Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 00:47
Static task
static1
Behavioral task
behavioral1
Sample
e80335b2fcc4abe862fe03d174e6a0c6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e80335b2fcc4abe862fe03d174e6a0c6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e80335b2fcc4abe862fe03d174e6a0c6_JaffaCakes118.exe
-
Size
278KB
-
MD5
e80335b2fcc4abe862fe03d174e6a0c6
-
SHA1
58fc5af7ff5d85d75fdfb8f05781e4960e9e6c60
-
SHA256
6d78d8d2be57b275897b5a7d854ca07886c6db8ac0893cadf8c965164ba8d145
-
SHA512
95e901abbe7c5a11288b115f03df69a2c5c9d7d7a421f0e46cec718fe47fac55d183d5b2b7e66717adf4bbaa4a7b51550a07f6d237aa4b2d401df0f3ba1d0069
-
SSDEEP
6144:K0WJlMiT7fPpLPTH6N540aNLOdSaPVordYvWTQ:/WJqG73p/aApLOjKpY9
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 3032 igfxdp32.exe -
Executes dropped EXE 57 IoCs
pid Process 3032 igfxdp32.exe 2656 igfxdp32.exe 2568 igfxdp32.exe 1664 igfxdp32.exe 1924 igfxdp32.exe 1192 igfxdp32.exe 2212 igfxdp32.exe 1060 igfxdp32.exe 1344 igfxdp32.exe 2016 igfxdp32.exe 2052 igfxdp32.exe 2236 igfxdp32.exe 2412 igfxdp32.exe 932 igfxdp32.exe 940 igfxdp32.exe 1088 igfxdp32.exe 2676 igfxdp32.exe 756 igfxdp32.exe 1880 igfxdp32.exe 2172 igfxdp32.exe 1704 igfxdp32.exe 2284 igfxdp32.exe 1560 igfxdp32.exe 1920 igfxdp32.exe 2652 igfxdp32.exe 2012 igfxdp32.exe 2556 igfxdp32.exe 2476 igfxdp32.exe 920 igfxdp32.exe 1236 igfxdp32.exe 572 igfxdp32.exe 992 igfxdp32.exe 1420 igfxdp32.exe 1204 igfxdp32.exe 2460 igfxdp32.exe 468 igfxdp32.exe 2028 igfxdp32.exe 2116 igfxdp32.exe 2872 igfxdp32.exe 1564 igfxdp32.exe 1208 igfxdp32.exe 892 igfxdp32.exe 1780 igfxdp32.exe 824 igfxdp32.exe 2292 igfxdp32.exe 2272 igfxdp32.exe 1448 igfxdp32.exe 3012 igfxdp32.exe 2140 igfxdp32.exe 2748 igfxdp32.exe 2728 igfxdp32.exe 3024 igfxdp32.exe 2856 igfxdp32.exe 2608 igfxdp32.exe 2656 igfxdp32.exe 2472 igfxdp32.exe 2332 igfxdp32.exe -
Loads dropped DLL 64 IoCs
pid Process 2732 e80335b2fcc4abe862fe03d174e6a0c6_JaffaCakes118.exe 2732 e80335b2fcc4abe862fe03d174e6a0c6_JaffaCakes118.exe 3032 igfxdp32.exe 3032 igfxdp32.exe 2656 igfxdp32.exe 2656 igfxdp32.exe 2568 igfxdp32.exe 2568 igfxdp32.exe 1664 igfxdp32.exe 1664 igfxdp32.exe 1924 igfxdp32.exe 1924 igfxdp32.exe 1192 igfxdp32.exe 1192 igfxdp32.exe 2212 igfxdp32.exe 2212 igfxdp32.exe 1060 igfxdp32.exe 1060 igfxdp32.exe 1344 igfxdp32.exe 1344 igfxdp32.exe 2016 igfxdp32.exe 2016 igfxdp32.exe 2052 igfxdp32.exe 2052 igfxdp32.exe 2236 igfxdp32.exe 2236 igfxdp32.exe 2412 igfxdp32.exe 2412 igfxdp32.exe 932 igfxdp32.exe 932 igfxdp32.exe 940 igfxdp32.exe 940 igfxdp32.exe 1088 igfxdp32.exe 1088 igfxdp32.exe 2676 igfxdp32.exe 2676 igfxdp32.exe 756 igfxdp32.exe 756 igfxdp32.exe 1880 igfxdp32.exe 1880 igfxdp32.exe 2172 igfxdp32.exe 2172 igfxdp32.exe 1704 igfxdp32.exe 1704 igfxdp32.exe 2284 igfxdp32.exe 2284 igfxdp32.exe 1560 igfxdp32.exe 1560 igfxdp32.exe 1920 igfxdp32.exe 1920 igfxdp32.exe 2652 igfxdp32.exe 2652 igfxdp32.exe 2012 igfxdp32.exe 2012 igfxdp32.exe 2556 igfxdp32.exe 2556 igfxdp32.exe 2476 igfxdp32.exe 2476 igfxdp32.exe 920 igfxdp32.exe 920 igfxdp32.exe 1236 igfxdp32.exe 1236 igfxdp32.exe 572 igfxdp32.exe 572 igfxdp32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum e80335b2fcc4abe862fe03d174e6a0c6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdp32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe e80335b2fcc4abe862fe03d174e6a0c6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe e80335b2fcc4abe862fe03d174e6a0c6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File created C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\igfxdp32.exe igfxdp32.exe File opened for modification C:\Windows\SysWOW64\ igfxdp32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 58 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e80335b2fcc4abe862fe03d174e6a0c6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdp32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2732 e80335b2fcc4abe862fe03d174e6a0c6_JaffaCakes118.exe 2732 e80335b2fcc4abe862fe03d174e6a0c6_JaffaCakes118.exe 3032 igfxdp32.exe 3032 igfxdp32.exe 2656 igfxdp32.exe 2656 igfxdp32.exe 2568 igfxdp32.exe 2568 igfxdp32.exe 1664 igfxdp32.exe 1664 igfxdp32.exe 1924 igfxdp32.exe 1924 igfxdp32.exe 1192 igfxdp32.exe 1192 igfxdp32.exe 2212 igfxdp32.exe 2212 igfxdp32.exe 1060 igfxdp32.exe 1060 igfxdp32.exe 1344 igfxdp32.exe 1344 igfxdp32.exe 2016 igfxdp32.exe 2016 igfxdp32.exe 2052 igfxdp32.exe 2052 igfxdp32.exe 2236 igfxdp32.exe 2236 igfxdp32.exe 2412 igfxdp32.exe 2412 igfxdp32.exe 932 igfxdp32.exe 932 igfxdp32.exe 940 igfxdp32.exe 940 igfxdp32.exe 1088 igfxdp32.exe 1088 igfxdp32.exe 2676 igfxdp32.exe 2676 igfxdp32.exe 756 igfxdp32.exe 756 igfxdp32.exe 1880 igfxdp32.exe 1880 igfxdp32.exe 2172 igfxdp32.exe 2172 igfxdp32.exe 1704 igfxdp32.exe 1704 igfxdp32.exe 2284 igfxdp32.exe 2284 igfxdp32.exe 1560 igfxdp32.exe 1560 igfxdp32.exe 1920 igfxdp32.exe 1920 igfxdp32.exe 2652 igfxdp32.exe 2652 igfxdp32.exe 2012 igfxdp32.exe 2012 igfxdp32.exe 2556 igfxdp32.exe 2556 igfxdp32.exe 2476 igfxdp32.exe 2476 igfxdp32.exe 920 igfxdp32.exe 920 igfxdp32.exe 1236 igfxdp32.exe 1236 igfxdp32.exe 572 igfxdp32.exe 572 igfxdp32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2732 wrote to memory of 3032 2732 e80335b2fcc4abe862fe03d174e6a0c6_JaffaCakes118.exe 30 PID 2732 wrote to memory of 3032 2732 e80335b2fcc4abe862fe03d174e6a0c6_JaffaCakes118.exe 30 PID 2732 wrote to memory of 3032 2732 e80335b2fcc4abe862fe03d174e6a0c6_JaffaCakes118.exe 30 PID 2732 wrote to memory of 3032 2732 e80335b2fcc4abe862fe03d174e6a0c6_JaffaCakes118.exe 30 PID 3032 wrote to memory of 2656 3032 igfxdp32.exe 31 PID 3032 wrote to memory of 2656 3032 igfxdp32.exe 31 PID 3032 wrote to memory of 2656 3032 igfxdp32.exe 31 PID 3032 wrote to memory of 2656 3032 igfxdp32.exe 31 PID 2656 wrote to memory of 2568 2656 igfxdp32.exe 32 PID 2656 wrote to memory of 2568 2656 igfxdp32.exe 32 PID 2656 wrote to memory of 2568 2656 igfxdp32.exe 32 PID 2656 wrote to memory of 2568 2656 igfxdp32.exe 32 PID 2568 wrote to memory of 1664 2568 igfxdp32.exe 33 PID 2568 wrote to memory of 1664 2568 igfxdp32.exe 33 PID 2568 wrote to memory of 1664 2568 igfxdp32.exe 33 PID 2568 wrote to memory of 1664 2568 igfxdp32.exe 33 PID 1664 wrote to memory of 1924 1664 igfxdp32.exe 34 PID 1664 wrote to memory of 1924 1664 igfxdp32.exe 34 PID 1664 wrote to memory of 1924 1664 igfxdp32.exe 34 PID 1664 wrote to memory of 1924 1664 igfxdp32.exe 34 PID 1924 wrote to memory of 1192 1924 igfxdp32.exe 35 PID 1924 wrote to memory of 1192 1924 igfxdp32.exe 35 PID 1924 wrote to memory of 1192 1924 igfxdp32.exe 35 PID 1924 wrote to memory of 1192 1924 igfxdp32.exe 35 PID 1192 wrote to memory of 2212 1192 igfxdp32.exe 36 PID 1192 wrote to memory of 2212 1192 igfxdp32.exe 36 PID 1192 wrote to memory of 2212 1192 igfxdp32.exe 36 PID 1192 wrote to memory of 2212 1192 igfxdp32.exe 36 PID 2212 wrote to memory of 1060 2212 igfxdp32.exe 37 PID 2212 wrote to memory of 1060 2212 igfxdp32.exe 37 PID 2212 wrote to memory of 1060 2212 igfxdp32.exe 37 PID 2212 wrote to memory of 1060 2212 igfxdp32.exe 37 PID 1060 wrote to memory of 1344 1060 igfxdp32.exe 38 PID 1060 wrote to memory of 1344 1060 igfxdp32.exe 38 PID 1060 wrote to memory of 1344 1060 igfxdp32.exe 38 PID 1060 wrote to memory of 1344 1060 igfxdp32.exe 38 PID 1344 wrote to memory of 2016 1344 igfxdp32.exe 39 PID 1344 wrote to memory of 2016 1344 igfxdp32.exe 39 PID 1344 wrote to memory of 2016 1344 igfxdp32.exe 39 PID 1344 wrote to memory of 2016 1344 igfxdp32.exe 39 PID 2016 wrote to memory of 2052 2016 igfxdp32.exe 40 PID 2016 wrote to memory of 2052 2016 igfxdp32.exe 40 PID 2016 wrote to memory of 2052 2016 igfxdp32.exe 40 PID 2016 wrote to memory of 2052 2016 igfxdp32.exe 40 PID 2052 wrote to memory of 2236 2052 igfxdp32.exe 41 PID 2052 wrote to memory of 2236 2052 igfxdp32.exe 41 PID 2052 wrote to memory of 2236 2052 igfxdp32.exe 41 PID 2052 wrote to memory of 2236 2052 igfxdp32.exe 41 PID 2236 wrote to memory of 2412 2236 igfxdp32.exe 42 PID 2236 wrote to memory of 2412 2236 igfxdp32.exe 42 PID 2236 wrote to memory of 2412 2236 igfxdp32.exe 42 PID 2236 wrote to memory of 2412 2236 igfxdp32.exe 42 PID 2412 wrote to memory of 932 2412 igfxdp32.exe 43 PID 2412 wrote to memory of 932 2412 igfxdp32.exe 43 PID 2412 wrote to memory of 932 2412 igfxdp32.exe 43 PID 2412 wrote to memory of 932 2412 igfxdp32.exe 43 PID 932 wrote to memory of 940 932 igfxdp32.exe 44 PID 932 wrote to memory of 940 932 igfxdp32.exe 44 PID 932 wrote to memory of 940 932 igfxdp32.exe 44 PID 932 wrote to memory of 940 932 igfxdp32.exe 44 PID 940 wrote to memory of 1088 940 igfxdp32.exe 45 PID 940 wrote to memory of 1088 940 igfxdp32.exe 45 PID 940 wrote to memory of 1088 940 igfxdp32.exe 45 PID 940 wrote to memory of 1088 940 igfxdp32.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\e80335b2fcc4abe862fe03d174e6a0c6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e80335b2fcc4abe862fe03d174e6a0c6_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Users\Admin\AppData\Local\Temp\E80335~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1088 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2676 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:756 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1880 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2172 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1704 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2284 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1560 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1920 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2652 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2012 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2556 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2476 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:920 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1236 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:572 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:992 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1420 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1204 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2460 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:468 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2028 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2116 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2872 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1564 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe42⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1208 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:892 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1780 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:824 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2292 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe47⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2272 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe48⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1448 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3012 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe50⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2140 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2748 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe52⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2728 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe53⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3024 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe54⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2856 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe55⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2608 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe56⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2656 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe57⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2472 -
C:\Windows\SysWOW64\igfxdp32.exe"C:\Windows\system32\igfxdp32.exe" C:\Windows\SysWOW64\igfxdp32.exe58⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2332
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
278KB
MD5e80335b2fcc4abe862fe03d174e6a0c6
SHA158fc5af7ff5d85d75fdfb8f05781e4960e9e6c60
SHA2566d78d8d2be57b275897b5a7d854ca07886c6db8ac0893cadf8c965164ba8d145
SHA51295e901abbe7c5a11288b115f03df69a2c5c9d7d7a421f0e46cec718fe47fac55d183d5b2b7e66717adf4bbaa4a7b51550a07f6d237aa4b2d401df0f3ba1d0069