Analysis
-
max time kernel
148s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-09-2024 17:05
Behavioral task
behavioral1
Sample
e74cf8b213939d0ec3f8e0d12ce520db_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e74cf8b213939d0ec3f8e0d12ce520db_JaffaCakes118.exe
-
Size
201KB
-
MD5
e74cf8b213939d0ec3f8e0d12ce520db
-
SHA1
86ed6f1a642a75b59950b135ace978d3ee3e4d19
-
SHA256
a5fd0060f9f3208764e4e28f9cb9c4a4ef633b7fcf7ac64435457a1f947fc879
-
SHA512
859ae7c8abd904ecfb14d245cfebdc33449a4008b0f44066130e68b7190d70d6f388cad13c3ed1a829c5eac4948b54868f3f90f0ae6cdc75f74df4e99462885f
-
SSDEEP
6144:IACEbG3DdjjiLBpVZgy8XFSS7X23JcNs7ToV:IEkKVOyo0S7Xq2s7cV
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2788 igfxdp32.exe -
Executes dropped EXE 64 IoCs
pid Process 2788 igfxdp32.exe 2136 igfxdp32.exe 2564 igfxdp32.exe 2444 igfxdp32.exe 2752 igfxdp32.exe 2440 igfxdp32.exe 2148 igfxdp32.exe 464 igfxdp32.exe 2216 igfxdp32.exe 2336 igfxdp32.exe 2728 igfxdp32.exe 2036 igfxdp32.exe 764 igfxdp32.exe 2312 igfxdp32.exe 2476 igfxdp32.exe 912 igfxdp32.exe 1464 igfxdp32.exe 2968 igfxdp32.exe 1664 igfxdp32.exe 2856 igfxdp32.exe 2916 igfxdp32.exe 1852 igfxdp32.exe 1648 igfxdp32.exe 2308 igfxdp32.exe 1612 igfxdp32.exe 2660 igfxdp32.exe 2292 igfxdp32.exe 2460 igfxdp32.exe 2604 igfxdp32.exe 2380 igfxdp32.exe 2508 igfxdp32.exe 2148 igfxdp32.exe 2360 igfxdp32.exe 1888 igfxdp32.exe 2736 igfxdp32.exe 808 igfxdp32.exe 2764 igfxdp32.exe 284 igfxdp32.exe 1568 igfxdp32.exe 1504 igfxdp32.exe 1700 igfxdp32.exe 1452 igfxdp32.exe 2100 igfxdp32.exe 1012 igfxdp32.exe 1860 igfxdp32.exe 3064 igfxdp32.exe 2200 igfxdp32.exe 1928 igfxdp32.exe 2792 igfxdp32.exe 2616 igfxdp32.exe 2932 igfxdp32.exe 1612 igfxdp32.exe 2144 igfxdp32.exe 2664 igfxdp32.exe 2460 igfxdp32.exe 2868 igfxdp32.exe 2052 igfxdp32.exe 1668 igfxdp32.exe 1440 igfxdp32.exe 2248 igfxdp32.exe 1576 igfxdp32.exe 2040 igfxdp32.exe 852 igfxdp32.exe 2496 igfxdp32.exe -
Loads dropped DLL 64 IoCs
pid Process 2792 e74cf8b213939d0ec3f8e0d12ce520db_JaffaCakes118.exe 2792 e74cf8b213939d0ec3f8e0d12ce520db_JaffaCakes118.exe 2788 igfxdp32.exe 2788 igfxdp32.exe 2136 igfxdp32.exe 2136 igfxdp32.exe 2564 igfxdp32.exe 2564 igfxdp32.exe 2444 igfxdp32.exe 2444 igfxdp32.exe 2752 igfxdp32.exe 2752 igfxdp32.exe 2440 igfxdp32.exe 2440 igfxdp32.exe 2148 igfxdp32.exe 2148 igfxdp32.exe 464 igfxdp32.exe 464 igfxdp32.exe 2216 igfxdp32.exe 2216 igfxdp32.exe 2336 igfxdp32.exe 2336 igfxdp32.exe 2728 igfxdp32.exe 2728 igfxdp32.exe 2036 igfxdp32.exe 2036 igfxdp32.exe 764 igfxdp32.exe 764 igfxdp32.exe 2312 igfxdp32.exe 2312 igfxdp32.exe 2476 igfxdp32.exe 2476 igfxdp32.exe 912 igfxdp32.exe 912 igfxdp32.exe 1464 igfxdp32.exe 1464 igfxdp32.exe 2968 igfxdp32.exe 2968 igfxdp32.exe 1664 igfxdp32.exe 1664 igfxdp32.exe 2856 igfxdp32.exe 2856 igfxdp32.exe 2916 igfxdp32.exe 2916 igfxdp32.exe 1852 igfxdp32.exe 1852 igfxdp32.exe 1648 igfxdp32.exe 1648 igfxdp32.exe 2308 igfxdp32.exe 2308 igfxdp32.exe 1612 igfxdp32.exe 1612 igfxdp32.exe 2660 igfxdp32.exe 2660 igfxdp32.exe 2292 igfxdp32.exe 2292 igfxdp32.exe 2460 igfxdp32.exe 2460 igfxdp32.exe 2604 igfxdp32.exe 2604 igfxdp32.exe 2380 igfxdp32.exe 2380 igfxdp32.exe 2508 igfxdp32.exe 2508 igfxdp32.exe -
resource yara_rule behavioral1/memory/2792-0-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral1/files/0x00080000000120ff-6.dat upx behavioral1/memory/2788-15-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral1/memory/2788-22-0x00000000034A0000-0x0000000003521000-memory.dmp upx behavioral1/memory/2564-32-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral1/memory/2444-38-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral1/memory/2440-50-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral1/memory/2216-71-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral1/memory/1464-116-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral1/memory/1612-137-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral1/memory/2764-163-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral1/memory/1504-171-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral1/memory/3064-185-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral1/memory/2932-201-0x0000000000400000-0x0000000000481000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe e74cf8b213939d0ec3f8e0d12ce520db_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e74cf8b213939d0ec3f8e0d12ce520db_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2792 e74cf8b213939d0ec3f8e0d12ce520db_JaffaCakes118.exe 2792 e74cf8b213939d0ec3f8e0d12ce520db_JaffaCakes118.exe 2788 igfxdp32.exe 2788 igfxdp32.exe 2136 igfxdp32.exe 2136 igfxdp32.exe 2564 igfxdp32.exe 2564 igfxdp32.exe 2444 igfxdp32.exe 2444 igfxdp32.exe 2752 igfxdp32.exe 2752 igfxdp32.exe 2440 igfxdp32.exe 2440 igfxdp32.exe 2148 igfxdp32.exe 2148 igfxdp32.exe 464 igfxdp32.exe 464 igfxdp32.exe 2216 igfxdp32.exe 2216 igfxdp32.exe 2336 igfxdp32.exe 2336 igfxdp32.exe 2728 igfxdp32.exe 2728 igfxdp32.exe 2036 igfxdp32.exe 2036 igfxdp32.exe 764 igfxdp32.exe 764 igfxdp32.exe 2312 igfxdp32.exe 2312 igfxdp32.exe 2476 igfxdp32.exe 2476 igfxdp32.exe 912 igfxdp32.exe 912 igfxdp32.exe 1464 igfxdp32.exe 1464 igfxdp32.exe 2968 igfxdp32.exe 2968 igfxdp32.exe 1664 igfxdp32.exe 1664 igfxdp32.exe 2856 igfxdp32.exe 2856 igfxdp32.exe 2916 igfxdp32.exe 2916 igfxdp32.exe 1852 igfxdp32.exe 1852 igfxdp32.exe 1648 igfxdp32.exe 1648 igfxdp32.exe 2308 igfxdp32.exe 2308 igfxdp32.exe 1612 igfxdp32.exe 1612 igfxdp32.exe 2660 igfxdp32.exe 2660 igfxdp32.exe 2292 igfxdp32.exe 2292 igfxdp32.exe 2460 igfxdp32.exe 2460 igfxdp32.exe 2604 igfxdp32.exe 2604 igfxdp32.exe 2380 igfxdp32.exe 2380 igfxdp32.exe 2508 igfxdp32.exe 2508 igfxdp32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2788 2792 e74cf8b213939d0ec3f8e0d12ce520db_JaffaCakes118.exe 28 PID 2792 wrote to memory of 2788 2792 e74cf8b213939d0ec3f8e0d12ce520db_JaffaCakes118.exe 28 PID 2792 wrote to memory of 2788 2792 e74cf8b213939d0ec3f8e0d12ce520db_JaffaCakes118.exe 28 PID 2792 wrote to memory of 2788 2792 e74cf8b213939d0ec3f8e0d12ce520db_JaffaCakes118.exe 28 PID 2788 wrote to memory of 2136 2788 igfxdp32.exe 29 PID 2788 wrote to memory of 2136 2788 igfxdp32.exe 29 PID 2788 wrote to memory of 2136 2788 igfxdp32.exe 29 PID 2788 wrote to memory of 2136 2788 igfxdp32.exe 29 PID 2136 wrote to memory of 2564 2136 igfxdp32.exe 30 PID 2136 wrote to memory of 2564 2136 igfxdp32.exe 30 PID 2136 wrote to memory of 2564 2136 igfxdp32.exe 30 PID 2136 wrote to memory of 2564 2136 igfxdp32.exe 30 PID 2564 wrote to memory of 2444 2564 igfxdp32.exe 31 PID 2564 wrote to memory of 2444 2564 igfxdp32.exe 31 PID 2564 wrote to memory of 2444 2564 igfxdp32.exe 31 PID 2564 wrote to memory of 2444 2564 igfxdp32.exe 31 PID 2444 wrote to memory of 2752 2444 igfxdp32.exe 32 PID 2444 wrote to memory of 2752 2444 igfxdp32.exe 32 PID 2444 wrote to memory of 2752 2444 igfxdp32.exe 32 PID 2444 wrote to memory of 2752 2444 igfxdp32.exe 32 PID 2752 wrote to memory of 2440 2752 igfxdp32.exe 33 PID 2752 wrote to memory of 2440 2752 igfxdp32.exe 33 PID 2752 wrote to memory of 2440 2752 igfxdp32.exe 33 PID 2752 wrote to memory of 2440 2752 igfxdp32.exe 33 PID 2440 wrote to memory of 2148 2440 igfxdp32.exe 34 PID 2440 wrote to memory of 2148 2440 igfxdp32.exe 34 PID 2440 wrote to memory of 2148 2440 igfxdp32.exe 34 PID 2440 wrote to memory of 2148 2440 igfxdp32.exe 34 PID 2148 wrote to memory of 464 2148 igfxdp32.exe 37 PID 2148 wrote to memory of 464 2148 igfxdp32.exe 37 PID 2148 wrote to memory of 464 2148 igfxdp32.exe 37 PID 2148 wrote to memory of 464 2148 igfxdp32.exe 37 PID 464 wrote to memory of 2216 464 igfxdp32.exe 38 PID 464 wrote to memory of 2216 464 igfxdp32.exe 38 PID 464 wrote to memory of 2216 464 igfxdp32.exe 38 PID 464 wrote to memory of 2216 464 igfxdp32.exe 38 PID 2216 wrote to memory of 2336 2216 igfxdp32.exe 39 PID 2216 wrote to memory of 2336 2216 igfxdp32.exe 39 PID 2216 wrote to memory of 2336 2216 igfxdp32.exe 39 PID 2216 wrote to memory of 2336 2216 igfxdp32.exe 39 PID 2336 wrote to memory of 2728 2336 igfxdp32.exe 40 PID 2336 wrote to memory of 2728 2336 igfxdp32.exe 40 PID 2336 wrote to memory of 2728 2336 igfxdp32.exe 40 PID 2336 wrote to memory of 2728 2336 igfxdp32.exe 40 PID 2728 wrote to memory of 2036 2728 igfxdp32.exe 41 PID 2728 wrote to memory of 2036 2728 igfxdp32.exe 41 PID 2728 wrote to memory of 2036 2728 igfxdp32.exe 41 PID 2728 wrote to memory of 2036 2728 igfxdp32.exe 41 PID 2036 wrote to memory of 764 2036 igfxdp32.exe 42 PID 2036 wrote to memory of 764 2036 igfxdp32.exe 42 PID 2036 wrote to memory of 764 2036 igfxdp32.exe 42 PID 2036 wrote to memory of 764 2036 igfxdp32.exe 42 PID 764 wrote to memory of 2312 764 igfxdp32.exe 43 PID 764 wrote to memory of 2312 764 igfxdp32.exe 43 PID 764 wrote to memory of 2312 764 igfxdp32.exe 43 PID 764 wrote to memory of 2312 764 igfxdp32.exe 43 PID 2312 wrote to memory of 2476 2312 igfxdp32.exe 44 PID 2312 wrote to memory of 2476 2312 igfxdp32.exe 44 PID 2312 wrote to memory of 2476 2312 igfxdp32.exe 44 PID 2312 wrote to memory of 2476 2312 igfxdp32.exe 44 PID 2476 wrote to memory of 912 2476 igfxdp32.exe 45 PID 2476 wrote to memory of 912 2476 igfxdp32.exe 45 PID 2476 wrote to memory of 912 2476 igfxdp32.exe 45 PID 2476 wrote to memory of 912 2476 igfxdp32.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\e74cf8b213939d0ec3f8e0d12ce520db_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e74cf8b213939d0ec3f8e0d12ce520db_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Users\Admin\AppData\Local\Temp\E74CF8~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:912 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1464 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2968 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1664 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2856 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2916 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1852 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1648 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2308 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1612 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2660 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2292 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2460 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2604 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2380 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2508 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2148 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2360 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1888 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2736 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:808 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2764 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:284 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1568 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe41⤵
- Executes dropped EXE
- Maps connected drives based on registry
PID:1504 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1700 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1452 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe44⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2100 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1012 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1860 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe47⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3064 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe48⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2200 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe49⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1928 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2792 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2616 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe52⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2932 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe53⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1612 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe54⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2144 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe55⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2664 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe56⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2460 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe57⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2868 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe58⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2052 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe59⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1668 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe60⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1440 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe61⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2248 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe62⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1576 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe63⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2040 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe64⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:852 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2496 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe66⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1588 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe67⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1188 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe68⤵
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2820 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe69⤵
- System Location Discovery: System Language Discovery
PID:1304
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
201KB
MD5e74cf8b213939d0ec3f8e0d12ce520db
SHA186ed6f1a642a75b59950b135ace978d3ee3e4d19
SHA256a5fd0060f9f3208764e4e28f9cb9c4a4ef633b7fcf7ac64435457a1f947fc879
SHA512859ae7c8abd904ecfb14d245cfebdc33449a4008b0f44066130e68b7190d70d6f388cad13c3ed1a829c5eac4948b54868f3f90f0ae6cdc75f74df4e99462885f