 964 igfxpd32.exe 964 igfxpd32.exe 1752 igfxpd32.exe 1752 igfxpd32.exe 1792 igfxpd32.exe 1792 igfxpd32.exe 2252 igfxpd32.exe 2252 igfxpd32.exe 1984 igfxpd32.exe 1984 igfxpd32.exe 2064 igfxpd32.exe 2064 igfxpd32.exe 1804 igfxpd32.exe 1804 igfxpd32.exe 1504 igfxpd32.exe 1504 igfxpd32.exe 2804 igfxpd32.exe 2804 igfxpd32.exe 1720 igfxpd32.exe 1720 igfxpd32.exe 2468 igfxpd32.exe 2468 igfxpd32.exe 2780 igfxpd32.exe 2780 igfxpd32.exe 2724 igfxpd32.exe 2724 igfxpd32.exe 2620 igfxpd32.exe 2620 igfxpd32.exe 2636 igfxpd32.exe 2636 igfxpd32.exe 2540 igfxpd32.exe 2540 igfxpd32.exe 288 igfxpd32.exe 288 igfxpd32.exe 2076 igfxpd32.exe 2076 igfxpd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2724 2520 e5715f682d3b1a90db5d7cd4fe571b71_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2724 2520 e5715f682d3b1a90db5d7cd4fe571b71_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2724 2520 e5715f682d3b1a90db5d7cd4fe571b71_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2724 2520 e5715f682d3b1a90db5d7cd4fe571b71_JaffaCakes118.exe 30 PID 2724 wrote to memory of 2656 2724 igfxpd32.exe 31 PID 2724 wrote to memory of 2656 2724 igfxpd32.exe 31 PID 2724 wrote to memory of 2656 2724 igfxpd32.exe 31 PID 2724 wrote to memory of 2656 2724 igfxpd32.exe 31 PID 2656 wrote to memory of 2632 2656 igfxpd32.exe 32 PID 2656 wrote to memory of 2632 2656 igfxpd32.exe 32 PID 2656 wrote to memory of 2632 2656 igfxpd32.exe 32 PID 2656 wrote to memory of 2632 2656 igfxpd32.exe 32 PID 2632 wrote to memory of 2228 2632 igfxpd32.exe 33 PID 2632 wrote to memory of 2228 2632 igfxpd32.exe 33 PID 2632 wrote to memory of 2228 2632 igfxpd32.exe 33 PID 2632 wrote to memory of 2228 2632 igfxpd32.exe 33 PID 2228 wrote to memory of 2552 2228 igfxpd32.exe 34 PID 2228 wrote to memory of 2552 2228 igfxpd32.exe 34 PID 2228 wrote to memory of 2552 2228 igfxpd32.exe 34 PID 2228 wrote to memory of 2552 2228 igfxpd32.exe 34 PID 2552 wrote to memory of 1740 2552 igfxpd32.exe 35 PID 2552 wrote to memory of 1740 2552 igfxpd32.exe 35 PID 2552 wrote to memory of 1740 2552 igfxpd32.exe 35 PID 2552 wrote to memory of 1740 2552 igfxpd32.exe 35 PID 1740 wrote to memory of 2872 1740 igfxpd32.exe 36 PID 1740 wrote to memory of 2872 1740 igfxpd32.exe 36 PID 1740 wrote to memory of 2872 1740 igfxpd32.exe 36 PID 1740 wrote to memory of 2872 1740 igfxpd32.exe 36 PID 2872 wrote to memory of 3052 2872 igfxpd32.exe 37 PID 2872 wrote to memory of 3052 2872 igfxpd32.exe 37 PID 2872 wrote to memory of 3052 2872 igfxpd32.exe 37 PID 2872 wrote to memory of 3052 2872 igfxpd32.exe 37 PID 3052 wrote to memory of 2376 3052 igfxpd32.exe 39 PID 3052 wrote to memory of 2376 3052 igfxpd32.exe 39 PID 3052 wrote to memory of 2376 3052 igfxpd32.exe 39 PID 3052 wrote to memory of 2376 3052 igfxpd32.exe 39 PID 2376 wrote to memory of 1144 2376 igfxpd32.exe 40 PID 2376 wrote to memory of 1144 2376 igfxpd32.exe 40 PID 2376 wrote to memory of 1144 2376 igfxpd32.exe 40 PID 2376 wrote to memory of 1144 2376 igfxpd32.exe 40 PID 1144 wrote to memory of 696 1144 igfxpd32.exe 41 PID 1144 wrote to memory of 696 1144 igfxpd32.exe 41 PID 1144 wrote to memory of 696 1144 igfxpd32.exe 41 PID 1144 wrote to memory of 696 1144 igfxpd32.exe 41 PID 696 wrote to memory of 2080 696 igfxpd32.exe 42 PID 696 wrote to memory of 2080 696 igfxpd32.exe 42 PID 696 wrote to memory of 2080 696 igfxpd32.exe 42 PID 696 wrote to memory of 2080 696 igfxpd32.exe 42 PID 2080 wrote to memory of 580 2080 igfxpd32.exe 43 PID 2080 wrote to memory of 580 2080 igfxpd32.exe 43 PID 2080 wrote to memory of 580 2080 igfxpd32.exe 43 PID 2080 wrote to memory of 580 2080 igfxpd32.exe 43 PID 580 wrote to memory of 964 580 igfxpd32.exe 44 PID 580 wrote to memory of 964 580 igfxpd32.exe 44 PID 580 wrote to memory of 964 580 igfxpd32.exe 44 PID 580 wrote to memory of 964 580 igfxpd32.exe 44 PID 964 wrote to memory of 1752 964 igfxpd32.exe 45 PID 964 wrote to memory of 1752 964 igfxpd32.exe 45 PID 964 wrote to memory of 1752 964 igfxpd32.exe 45 PID 964 wrote to memory of 1752 964 igfxpd32.exe 45 PID 1752 wrote to memory of 1792 1752 igfxpd32.exe 46 PID 1752 wrote to memory of 1792 1752 igfxpd32.exe 46 PID 1752 wrote to memory of 1792 1752 igfxpd32.exe 46 PID 1752 wrote to memory of 1792 1752 igfxpd32.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5715f682d3b1a90db5d7cd4fe571b71_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e5715f682d3b1a90db5d7cd4fe571b71_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Users\Admin\AppData\Local\Temp\E5715F~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1792 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2252 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1984 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2064 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1804 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1504 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2804 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1720 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2468 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2780 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2724 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2620 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2636 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2540 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:288 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2076 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2864 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
PID:3060 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3012 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1300 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1768 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2256 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2584 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:908 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2424 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1480 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2008 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1548 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1384 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1792 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe47⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:348 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe48⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1984 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe49⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:984 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1756 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe51⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1092 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe52⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1572 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1720 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe54⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2868 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe55⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2644 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe56⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2648 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe57⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2620 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe58⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2504 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe59⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2384 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe60⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2316 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe61⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:380 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe62⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1704 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe63⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3056 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe64⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1940 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1664
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
275KB
MD5e5715f682d3b1a90db5d7cd4fe571b71
SHA1802f3604f79f27408e370e42eb18afaba302ba15
SHA25652e65fa9e8e204eac9a6f61c3b4ceb428ba7fbcc9e604a0645096de69fccc6c3
SHA5128459f9b214c18cc1a47624a5e77457c108098ceeca8cabc3e5af9df9ce9c1ed884a1cd61be139873118115969ca2b102a9d76e67f0472d216fdb300fe4ad14c4