Analysis
-
max time kernel
150s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
16-09-2024 19:52
Behavioral task
behavioral1
Sample
e57c6b04b7cbdcfbff6fd0ac4b33c995_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
e57c6b04b7cbdcfbff6fd0ac4b33c995_JaffaCakes118.exe
-
Size
347KB
-
MD5
e57c6b04b7cbdcfbff6fd0ac4b33c995
-
SHA1
e935b210d4caa388b5005c1a871ed3182a7e250a
-
SHA256
12f59a3cdbe40ca6dbae4de01e40bf0f59f0477c273884a0656600eddcb3e866
-
SHA512
f61d3b29612945a0a7001611259456d98e1d99c544805046347ab1cd485ba7bdc0f0d4169bae3d81012e606ab322e6d47a1629a0d6774e6777b6cba5a6436d05
-
SSDEEP
6144:U2xQWBTEVv+9z/OhHd0FqQSoW8+ZcQcaAirxDR0qoL:fQaei4HQSjrxK1
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2852 igfxbm32.exe -
Executes dropped EXE 46 IoCs
pid Process 2852 igfxbm32.exe 2836 igfxbm32.exe 2832 igfxbm32.exe 2248 igfxbm32.exe 3008 igfxbm32.exe 1644 igfxbm32.exe 1704 igfxbm32.exe 2036 igfxbm32.exe 3028 igfxbm32.exe 476 igfxbm32.exe 1528 igfxbm32.exe 2360 igfxbm32.exe 2000 igfxbm32.exe 940 igfxbm32.exe 784 igfxbm32.exe 1980 igfxbm32.exe 1736 igfxbm32.exe 1740 igfxbm32.exe 1720 igfxbm32.exe 1928 igfxbm32.exe 2784 igfxbm32.exe 2688 igfxbm32.exe 2956 igfxbm32.exe 2704 igfxbm32.exe 2236 igfxbm32.exe 1692 igfxbm32.exe 2372 igfxbm32.exe 316 igfxbm32.exe 1680 igfxbm32.exe 1332 igfxbm32.exe 1436 igfxbm32.exe 592 igfxbm32.exe 1092 igfxbm32.exe 2376 igfxbm32.exe 448 igfxbm32.exe 352 igfxbm32.exe 1996 igfxbm32.exe 1800 igfxbm32.exe 2212 igfxbm32.exe 2040 igfxbm32.exe 2228 igfxbm32.exe 1804 igfxbm32.exe 1576 igfxbm32.exe 2548 igfxbm32.exe 2800 igfxbm32.exe 1640 igfxbm32.exe -
Loads dropped DLL 64 IoCs
pid Process 1724 e57c6b04b7cbdcfbff6fd0ac4b33c995_JaffaCakes118.exe 1724 e57c6b04b7cbdcfbff6fd0ac4b33c995_JaffaCakes118.exe 2852 igfxbm32.exe 2852 igfxbm32.exe 2836 igfxbm32.exe 2836 igfxbm32.exe 2832 igfxbm32.exe 2832 igfxbm32.exe 2248 igfxbm32.exe 2248 igfxbm32.exe 3008 igfxbm32.exe 3008 igfxbm32.exe 1644 igfxbm32.exe 1644 igfxbm32.exe 1704 igfxbm32.exe 1704 igfxbm32.exe 2036 igfxbm32.exe 2036 igfxbm32.exe 3028 igfxbm32.exe 3028 igfxbm32.exe 476 igfxbm32.exe 476 igfxbm32.exe 1528 igfxbm32.exe 1528 igfxbm32.exe 2360 igfxbm32.exe 2360 igfxbm32.exe 2000 igfxbm32.exe 2000 igfxbm32.exe 940 igfxbm32.exe 940 igfxbm32.exe 784 igfxbm32.exe 784 igfxbm32.exe 1980 igfxbm32.exe 1980 igfxbm32.exe 1736 igfxbm32.exe 1736 igfxbm32.exe 1740 igfxbm32.exe 1740 igfxbm32.exe 1720 igfxbm32.exe 1720 igfxbm32.exe 1928 igfxbm32.exe 1928 igfxbm32.exe 2784 igfxbm32.exe 2784 igfxbm32.exe 2688 igfxbm32.exe 2688 igfxbm32.exe 2956 igfxbm32.exe 2956 igfxbm32.exe 2704 igfxbm32.exe 2704 igfxbm32.exe 2236 igfxbm32.exe 2236 igfxbm32.exe 1692 igfxbm32.exe 1692 igfxbm32.exe 2372 igfxbm32.exe 2372 igfxbm32.exe 316 igfxbm32.exe 316 igfxbm32.exe 1680 igfxbm32.exe 1680 igfxbm32.exe 1332 igfxbm32.exe 1332 igfxbm32.exe 1436 igfxbm32.exe 1436 igfxbm32.exe -
resource yara_rule behavioral1/memory/1724-0-0x0000000000400000-0x00000000004D9000-memory.dmp upx behavioral1/files/0x0009000000012119-6.dat upx behavioral1/memory/2852-17-0x0000000000400000-0x00000000004D9000-memory.dmp upx behavioral1/memory/2836-23-0x0000000000400000-0x00000000004D9000-memory.dmp upx behavioral1/memory/2832-29-0x0000000000400000-0x00000000004D9000-memory.dmp upx behavioral1/memory/2248-35-0x0000000000400000-0x00000000004D9000-memory.dmp upx behavioral1/memory/2360-91-0x0000000004B20000-0x0000000004BF9000-memory.dmp upx behavioral1/memory/1800-175-0x0000000000400000-0x00000000004D9000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 e57c6b04b7cbdcfbff6fd0ac4b33c995_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ e57c6b04b7cbdcfbff6fd0ac4b33c995_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 47 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e57c6b04b7cbdcfbff6fd0ac4b33c995_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1724 e57c6b04b7cbdcfbff6fd0ac4b33c995_JaffaCakes118.exe 1724 e57c6b04b7cbdcfbff6fd0ac4b33c995_JaffaCakes118.exe 2852 igfxbm32.exe 2852 igfxbm32.exe 2836 igfxbm32.exe 2836 igfxbm32.exe 2832 igfxbm32.exe 2832 igfxbm32.exe 2248 igfxbm32.exe 2248 igfxbm32.exe 3008 igfxbm32.exe 3008 igfxbm32.exe 1644 igfxbm32.exe 1644 igfxbm32.exe 1704 igfxbm32.exe 1704 igfxbm32.exe 2036 igfxbm32.exe 2036 igfxbm32.exe 3028 igfxbm32.exe 3028 igfxbm32.exe 476 igfxbm32.exe 476 igfxbm32.exe 1528 igfxbm32.exe 1528 igfxbm32.exe 2360 igfxbm32.exe 2360 igfxbm32.exe 2000 igfxbm32.exe 2000 igfxbm32.exe 940 igfxbm32.exe 940 igfxbm32.exe 784 igfxbm32.exe 784 igfxbm32.exe 1980 igfxbm32.exe 1980 igfxbm32.exe 1736 igfxbm32.exe 1736 igfxbm32.exe 1740 igfxbm32.exe 1740 igfxbm32.exe 1928 igfxbm32.exe 1928 igfxbm32.exe 2784 igfxbm32.exe 2784 igfxbm32.exe 2688 igfxbm32.exe 2688 igfxbm32.exe 2956 igfxbm32.exe 2956 igfxbm32.exe 2704 igfxbm32.exe 2704 igfxbm32.exe 2236 igfxbm32.exe 2236 igfxbm32.exe 1692 igfxbm32.exe 1692 igfxbm32.exe 2372 igfxbm32.exe 2372 igfxbm32.exe 316 igfxbm32.exe 316 igfxbm32.exe 1680 igfxbm32.exe 1680 igfxbm32.exe 1332 igfxbm32.exe 1332 igfxbm32.exe 1436 igfxbm32.exe 1436 igfxbm32.exe 592 igfxbm32.exe 592 igfxbm32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2852 1724 e57c6b04b7cbdcfbff6fd0ac4b33c995_JaffaCakes118.exe 30 PID 1724 wrote to memory of 2852 1724 e57c6b04b7cbdcfbff6fd0ac4b33c995_JaffaCakes118.exe 30 PID 1724 wrote to memory of 2852 1724 e57c6b04b7cbdcfbff6fd0ac4b33c995_JaffaCakes118.exe 30 PID 1724 wrote to memory of 2852 1724 e57c6b04b7cbdcfbff6fd0ac4b33c995_JaffaCakes118.exe 30 PID 2852 wrote to memory of 2836 2852 igfxbm32.exe 31 PID 2852 wrote to memory of 2836 2852 igfxbm32.exe 31 PID 2852 wrote to memory of 2836 2852 igfxbm32.exe 31 PID 2852 wrote to memory of 2836 2852 igfxbm32.exe 31 PID 2836 wrote to memory of 2832 2836 igfxbm32.exe 32 PID 2836 wrote to memory of 2832 2836 igfxbm32.exe 32 PID 2836 wrote to memory of 2832 2836 igfxbm32.exe 32 PID 2836 wrote to memory of 2832 2836 igfxbm32.exe 32 PID 2832 wrote to memory of 2248 2832 igfxbm32.exe 33 PID 2832 wrote to memory of 2248 2832 igfxbm32.exe 33 PID 2832 wrote to memory of 2248 2832 igfxbm32.exe 33 PID 2832 wrote to memory of 2248 2832 igfxbm32.exe 33 PID 2248 wrote to memory of 3008 2248 igfxbm32.exe 34 PID 2248 wrote to memory of 3008 2248 igfxbm32.exe 34 PID 2248 wrote to memory of 3008 2248 igfxbm32.exe 34 PID 2248 wrote to memory of 3008 2248 igfxbm32.exe 34 PID 3008 wrote to memory of 1644 3008 igfxbm32.exe 35 PID 3008 wrote to memory of 1644 3008 igfxbm32.exe 35 PID 3008 wrote to memory of 1644 3008 igfxbm32.exe 35 PID 3008 wrote to memory of 1644 3008 igfxbm32.exe 35 PID 1644 wrote to memory of 1704 1644 igfxbm32.exe 36 PID 1644 wrote to memory of 1704 1644 igfxbm32.exe 36 PID 1644 wrote to memory of 1704 1644 igfxbm32.exe 36 PID 1644 wrote to memory of 1704 1644 igfxbm32.exe 36 PID 1704 wrote to memory of 2036 1704 igfxbm32.exe 37 PID 1704 wrote to memory of 2036 1704 igfxbm32.exe 37 PID 1704 wrote to memory of 2036 1704 igfxbm32.exe 37 PID 1704 wrote to memory of 2036 1704 igfxbm32.exe 37 PID 2036 wrote to memory of 3028 2036 igfxbm32.exe 38 PID 2036 wrote to memory of 3028 2036 igfxbm32.exe 38 PID 2036 wrote to memory of 3028 2036 igfxbm32.exe 38 PID 2036 wrote to memory of 3028 2036 igfxbm32.exe 38 PID 3028 wrote to memory of 476 3028 igfxbm32.exe 39 PID 3028 wrote to memory of 476 3028 igfxbm32.exe 39 PID 3028 wrote to memory of 476 3028 igfxbm32.exe 39 PID 3028 wrote to memory of 476 3028 igfxbm32.exe 39 PID 476 wrote to memory of 1528 476 igfxbm32.exe 40 PID 476 wrote to memory of 1528 476 igfxbm32.exe 40 PID 476 wrote to memory of 1528 476 igfxbm32.exe 40 PID 476 wrote to memory of 1528 476 igfxbm32.exe 40 PID 1528 wrote to memory of 2360 1528 igfxbm32.exe 41 PID 1528 wrote to memory of 2360 1528 igfxbm32.exe 41 PID 1528 wrote to memory of 2360 1528 igfxbm32.exe 41 PID 1528 wrote to memory of 2360 1528 igfxbm32.exe 41 PID 2360 wrote to memory of 2000 2360 igfxbm32.exe 42 PID 2360 wrote to memory of 2000 2360 igfxbm32.exe 42 PID 2360 wrote to memory of 2000 2360 igfxbm32.exe 42 PID 2360 wrote to memory of 2000 2360 igfxbm32.exe 42 PID 2000 wrote to memory of 940 2000 igfxbm32.exe 43 PID 2000 wrote to memory of 940 2000 igfxbm32.exe 43 PID 2000 wrote to memory of 940 2000 igfxbm32.exe 43 PID 2000 wrote to memory of 940 2000 igfxbm32.exe 43 PID 940 wrote to memory of 784 940 igfxbm32.exe 44 PID 940 wrote to memory of 784 940 igfxbm32.exe 44 PID 940 wrote to memory of 784 940 igfxbm32.exe 44 PID 940 wrote to memory of 784 940 igfxbm32.exe 44 PID 784 wrote to memory of 1980 784 igfxbm32.exe 45 PID 784 wrote to memory of 1980 784 igfxbm32.exe 45 PID 784 wrote to memory of 1980 784 igfxbm32.exe 45 PID 784 wrote to memory of 1980 784 igfxbm32.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\e57c6b04b7cbdcfbff6fd0ac4b33c995_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e57c6b04b7cbdcfbff6fd0ac4b33c995_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Users\Admin\AppData\Local\Temp\E57C6B~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:476 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1980 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1736 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1740 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1720 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1928 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2784 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2688 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2956 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2704 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2236 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1692 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2372 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:316 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1680 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1332 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1436 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:592 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1092 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2376 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:448 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:352 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1996 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1800 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2212 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe41⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2040 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2228 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1804 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1576 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2548 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2800 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe47⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1640
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
347KB
MD5e57c6b04b7cbdcfbff6fd0ac4b33c995
SHA1e935b210d4caa388b5005c1a871ed3182a7e250a
SHA25612f59a3cdbe40ca6dbae4de01e40bf0f59f0477c273884a0656600eddcb3e866
SHA512f61d3b29612945a0a7001611259456d98e1d99c544805046347ab1cd485ba7bdc0f0d4169bae3d81012e606ab322e6d47a1629a0d6774e6777b6cba5a6436d05