Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-09-2024 19:32
Behavioral task
behavioral1
Sample
e57520ce0f650310c048e8d710b623f0_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e57520ce0f650310c048e8d710b623f0_JaffaCakes118.exe
-
Size
227KB
-
MD5
e57520ce0f650310c048e8d710b623f0
-
SHA1
5b569d54c99ef26b336dc673d04e63c41c578d93
-
SHA256
6d25b4312d2483d0eca6c831e17fe1d2a64676d5614cb00425a98fb6b6a099b1
-
SHA512
cdbca4b898fd2bd9c9fb39988065d30f55c3e3c67721bd2ae8b8d06a9342edcc476667036bcae07b5d0032789b85387be4b7b7bcf2d6838ff1165333415d1689
-
SSDEEP
6144:4nLtNO2QZGmZyU39j1joP2lT7BjrLS9ms40m44Htz6veW:4nRNO2iGmB39j1kIT7Bmcs4O4Avd
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2604 igfxper32.exe -
Executes dropped EXE 50 IoCs
pid Process 2604 igfxper32.exe 3068 igfxper32.exe 2552 igfxper32.exe 3004 igfxper32.exe 580 igfxper32.exe 2844 igfxper32.exe 3024 igfxper32.exe 2328 igfxper32.exe 1976 igfxper32.exe 1428 igfxper32.exe 2400 igfxper32.exe 672 igfxper32.exe 2384 igfxper32.exe 2488 igfxper32.exe 1632 igfxper32.exe 2952 igfxper32.exe 1948 igfxper32.exe 1072 igfxper32.exe 2184 igfxper32.exe 1716 igfxper32.exe 2736 igfxper32.exe 2512 igfxper32.exe 3000 igfxper32.exe 2412 igfxper32.exe 588 igfxper32.exe 868 igfxper32.exe 3020 igfxper32.exe 2352 igfxper32.exe 1248 igfxper32.exe 1736 igfxper32.exe 1976 igfxper32.exe 2196 igfxper32.exe 2120 igfxper32.exe 292 igfxper32.exe 2108 igfxper32.exe 1360 igfxper32.exe 1656 igfxper32.exe 2488 igfxper32.exe 856 igfxper32.exe 1928 igfxper32.exe 2980 igfxper32.exe 2960 igfxper32.exe 3056 igfxper32.exe 2608 igfxper32.exe 2688 igfxper32.exe 2556 igfxper32.exe 2064 igfxper32.exe 2576 igfxper32.exe 2660 igfxper32.exe 1708 igfxper32.exe -
Loads dropped DLL 64 IoCs
pid Process 1672 e57520ce0f650310c048e8d710b623f0_JaffaCakes118.exe 1672 e57520ce0f650310c048e8d710b623f0_JaffaCakes118.exe 2604 igfxper32.exe 2604 igfxper32.exe 3068 igfxper32.exe 3068 igfxper32.exe 2552 igfxper32.exe 2552 igfxper32.exe 3004 igfxper32.exe 3004 igfxper32.exe 580 igfxper32.exe 580 igfxper32.exe 2844 igfxper32.exe 2844 igfxper32.exe 3024 igfxper32.exe 3024 igfxper32.exe 2328 igfxper32.exe 2328 igfxper32.exe 1976 igfxper32.exe 1976 igfxper32.exe 1428 igfxper32.exe 1428 igfxper32.exe 2400 igfxper32.exe 2400 igfxper32.exe 672 igfxper32.exe 672 igfxper32.exe 2384 igfxper32.exe 2384 igfxper32.exe 2488 igfxper32.exe 2488 igfxper32.exe 1632 igfxper32.exe 1632 igfxper32.exe 2952 igfxper32.exe 2952 igfxper32.exe 1948 igfxper32.exe 1948 igfxper32.exe 1072 igfxper32.exe 1072 igfxper32.exe 2184 igfxper32.exe 2184 igfxper32.exe 1716 igfxper32.exe 1716 igfxper32.exe 2736 igfxper32.exe 2736 igfxper32.exe 2512 igfxper32.exe 2512 igfxper32.exe 3000 igfxper32.exe 3000 igfxper32.exe 2412 igfxper32.exe 2412 igfxper32.exe 588 igfxper32.exe 588 igfxper32.exe 868 igfxper32.exe 868 igfxper32.exe 3020 igfxper32.exe 3020 igfxper32.exe 2352 igfxper32.exe 2352 igfxper32.exe 1248 igfxper32.exe 1248 igfxper32.exe 1736 igfxper32.exe 1736 igfxper32.exe 1976 igfxper32.exe 1976 igfxper32.exe -
resource yara_rule behavioral1/memory/1672-0-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/1672-2-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/files/0x000a000000012033-6.dat upx behavioral1/memory/2604-17-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/2604-16-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/2604-15-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/1672-14-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/2604-24-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/3068-31-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/2552-32-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/2552-39-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/3004-46-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/580-52-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/580-49-0x0000000003360000-0x0000000003427000-memory.dmp upx behavioral1/memory/2844-58-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/2328-65-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/3024-64-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/1976-71-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/2328-70-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/1976-77-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/1428-82-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/2400-88-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/2400-86-0x0000000003820000-0x00000000038E7000-memory.dmp upx behavioral1/memory/672-95-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/2384-96-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/2384-103-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/2488-107-0x00000000034A0000-0x0000000003567000-memory.dmp upx behavioral1/memory/2488-110-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/2488-106-0x00000000034A0000-0x0000000003567000-memory.dmp upx behavioral1/memory/2952-116-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/1632-118-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/2952-126-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/1948-124-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/1948-129-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/1072-132-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/2184-133-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/1716-134-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/2184-136-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/1716-139-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/2736-144-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/2512-142-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/2736-141-0x0000000003650000-0x0000000003717000-memory.dmp upx behavioral1/memory/2512-146-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/3000-149-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/2412-150-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/2412-152-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/588-154-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/868-156-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/2352-158-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/3020-160-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/2352-162-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/1248-163-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/1248-165-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/1736-167-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/1976-169-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/2196-171-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/292-173-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/2120-172-0x00000000032A0000-0x0000000003367000-memory.dmp upx behavioral1/memory/2120-175-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/292-177-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/2108-178-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/2108-180-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/1360-182-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral1/memory/2488-183-0x0000000000400000-0x00000000004C7000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe e57520ce0f650310c048e8d710b623f0_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 51 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e57520ce0f650310c048e8d710b623f0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe -
Suspicious behavior: EnumeratesProcesses 51 IoCs
pid Process 1672 e57520ce0f650310c048e8d710b623f0_JaffaCakes118.exe 2604 igfxper32.exe 3068 igfxper32.exe 2552 igfxper32.exe 3004 igfxper32.exe 580 igfxper32.exe 2844 igfxper32.exe 3024 igfxper32.exe 2328 igfxper32.exe 1976 igfxper32.exe 1428 igfxper32.exe 2400 igfxper32.exe 672 igfxper32.exe 2384 igfxper32.exe 2488 igfxper32.exe 1632 igfxper32.exe 2952 igfxper32.exe 1948 igfxper32.exe 1072 igfxper32.exe 2184 igfxper32.exe 1716 igfxper32.exe 2736 igfxper32.exe 2512 igfxper32.exe 3000 igfxper32.exe 2412 igfxper32.exe 588 igfxper32.exe 868 igfxper32.exe 3020 igfxper32.exe 2352 igfxper32.exe 1248 igfxper32.exe 1736 igfxper32.exe 1976 igfxper32.exe 2196 igfxper32.exe 2120 igfxper32.exe 292 igfxper32.exe 2108 igfxper32.exe 1360 igfxper32.exe 1656 igfxper32.exe 2488 igfxper32.exe 856 igfxper32.exe 1928 igfxper32.exe 2980 igfxper32.exe 2960 igfxper32.exe 3056 igfxper32.exe 2608 igfxper32.exe 2688 igfxper32.exe 2556 igfxper32.exe 2064 igfxper32.exe 2576 igfxper32.exe 2660 igfxper32.exe 1708 igfxper32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1672 wrote to memory of 2604 1672 e57520ce0f650310c048e8d710b623f0_JaffaCakes118.exe 28 PID 1672 wrote to memory of 2604 1672 e57520ce0f650310c048e8d710b623f0_JaffaCakes118.exe 28 PID 1672 wrote to memory of 2604 1672 e57520ce0f650310c048e8d710b623f0_JaffaCakes118.exe 28 PID 1672 wrote to memory of 2604 1672 e57520ce0f650310c048e8d710b623f0_JaffaCakes118.exe 28 PID 2604 wrote to memory of 3068 2604 igfxper32.exe 29 PID 2604 wrote to memory of 3068 2604 igfxper32.exe 29 PID 2604 wrote to memory of 3068 2604 igfxper32.exe 29 PID 2604 wrote to memory of 3068 2604 igfxper32.exe 29 PID 3068 wrote to memory of 2552 3068 igfxper32.exe 30 PID 3068 wrote to memory of 2552 3068 igfxper32.exe 30 PID 3068 wrote to memory of 2552 3068 igfxper32.exe 30 PID 3068 wrote to memory of 2552 3068 igfxper32.exe 30 PID 2552 wrote to memory of 3004 2552 igfxper32.exe 31 PID 2552 wrote to memory of 3004 2552 igfxper32.exe 31 PID 2552 wrote to memory of 3004 2552 igfxper32.exe 31 PID 2552 wrote to memory of 3004 2552 igfxper32.exe 31 PID 3004 wrote to memory of 580 3004 igfxper32.exe 32 PID 3004 wrote to memory of 580 3004 igfxper32.exe 32 PID 3004 wrote to memory of 580 3004 igfxper32.exe 32 PID 3004 wrote to memory of 580 3004 igfxper32.exe 32 PID 580 wrote to memory of 2844 580 igfxper32.exe 33 PID 580 wrote to memory of 2844 580 igfxper32.exe 33 PID 580 wrote to memory of 2844 580 igfxper32.exe 33 PID 580 wrote to memory of 2844 580 igfxper32.exe 33 PID 2844 wrote to memory of 3024 2844 igfxper32.exe 34 PID 2844 wrote to memory of 3024 2844 igfxper32.exe 34 PID 2844 wrote to memory of 3024 2844 igfxper32.exe 34 PID 2844 wrote to memory of 3024 2844 igfxper32.exe 34 PID 3024 wrote to memory of 2328 3024 igfxper32.exe 35 PID 3024 wrote to memory of 2328 3024 igfxper32.exe 35 PID 3024 wrote to memory of 2328 3024 igfxper32.exe 35 PID 3024 wrote to memory of 2328 3024 igfxper32.exe 35 PID 2328 wrote to memory of 1976 2328 igfxper32.exe 36 PID 2328 wrote to memory of 1976 2328 igfxper32.exe 36 PID 2328 wrote to memory of 1976 2328 igfxper32.exe 36 PID 2328 wrote to memory of 1976 2328 igfxper32.exe 36 PID 1976 wrote to memory of 1428 1976 igfxper32.exe 37 PID 1976 wrote to memory of 1428 1976 igfxper32.exe 37 PID 1976 wrote to memory of 1428 1976 igfxper32.exe 37 PID 1976 wrote to memory of 1428 1976 igfxper32.exe 37 PID 1428 wrote to memory of 2400 1428 igfxper32.exe 40 PID 1428 wrote to memory of 2400 1428 igfxper32.exe 40 PID 1428 wrote to memory of 2400 1428 igfxper32.exe 40 PID 1428 wrote to memory of 2400 1428 igfxper32.exe 40 PID 2400 wrote to memory of 672 2400 igfxper32.exe 41 PID 2400 wrote to memory of 672 2400 igfxper32.exe 41 PID 2400 wrote to memory of 672 2400 igfxper32.exe 41 PID 2400 wrote to memory of 672 2400 igfxper32.exe 41 PID 672 wrote to memory of 2384 672 igfxper32.exe 42 PID 672 wrote to memory of 2384 672 igfxper32.exe 42 PID 672 wrote to memory of 2384 672 igfxper32.exe 42 PID 672 wrote to memory of 2384 672 igfxper32.exe 42 PID 2384 wrote to memory of 2488 2384 igfxper32.exe 43 PID 2384 wrote to memory of 2488 2384 igfxper32.exe 43 PID 2384 wrote to memory of 2488 2384 igfxper32.exe 43 PID 2384 wrote to memory of 2488 2384 igfxper32.exe 43 PID 2488 wrote to memory of 1632 2488 igfxper32.exe 44 PID 2488 wrote to memory of 1632 2488 igfxper32.exe 44 PID 2488 wrote to memory of 1632 2488 igfxper32.exe 44 PID 2488 wrote to memory of 1632 2488 igfxper32.exe 44 PID 1632 wrote to memory of 2952 1632 igfxper32.exe 45 PID 1632 wrote to memory of 2952 1632 igfxper32.exe 45 PID 1632 wrote to memory of 2952 1632 igfxper32.exe 45 PID 1632 wrote to memory of 2952 1632 igfxper32.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\e57520ce0f650310c048e8d710b623f0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e57520ce0f650310c048e8d710b623f0_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Users\Admin\AppData\Local\Temp\E57520~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2952 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1948 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE19⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1072 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2184 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1716 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2736 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE23⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2512 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3000 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2412 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:588 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:868 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3020 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE29⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2352 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1248 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE31⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1736 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1976 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2196 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE34⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2120 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:292 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2108 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1360 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1656 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2488 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:856 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1928 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE42⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2980 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2960 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3056 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE45⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2608 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2688 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE47⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2556 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE48⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2064 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE49⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2576 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE50⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2660 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE51⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1708
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
227KB
MD5e57520ce0f650310c048e8d710b623f0
SHA15b569d54c99ef26b336dc673d04e63c41c578d93
SHA2566d25b4312d2483d0eca6c831e17fe1d2a64676d5614cb00425a98fb6b6a099b1
SHA512cdbca4b898fd2bd9c9fb39988065d30f55c3e3c67721bd2ae8b8d06a9342edcc476667036bcae07b5d0032789b85387be4b7b7bcf2d6838ff1165333415d1689