Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17-09-2024 23:05
Behavioral task
behavioral1
Sample
e7dea41d39769ee236261318033022be_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e7dea41d39769ee236261318033022be_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e7dea41d39769ee236261318033022be_JaffaCakes118.exe
-
Size
187KB
-
MD5
e7dea41d39769ee236261318033022be
-
SHA1
e6c917b1e02d55a9588b27acdaca0730695410ef
-
SHA256
d5b165042e2c9e33785a1afb4890aef9a3ab28288ddfc9bf9ec6e57344d9efde
-
SHA512
086dc6eeb4edd260b0a5df9373afb9fd3181df2e10fed6ab041e084939830cab181cdd447b69f9adc92e687c069da0843726cb460a91f466c6b2930a97b615aa
-
SSDEEP
3072:BUp2Xm85V5glkgjlkC9KBAsPJx3rRmS/EOqkvg+FouthaUJrXw8bGLnry:BwrXjadBAsz3cUSkoUoS4QjXIn2
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2436 igfxpk32.exe -
Executes dropped EXE 64 IoCs
pid Process 2436 igfxpk32.exe 2652 igfxpk32.exe 2244 igfxpk32.exe 832 igfxpk32.exe 1524 igfxpk32.exe 1360 igfxpk32.exe 2088 igfxpk32.exe 1760 igfxpk32.exe 2016 igfxpk32.exe 2932 igfxpk32.exe 2952 igfxpk32.exe 3028 igfxpk32.exe 1812 igfxpk32.exe 3032 igfxpk32.exe 1780 igfxpk32.exe 1516 igfxpk32.exe 2356 igfxpk32.exe 1480 igfxpk32.exe 2892 igfxpk32.exe 644 igfxpk32.exe 3060 igfxpk32.exe 3064 igfxpk32.exe 3028 igfxpk32.exe 1748 igfxpk32.exe 1048 igfxpk32.exe 1988 igfxpk32.exe 2488 igfxpk32.exe 2788 igfxpk32.exe 2640 igfxpk32.exe 3020 igfxpk32.exe 2820 igfxpk32.exe 2168 igfxpk32.exe 3064 igfxpk32.exe 1952 igfxpk32.exe 2484 igfxpk32.exe 1784 igfxpk32.exe 2356 igfxpk32.exe 2648 igfxpk32.exe 2992 igfxpk32.exe 1484 igfxpk32.exe 2964 igfxpk32.exe 2432 igfxpk32.exe 2392 igfxpk32.exe 2120 igfxpk32.exe 2312 igfxpk32.exe 2232 igfxpk32.exe 2496 igfxpk32.exe 2824 igfxpk32.exe 2192 igfxpk32.exe 2180 igfxpk32.exe 2992 igfxpk32.exe 2696 igfxpk32.exe 2100 igfxpk32.exe 2408 igfxpk32.exe 2308 igfxpk32.exe 1672 igfxpk32.exe 2316 igfxpk32.exe 2084 igfxpk32.exe 2752 igfxpk32.exe 2028 igfxpk32.exe 924 igfxpk32.exe 1804 igfxpk32.exe 2380 igfxpk32.exe 2068 igfxpk32.exe -
Loads dropped DLL 64 IoCs
pid Process 2568 e7dea41d39769ee236261318033022be_JaffaCakes118.exe 2568 e7dea41d39769ee236261318033022be_JaffaCakes118.exe 2436 igfxpk32.exe 2436 igfxpk32.exe 2652 igfxpk32.exe 2652 igfxpk32.exe 2244 igfxpk32.exe 2244 igfxpk32.exe 832 igfxpk32.exe 832 igfxpk32.exe 1524 igfxpk32.exe 1524 igfxpk32.exe 1360 igfxpk32.exe 1360 igfxpk32.exe 2088 igfxpk32.exe 2088 igfxpk32.exe 1760 igfxpk32.exe 1760 igfxpk32.exe 2016 igfxpk32.exe 2016 igfxpk32.exe 2932 igfxpk32.exe 2932 igfxpk32.exe 2952 igfxpk32.exe 2952 igfxpk32.exe 3028 igfxpk32.exe 3028 igfxpk32.exe 1812 igfxpk32.exe 1812 igfxpk32.exe 3032 igfxpk32.exe 3032 igfxpk32.exe 1780 igfxpk32.exe 1780 igfxpk32.exe 1516 igfxpk32.exe 1516 igfxpk32.exe 2356 igfxpk32.exe 2356 igfxpk32.exe 1480 igfxpk32.exe 1480 igfxpk32.exe 2892 igfxpk32.exe 2892 igfxpk32.exe 644 igfxpk32.exe 644 igfxpk32.exe 3060 igfxpk32.exe 3060 igfxpk32.exe 3064 igfxpk32.exe 3064 igfxpk32.exe 3028 igfxpk32.exe 3028 igfxpk32.exe 1748 igfxpk32.exe 1748 igfxpk32.exe 1048 igfxpk32.exe 1048 igfxpk32.exe 1988 igfxpk32.exe 1988 igfxpk32.exe 2488 igfxpk32.exe 2488 igfxpk32.exe 2788 igfxpk32.exe 2788 igfxpk32.exe 2640 igfxpk32.exe 2640 igfxpk32.exe 3020 igfxpk32.exe 3020 igfxpk32.exe 2820 igfxpk32.exe 2820 igfxpk32.exe -
resource yara_rule behavioral1/memory/2568-0-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/files/0x0007000000012119-4.dat upx behavioral1/memory/2568-13-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2436-20-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2652-26-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2244-25-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/832-31-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2244-33-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/832-38-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/1524-43-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/1360-48-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2088-49-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2088-55-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/1760-61-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2016-60-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2016-66-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2932-71-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2952-78-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/3028-76-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/3028-83-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/1812-89-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/3032-93-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/1780-98-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/1516-101-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2356-103-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/1480-106-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2892-104-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2892-108-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/644-109-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/3060-111-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/3064-112-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/3028-114-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/1748-115-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/1748-116-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/1988-117-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/1048-119-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2488-121-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/1988-120-0x0000000003330000-0x00000000033A6000-memory.dmp upx behavioral1/memory/1988-123-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2488-125-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2788-126-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2640-128-0x00000000033A0000-0x0000000003416000-memory.dmp upx behavioral1/memory/2640-130-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/3020-131-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2820-132-0x0000000003240000-0x00000000032B6000-memory.dmp upx behavioral1/memory/2820-134-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2168-135-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/3064-137-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/1952-138-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2484-141-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/1784-139-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2356-142-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/1784-144-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2356-145-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2648-147-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2992-146-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2992-149-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/1484-150-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2964-152-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2432-153-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2392-155-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2120-157-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2312-159-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2232-160-0x0000000000400000-0x0000000000476000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 e7dea41d39769ee236261318033022be_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpk32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File created C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\ igfxpk32.exe File opened for modification C:\Windows\SysWOW64\ igfxpk32.exe File created C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\ igfxpk32.exe File opened for modification C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\ igfxpk32.exe File opened for modification C:\Windows\SysWOW64\ igfxpk32.exe File created C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\ igfxpk32.exe File opened for modification C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\ igfxpk32.exe File opened for modification C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File created C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\ igfxpk32.exe File opened for modification C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File created C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\ igfxpk32.exe File created C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\ igfxpk32.exe File opened for modification C:\Windows\SysWOW64\ igfxpk32.exe File created C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\ e7dea41d39769ee236261318033022be_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File created C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\ igfxpk32.exe File opened for modification C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\ igfxpk32.exe File created C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\ igfxpk32.exe File created C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\ igfxpk32.exe File created C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File created C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File created C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File created C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\ igfxpk32.exe File created C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File created C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File created C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File created C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\ igfxpk32.exe File opened for modification C:\Windows\SysWOW64\ igfxpk32.exe File created C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\ igfxpk32.exe File created C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\ igfxpk32.exe File opened for modification C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File created C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\igfxpk32.exe igfxpk32.exe File opened for modification C:\Windows\SysWOW64\ igfxpk32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e7dea41d39769ee236261318033022be_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpk32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2568 e7dea41d39769ee236261318033022be_JaffaCakes118.exe 2568 e7dea41d39769ee236261318033022be_JaffaCakes118.exe 2436 igfxpk32.exe 2436 igfxpk32.exe 2652 igfxpk32.exe 2652 igfxpk32.exe 2244 igfxpk32.exe 2244 igfxpk32.exe 832 igfxpk32.exe 832 igfxpk32.exe 1524 igfxpk32.exe 1524 igfxpk32.exe 1360 igfxpk32.exe 1360 igfxpk32.exe 2088 igfxpk32.exe 2088 igfxpk32.exe 1760 igfxpk32.exe 1760 igfxpk32.exe 2016 igfxpk32.exe 2016 igfxpk32.exe 2932 igfxpk32.exe 2932 igfxpk32.exe 2952 igfxpk32.exe 2952 igfxpk32.exe 3028 igfxpk32.exe 3028 igfxpk32.exe 1812 igfxpk32.exe 1812 igfxpk32.exe 3032 igfxpk32.exe 3032 igfxpk32.exe 1780 igfxpk32.exe 1780 igfxpk32.exe 1516 igfxpk32.exe 1516 igfxpk32.exe 2356 igfxpk32.exe 2356 igfxpk32.exe 1480 igfxpk32.exe 1480 igfxpk32.exe 2892 igfxpk32.exe 2892 igfxpk32.exe 644 igfxpk32.exe 644 igfxpk32.exe 3060 igfxpk32.exe 3060 igfxpk32.exe 3064 igfxpk32.exe 3064 igfxpk32.exe 3028 igfxpk32.exe 3028 igfxpk32.exe 1748 igfxpk32.exe 1748 igfxpk32.exe 1048 igfxpk32.exe 1048 igfxpk32.exe 1988 igfxpk32.exe 1988 igfxpk32.exe 2488 igfxpk32.exe 2488 igfxpk32.exe 2788 igfxpk32.exe 2788 igfxpk32.exe 2640 igfxpk32.exe 2640 igfxpk32.exe 3020 igfxpk32.exe 3020 igfxpk32.exe 2820 igfxpk32.exe 2820 igfxpk32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2568 wrote to memory of 2436 2568 e7dea41d39769ee236261318033022be_JaffaCakes118.exe 30 PID 2568 wrote to memory of 2436 2568 e7dea41d39769ee236261318033022be_JaffaCakes118.exe 30 PID 2568 wrote to memory of 2436 2568 e7dea41d39769ee236261318033022be_JaffaCakes118.exe 30 PID 2568 wrote to memory of 2436 2568 e7dea41d39769ee236261318033022be_JaffaCakes118.exe 30 PID 2436 wrote to memory of 2652 2436 igfxpk32.exe 32 PID 2436 wrote to memory of 2652 2436 igfxpk32.exe 32 PID 2436 wrote to memory of 2652 2436 igfxpk32.exe 32 PID 2436 wrote to memory of 2652 2436 igfxpk32.exe 32 PID 2652 wrote to memory of 2244 2652 igfxpk32.exe 33 PID 2652 wrote to memory of 2244 2652 igfxpk32.exe 33 PID 2652 wrote to memory of 2244 2652 igfxpk32.exe 33 PID 2652 wrote to memory of 2244 2652 igfxpk32.exe 33 PID 2244 wrote to memory of 832 2244 igfxpk32.exe 34 PID 2244 wrote to memory of 832 2244 igfxpk32.exe 34 PID 2244 wrote to memory of 832 2244 igfxpk32.exe 34 PID 2244 wrote to memory of 832 2244 igfxpk32.exe 34 PID 832 wrote to memory of 1524 832 igfxpk32.exe 35 PID 832 wrote to memory of 1524 832 igfxpk32.exe 35 PID 832 wrote to memory of 1524 832 igfxpk32.exe 35 PID 832 wrote to memory of 1524 832 igfxpk32.exe 35 PID 1524 wrote to memory of 1360 1524 igfxpk32.exe 36 PID 1524 wrote to memory of 1360 1524 igfxpk32.exe 36 PID 1524 wrote to memory of 1360 1524 igfxpk32.exe 36 PID 1524 wrote to memory of 1360 1524 igfxpk32.exe 36 PID 1360 wrote to memory of 2088 1360 igfxpk32.exe 37 PID 1360 wrote to memory of 2088 1360 igfxpk32.exe 37 PID 1360 wrote to memory of 2088 1360 igfxpk32.exe 37 PID 1360 wrote to memory of 2088 1360 igfxpk32.exe 37 PID 2088 wrote to memory of 1760 2088 igfxpk32.exe 38 PID 2088 wrote to memory of 1760 2088 igfxpk32.exe 38 PID 2088 wrote to memory of 1760 2088 igfxpk32.exe 38 PID 2088 wrote to memory of 1760 2088 igfxpk32.exe 38 PID 1760 wrote to memory of 2016 1760 igfxpk32.exe 39 PID 1760 wrote to memory of 2016 1760 igfxpk32.exe 39 PID 1760 wrote to memory of 2016 1760 igfxpk32.exe 39 PID 1760 wrote to memory of 2016 1760 igfxpk32.exe 39 PID 2016 wrote to memory of 2932 2016 igfxpk32.exe 40 PID 2016 wrote to memory of 2932 2016 igfxpk32.exe 40 PID 2016 wrote to memory of 2932 2016 igfxpk32.exe 40 PID 2016 wrote to memory of 2932 2016 igfxpk32.exe 40 PID 2932 wrote to memory of 2952 2932 igfxpk32.exe 41 PID 2932 wrote to memory of 2952 2932 igfxpk32.exe 41 PID 2932 wrote to memory of 2952 2932 igfxpk32.exe 41 PID 2932 wrote to memory of 2952 2932 igfxpk32.exe 41 PID 2952 wrote to memory of 3028 2952 igfxpk32.exe 42 PID 2952 wrote to memory of 3028 2952 igfxpk32.exe 42 PID 2952 wrote to memory of 3028 2952 igfxpk32.exe 42 PID 2952 wrote to memory of 3028 2952 igfxpk32.exe 42 PID 3028 wrote to memory of 1812 3028 igfxpk32.exe 43 PID 3028 wrote to memory of 1812 3028 igfxpk32.exe 43 PID 3028 wrote to memory of 1812 3028 igfxpk32.exe 43 PID 3028 wrote to memory of 1812 3028 igfxpk32.exe 43 PID 1812 wrote to memory of 3032 1812 igfxpk32.exe 44 PID 1812 wrote to memory of 3032 1812 igfxpk32.exe 44 PID 1812 wrote to memory of 3032 1812 igfxpk32.exe 44 PID 1812 wrote to memory of 3032 1812 igfxpk32.exe 44 PID 3032 wrote to memory of 1780 3032 igfxpk32.exe 45 PID 3032 wrote to memory of 1780 3032 igfxpk32.exe 45 PID 3032 wrote to memory of 1780 3032 igfxpk32.exe 45 PID 3032 wrote to memory of 1780 3032 igfxpk32.exe 45 PID 1780 wrote to memory of 1516 1780 igfxpk32.exe 46 PID 1780 wrote to memory of 1516 1780 igfxpk32.exe 46 PID 1780 wrote to memory of 1516 1780 igfxpk32.exe 46 PID 1780 wrote to memory of 1516 1780 igfxpk32.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7dea41d39769ee236261318033022be_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e7dea41d39769ee236261318033022be_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Users\Admin\AppData\Local\Temp\E7DEA4~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1516 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2356 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1480 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2892 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:644 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3060 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3064 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3028 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1748 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1048 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1988 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2488 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2788 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2640 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3020 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2820 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2168 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3064 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1952 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2484 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1784 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2356 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2648 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2992 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1484 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe42⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2964 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2432 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2392 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2120 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2312 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2232 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe48⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2496 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2824 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2192 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe51⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2180 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe52⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2992 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2696 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe54⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2100 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe55⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2408 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe56⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2308 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe57⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1672 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe58⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2316 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe59⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2084 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe60⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2752 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe61⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2028 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe62⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:924 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe63⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1804 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe64⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2380 -
C:\Windows\SysWOW64\igfxpk32.exe"C:\Windows\system32\igfxpk32.exe" C:\Windows\SysWOW64\igfxpk32.exe65⤵
- Executes dropped EXE
PID:2068
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
187KB
MD5e7dea41d39769ee236261318033022be
SHA1e6c917b1e02d55a9588b27acdaca0730695410ef
SHA256d5b165042e2c9e33785a1afb4890aef9a3ab28288ddfc9bf9ec6e57344d9efde
SHA512086dc6eeb4edd260b0a5df9373afb9fd3181df2e10fed6ab041e084939830cab181cdd447b69f9adc92e687c069da0843726cb460a91f466c6b2930a97b615aa