Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17-09-2024 03:40
Static task
static1
Behavioral task
behavioral1
Sample
e5fc4f4884756dea6a5990455c10dc97_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e5fc4f4884756dea6a5990455c10dc97_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e5fc4f4884756dea6a5990455c10dc97_JaffaCakes118.exe
-
Size
228KB
-
MD5
e5fc4f4884756dea6a5990455c10dc97
-
SHA1
01a3992b7b3cf1ba2ef617521a4d86e8d53a459a
-
SHA256
1075fd44284327b02b368a5884938b5b26b1f51e21d27f46dba21c729286be78
-
SHA512
12e0ad475603e7edc90e7fabf37861235801329ee4d491009dddc52f98e531f688f7bf07112434473499f6e4090ff3a1ffc4c555cf5e89662e6e49ec67ca741f
-
SSDEEP
6144:ugckIrFLd4zL/5ZqY5WrOk52tAiH/gA2uqpc:ugckULdWjPqY5Wr7SbH/gANqm
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 1152 igfxwp32.exe -
Executes dropped EXE 64 IoCs
pid Process 2116 igfxwp32.exe 1152 igfxwp32.exe 2724 igfxwp32.exe 2544 igfxwp32.exe 1516 igfxwp32.exe 892 igfxwp32.exe 2020 igfxwp32.exe 1660 igfxwp32.exe 1972 igfxwp32.exe 2648 igfxwp32.exe 1208 igfxwp32.exe 2956 igfxwp32.exe 780 igfxwp32.exe 1848 igfxwp32.exe 2180 igfxwp32.exe 1088 igfxwp32.exe 2312 igfxwp32.exe 2212 igfxwp32.exe 1488 igfxwp32.exe 2496 igfxwp32.exe 2360 igfxwp32.exe 2340 igfxwp32.exe 2764 igfxwp32.exe 2660 igfxwp32.exe 2692 igfxwp32.exe 2596 igfxwp32.exe 3000 igfxwp32.exe 1536 igfxwp32.exe 2816 igfxwp32.exe 548 igfxwp32.exe 1824 igfxwp32.exe 1672 igfxwp32.exe 2232 igfxwp32.exe 2224 igfxwp32.exe 1936 igfxwp32.exe 2820 igfxwp32.exe 3068 igfxwp32.exe 780 igfxwp32.exe 1740 igfxwp32.exe 1372 igfxwp32.exe 2188 igfxwp32.exe 2088 igfxwp32.exe 2336 igfxwp32.exe 2464 igfxwp32.exe 1596 igfxwp32.exe 3024 igfxwp32.exe 2080 igfxwp32.exe 2756 igfxwp32.exe 2876 igfxwp32.exe 2576 igfxwp32.exe 2608 igfxwp32.exe 536 igfxwp32.exe 2600 igfxwp32.exe 756 igfxwp32.exe 580 igfxwp32.exe 1204 igfxwp32.exe 2612 igfxwp32.exe 1708 igfxwp32.exe 1344 igfxwp32.exe 2588 igfxwp32.exe 2376 igfxwp32.exe 2136 igfxwp32.exe 1032 igfxwp32.exe 2856 igfxwp32.exe -
Loads dropped DLL 64 IoCs
pid Process 2980 e5fc4f4884756dea6a5990455c10dc97_JaffaCakes118.exe 2980 e5fc4f4884756dea6a5990455c10dc97_JaffaCakes118.exe 2116 igfxwp32.exe 2116 igfxwp32.exe 1152 igfxwp32.exe 1152 igfxwp32.exe 2724 igfxwp32.exe 2724 igfxwp32.exe 2544 igfxwp32.exe 2544 igfxwp32.exe 1516 igfxwp32.exe 1516 igfxwp32.exe 892 igfxwp32.exe 892 igfxwp32.exe 2020 igfxwp32.exe 2020 igfxwp32.exe 1660 igfxwp32.exe 1660 igfxwp32.exe 1972 igfxwp32.exe 1972 igfxwp32.exe 2648 igfxwp32.exe 2648 igfxwp32.exe 1208 igfxwp32.exe 1208 igfxwp32.exe 2956 igfxwp32.exe 2956 igfxwp32.exe 780 igfxwp32.exe 780 igfxwp32.exe 1848 igfxwp32.exe 1848 igfxwp32.exe 2180 igfxwp32.exe 2180 igfxwp32.exe 1088 igfxwp32.exe 1088 igfxwp32.exe 2312 igfxwp32.exe 2312 igfxwp32.exe 2212 igfxwp32.exe 2212 igfxwp32.exe 1488 igfxwp32.exe 1488 igfxwp32.exe 2496 igfxwp32.exe 2496 igfxwp32.exe 2360 igfxwp32.exe 2360 igfxwp32.exe 2340 igfxwp32.exe 2340 igfxwp32.exe 2764 igfxwp32.exe 2764 igfxwp32.exe 2660 igfxwp32.exe 2660 igfxwp32.exe 2692 igfxwp32.exe 2692 igfxwp32.exe 2596 igfxwp32.exe 2596 igfxwp32.exe 3000 igfxwp32.exe 3000 igfxwp32.exe 1536 igfxwp32.exe 1536 igfxwp32.exe 2816 igfxwp32.exe 2816 igfxwp32.exe 548 igfxwp32.exe 548 igfxwp32.exe 1824 igfxwp32.exe 1824 igfxwp32.exe -
resource yara_rule behavioral1/memory/2980-4-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2980-7-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2980-9-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2980-8-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2980-6-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2980-3-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2980-2-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2980-22-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1152-34-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1152-35-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1152-36-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1152-40-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2544-52-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2544-53-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2544-54-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2544-61-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/892-73-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/892-74-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/892-80-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1660-92-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1660-97-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2648-111-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2648-110-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2648-109-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2648-118-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2956-136-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1848-148-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1848-154-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1088-167-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1088-174-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2212-186-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2212-193-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2496-203-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2496-207-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2340-216-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2340-220-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2660-229-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2660-233-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2596-242-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2596-246-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1536-256-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1536-259-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/548-268-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/548-272-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1672-281-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1672-285-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2224-294-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2224-298-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2820-307-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2820-311-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/780-320-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/780-324-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1372-333-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1372-337-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2088-346-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2088-350-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2464-359-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2464-363-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/3024-373-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/3024-376-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2756-385-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2756-389-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2576-398-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2576-402-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum e5fc4f4884756dea6a5990455c10dc97_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 e5fc4f4884756dea6a5990455c10dc97_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxwp32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\ igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File opened for modification C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe File created C:\Windows\SysWOW64\igfxwp32.exe igfxwp32.exe -
Suspicious use of SetThreadContext 38 IoCs
description pid Process procid_target PID 2328 set thread context of 2980 2328 e5fc4f4884756dea6a5990455c10dc97_JaffaCakes118.exe 31 PID 2116 set thread context of 1152 2116 igfxwp32.exe 33 PID 2724 set thread context of 2544 2724 igfxwp32.exe 35 PID 1516 set thread context of 892 1516 igfxwp32.exe 37 PID 2020 set thread context of 1660 2020 igfxwp32.exe 39 PID 1972 set thread context of 2648 1972 igfxwp32.exe 41 PID 1208 set thread context of 2956 1208 igfxwp32.exe 43 PID 780 set thread context of 1848 780 igfxwp32.exe 45 PID 2180 set thread context of 1088 2180 igfxwp32.exe 47 PID 2312 set thread context of 2212 2312 igfxwp32.exe 49 PID 1488 set thread context of 2496 1488 igfxwp32.exe 51 PID 2360 set thread context of 2340 2360 igfxwp32.exe 53 PID 2764 set thread context of 2660 2764 igfxwp32.exe 55 PID 2692 set thread context of 2596 2692 igfxwp32.exe 57 PID 3000 set thread context of 1536 3000 igfxwp32.exe 59 PID 2816 set thread context of 548 2816 igfxwp32.exe 61 PID 1824 set thread context of 1672 1824 igfxwp32.exe 63 PID 2232 set thread context of 2224 2232 igfxwp32.exe 65 PID 1936 set thread context of 2820 1936 igfxwp32.exe 67 PID 3068 set thread context of 780 3068 igfxwp32.exe 69 PID 1740 set thread context of 1372 1740 igfxwp32.exe 71 PID 2188 set thread context of 2088 2188 igfxwp32.exe 73 PID 2336 set thread context of 2464 2336 igfxwp32.exe 75 PID 1596 set thread context of 3024 1596 igfxwp32.exe 77 PID 2080 set thread context of 2756 2080 igfxwp32.exe 79 PID 2876 set thread context of 2576 2876 igfxwp32.exe 81 PID 2608 set thread context of 536 2608 igfxwp32.exe 83 PID 2600 set thread context of 756 2600 igfxwp32.exe 85 PID 580 set thread context of 1204 580 igfxwp32.exe 87 PID 2612 set thread context of 1708 2612 igfxwp32.exe 89 PID 1344 set thread context of 2588 1344 igfxwp32.exe 91 PID 2376 set thread context of 2136 2376 igfxwp32.exe 93 PID 1032 set thread context of 2856 1032 igfxwp32.exe 95 PID 1576 set thread context of 1528 1576 igfxwp32.exe 97 PID 1704 set thread context of 668 1704 igfxwp32.exe 99 PID 1732 set thread context of 1184 1732 igfxwp32.exe 101 PID 2236 set thread context of 1948 2236 igfxwp32.exe 103 PID 3020 set thread context of 2684 3020 igfxwp32.exe 105 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5fc4f4884756dea6a5990455c10dc97_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5fc4f4884756dea6a5990455c10dc97_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxwp32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2980 e5fc4f4884756dea6a5990455c10dc97_JaffaCakes118.exe 2980 e5fc4f4884756dea6a5990455c10dc97_JaffaCakes118.exe 1152 igfxwp32.exe 1152 igfxwp32.exe 2544 igfxwp32.exe 2544 igfxwp32.exe 892 igfxwp32.exe 892 igfxwp32.exe 1660 igfxwp32.exe 1660 igfxwp32.exe 2648 igfxwp32.exe 2648 igfxwp32.exe 2956 igfxwp32.exe 2956 igfxwp32.exe 1848 igfxwp32.exe 1848 igfxwp32.exe 1088 igfxwp32.exe 1088 igfxwp32.exe 2212 igfxwp32.exe 2212 igfxwp32.exe 2496 igfxwp32.exe 2496 igfxwp32.exe 2340 igfxwp32.exe 2340 igfxwp32.exe 2660 igfxwp32.exe 2660 igfxwp32.exe 2596 igfxwp32.exe 2596 igfxwp32.exe 1536 igfxwp32.exe 1536 igfxwp32.exe 548 igfxwp32.exe 548 igfxwp32.exe 1672 igfxwp32.exe 1672 igfxwp32.exe 2224 igfxwp32.exe 2224 igfxwp32.exe 2820 igfxwp32.exe 2820 igfxwp32.exe 780 igfxwp32.exe 780 igfxwp32.exe 1372 igfxwp32.exe 1372 igfxwp32.exe 2088 igfxwp32.exe 2088 igfxwp32.exe 2464 igfxwp32.exe 2464 igfxwp32.exe 3024 igfxwp32.exe 3024 igfxwp32.exe 2756 igfxwp32.exe 2756 igfxwp32.exe 2576 igfxwp32.exe 2576 igfxwp32.exe 536 igfxwp32.exe 536 igfxwp32.exe 756 igfxwp32.exe 756 igfxwp32.exe 1204 igfxwp32.exe 1204 igfxwp32.exe 1708 igfxwp32.exe 1708 igfxwp32.exe 2588 igfxwp32.exe 2588 igfxwp32.exe 2136 igfxwp32.exe 2136 igfxwp32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2980 2328 e5fc4f4884756dea6a5990455c10dc97_JaffaCakes118.exe 31 PID 2328 wrote to memory of 2980 2328 e5fc4f4884756dea6a5990455c10dc97_JaffaCakes118.exe 31 PID 2328 wrote to memory of 2980 2328 e5fc4f4884756dea6a5990455c10dc97_JaffaCakes118.exe 31 PID 2328 wrote to memory of 2980 2328 e5fc4f4884756dea6a5990455c10dc97_JaffaCakes118.exe 31 PID 2328 wrote to memory of 2980 2328 e5fc4f4884756dea6a5990455c10dc97_JaffaCakes118.exe 31 PID 2328 wrote to memory of 2980 2328 e5fc4f4884756dea6a5990455c10dc97_JaffaCakes118.exe 31 PID 2328 wrote to memory of 2980 2328 e5fc4f4884756dea6a5990455c10dc97_JaffaCakes118.exe 31 PID 2980 wrote to memory of 2116 2980 e5fc4f4884756dea6a5990455c10dc97_JaffaCakes118.exe 32 PID 2980 wrote to memory of 2116 2980 e5fc4f4884756dea6a5990455c10dc97_JaffaCakes118.exe 32 PID 2980 wrote to memory of 2116 2980 e5fc4f4884756dea6a5990455c10dc97_JaffaCakes118.exe 32 PID 2980 wrote to memory of 2116 2980 e5fc4f4884756dea6a5990455c10dc97_JaffaCakes118.exe 32 PID 2116 wrote to memory of 1152 2116 igfxwp32.exe 33 PID 2116 wrote to memory of 1152 2116 igfxwp32.exe 33 PID 2116 wrote to memory of 1152 2116 igfxwp32.exe 33 PID 2116 wrote to memory of 1152 2116 igfxwp32.exe 33 PID 2116 wrote to memory of 1152 2116 igfxwp32.exe 33 PID 2116 wrote to memory of 1152 2116 igfxwp32.exe 33 PID 2116 wrote to memory of 1152 2116 igfxwp32.exe 33 PID 1152 wrote to memory of 2724 1152 igfxwp32.exe 34 PID 1152 wrote to memory of 2724 1152 igfxwp32.exe 34 PID 1152 wrote to memory of 2724 1152 igfxwp32.exe 34 PID 1152 wrote to memory of 2724 1152 igfxwp32.exe 34 PID 2724 wrote to memory of 2544 2724 igfxwp32.exe 35 PID 2724 wrote to memory of 2544 2724 igfxwp32.exe 35 PID 2724 wrote to memory of 2544 2724 igfxwp32.exe 35 PID 2724 wrote to memory of 2544 2724 igfxwp32.exe 35 PID 2724 wrote to memory of 2544 2724 igfxwp32.exe 35 PID 2724 wrote to memory of 2544 2724 igfxwp32.exe 35 PID 2724 wrote to memory of 2544 2724 igfxwp32.exe 35 PID 2544 wrote to memory of 1516 2544 igfxwp32.exe 36 PID 2544 wrote to memory of 1516 2544 igfxwp32.exe 36 PID 2544 wrote to memory of 1516 2544 igfxwp32.exe 36 PID 2544 wrote to memory of 1516 2544 igfxwp32.exe 36 PID 1516 wrote to memory of 892 1516 igfxwp32.exe 37 PID 1516 wrote to memory of 892 1516 igfxwp32.exe 37 PID 1516 wrote to memory of 892 1516 igfxwp32.exe 37 PID 1516 wrote to memory of 892 1516 igfxwp32.exe 37 PID 1516 wrote to memory of 892 1516 igfxwp32.exe 37 PID 1516 wrote to memory of 892 1516 igfxwp32.exe 37 PID 1516 wrote to memory of 892 1516 igfxwp32.exe 37 PID 892 wrote to memory of 2020 892 igfxwp32.exe 38 PID 892 wrote to memory of 2020 892 igfxwp32.exe 38 PID 892 wrote to memory of 2020 892 igfxwp32.exe 38 PID 892 wrote to memory of 2020 892 igfxwp32.exe 38 PID 2020 wrote to memory of 1660 2020 igfxwp32.exe 39 PID 2020 wrote to memory of 1660 2020 igfxwp32.exe 39 PID 2020 wrote to memory of 1660 2020 igfxwp32.exe 39 PID 2020 wrote to memory of 1660 2020 igfxwp32.exe 39 PID 2020 wrote to memory of 1660 2020 igfxwp32.exe 39 PID 2020 wrote to memory of 1660 2020 igfxwp32.exe 39 PID 2020 wrote to memory of 1660 2020 igfxwp32.exe 39 PID 1660 wrote to memory of 1972 1660 igfxwp32.exe 40 PID 1660 wrote to memory of 1972 1660 igfxwp32.exe 40 PID 1660 wrote to memory of 1972 1660 igfxwp32.exe 40 PID 1660 wrote to memory of 1972 1660 igfxwp32.exe 40 PID 1972 wrote to memory of 2648 1972 igfxwp32.exe 41 PID 1972 wrote to memory of 2648 1972 igfxwp32.exe 41 PID 1972 wrote to memory of 2648 1972 igfxwp32.exe 41 PID 1972 wrote to memory of 2648 1972 igfxwp32.exe 41 PID 1972 wrote to memory of 2648 1972 igfxwp32.exe 41 PID 1972 wrote to memory of 2648 1972 igfxwp32.exe 41 PID 1972 wrote to memory of 2648 1972 igfxwp32.exe 41 PID 2648 wrote to memory of 1208 2648 igfxwp32.exe 42 PID 2648 wrote to memory of 1208 2648 igfxwp32.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5fc4f4884756dea6a5990455c10dc97_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e5fc4f4884756dea6a5990455c10dc97_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\e5fc4f4884756dea6a5990455c10dc97_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e5fc4f4884756dea6a5990455c10dc97_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Users\Admin\AppData\Local\Temp\E5FC4F~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Users\Admin\AppData\Local\Temp\E5FC4F~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1208 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2956 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:780 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1848 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2180 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1088 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2312 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2212 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1488 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2496 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2360 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2340 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2764 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2660 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2692 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2596 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3000 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1536 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2816 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:548 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe33⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1824 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1672 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2232 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2224 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1936 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2820 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3068 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:780 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1740 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe42⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1372 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2188 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2088 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2336 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2464 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1596 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe48⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3024 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2080 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe50⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2756 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2876 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe52⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2576 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2608 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe54⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:536 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2600 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe56⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:756 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:580 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe58⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1204 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2612 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe60⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1708 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1344 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe62⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2588 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2376 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe64⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2136 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1032 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe66⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2856 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe67⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1576 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe68⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1528 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe69⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1704 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe70⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:668 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe71⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1732 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe72⤵
- Maps connected drives based on registry
- Drops file in System32 directory
PID:1184 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe73⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2236 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe74⤵
- Maps connected drives based on registry
PID:1948 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe75⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3020 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe76⤵
- Maps connected drives based on registry
- Drops file in System32 directory
PID:2684 -
C:\Windows\SysWOW64\igfxwp32.exe"C:\Windows\system32\igfxwp32.exe" C:\Windows\SysWOW64\igfxwp32.exe77⤵PID:2988
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
228KB
MD5e5fc4f4884756dea6a5990455c10dc97
SHA101a3992b7b3cf1ba2ef617521a4d86e8d53a459a
SHA2561075fd44284327b02b368a5884938b5b26b1f51e21d27f46dba21c729286be78
SHA51212e0ad475603e7edc90e7fabf37861235801329ee4d491009dddc52f98e531f688f7bf07112434473499f6e4090ff3a1ffc4c555cf5e89662e6e49ec67ca741f