Analysis
-
max time kernel
150s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 04:33
Behavioral task
behavioral1
Sample
e856b83bbe48cb575c17c32075685c22_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
e856b83bbe48cb575c17c32075685c22_JaffaCakes118.exe
-
Size
194KB
-
MD5
e856b83bbe48cb575c17c32075685c22
-
SHA1
7d0685256b7bd44171d3320ca6aea90d3929d111
-
SHA256
4655873e3b6e1fb03d845c4c9df30dd0e71c5678c8ca8f58c6682a02cdc96491
-
SHA512
c6653c4f4838ff5fc8acf0a5b28e76ad4072f8f9a1863c4a41a8a730993fb4942813cc2ab8016fe0a8d353d92921329b99934238a1ba4ad5573f2adb98bc10bb
-
SSDEEP
6144:6sworcqbcxfRNFCEgCtgstX3BFxn2IqxXB:71oqYRAlCtp2D
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2192 igfxman86.exe -
Executes dropped EXE 46 IoCs
pid Process 2192 igfxman86.exe 2436 igfxman86.exe 2672 igfxman86.exe 2132 igfxman86.exe 896 igfxman86.exe 2384 igfxman86.exe 924 igfxman86.exe 2904 igfxman86.exe 544 igfxman86.exe 1852 igfxman86.exe 2272 igfxman86.exe 2220 igfxman86.exe 1168 igfxman86.exe 1048 igfxman86.exe 1976 igfxman86.exe 928 igfxman86.exe 1848 igfxman86.exe 876 igfxman86.exe 1508 igfxman86.exe 2728 igfxman86.exe 2624 igfxman86.exe 2968 igfxman86.exe 2616 igfxman86.exe 2696 igfxman86.exe 1624 igfxman86.exe 2376 igfxman86.exe 2144 igfxman86.exe 236 igfxman86.exe 2868 igfxman86.exe 2172 igfxman86.exe 604 igfxman86.exe 2008 igfxman86.exe 2456 igfxman86.exe 2424 igfxman86.exe 2512 igfxman86.exe 1792 igfxman86.exe 316 igfxman86.exe 1860 igfxman86.exe 1620 igfxman86.exe 1076 igfxman86.exe 1884 igfxman86.exe 2552 igfxman86.exe 2536 igfxman86.exe 3008 igfxman86.exe 2916 igfxman86.exe 2284 igfxman86.exe -
Loads dropped DLL 64 IoCs
pid Process 1456 e856b83bbe48cb575c17c32075685c22_JaffaCakes118.exe 1456 e856b83bbe48cb575c17c32075685c22_JaffaCakes118.exe 2192 igfxman86.exe 2192 igfxman86.exe 2436 igfxman86.exe 2436 igfxman86.exe 2672 igfxman86.exe 2672 igfxman86.exe 2132 igfxman86.exe 2132 igfxman86.exe 896 igfxman86.exe 896 igfxman86.exe 2384 igfxman86.exe 2384 igfxman86.exe 924 igfxman86.exe 924 igfxman86.exe 2904 igfxman86.exe 2904 igfxman86.exe 544 igfxman86.exe 544 igfxman86.exe 1852 igfxman86.exe 1852 igfxman86.exe 2272 igfxman86.exe 2272 igfxman86.exe 2220 igfxman86.exe 2220 igfxman86.exe 1168 igfxman86.exe 1168 igfxman86.exe 1048 igfxman86.exe 1048 igfxman86.exe 1976 igfxman86.exe 1976 igfxman86.exe 928 igfxman86.exe 928 igfxman86.exe 1848 igfxman86.exe 1848 igfxman86.exe 876 igfxman86.exe 876 igfxman86.exe 1508 igfxman86.exe 1508 igfxman86.exe 2728 igfxman86.exe 2728 igfxman86.exe 2624 igfxman86.exe 2624 igfxman86.exe 2968 igfxman86.exe 2968 igfxman86.exe 2616 igfxman86.exe 2616 igfxman86.exe 2696 igfxman86.exe 2696 igfxman86.exe 1624 igfxman86.exe 1624 igfxman86.exe 2376 igfxman86.exe 2376 igfxman86.exe 2144 igfxman86.exe 2144 igfxman86.exe 236 igfxman86.exe 236 igfxman86.exe 2868 igfxman86.exe 2868 igfxman86.exe 2172 igfxman86.exe 2172 igfxman86.exe 604 igfxman86.exe 604 igfxman86.exe -
resource yara_rule behavioral1/memory/1456-0-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/files/0x00080000000120fd-6.dat upx behavioral1/memory/2384-47-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/924-57-0x00000000037C0000-0x000000000383E000-memory.dmp upx behavioral1/memory/544-68-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2272-83-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2272-87-0x0000000002980000-0x00000000029FE000-memory.dmp upx behavioral1/memory/2220-89-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/1976-112-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/876-129-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2624-142-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/1792-175-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/1620-191-0x0000000003380000-0x00000000033FE000-memory.dmp upx behavioral1/memory/2536-200-0x0000000000400000-0x000000000047E000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 e856b83bbe48cb575c17c32075685c22_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File opened for modification C:\Windows\SysWOW64\ e856b83bbe48cb575c17c32075685c22_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe e856b83bbe48cb575c17c32075685c22_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 47 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e856b83bbe48cb575c17c32075685c22_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1456 e856b83bbe48cb575c17c32075685c22_JaffaCakes118.exe 1456 e856b83bbe48cb575c17c32075685c22_JaffaCakes118.exe 2192 igfxman86.exe 2192 igfxman86.exe 2436 igfxman86.exe 2436 igfxman86.exe 2672 igfxman86.exe 2672 igfxman86.exe 2132 igfxman86.exe 2132 igfxman86.exe 896 igfxman86.exe 896 igfxman86.exe 2384 igfxman86.exe 2384 igfxman86.exe 924 igfxman86.exe 924 igfxman86.exe 2904 igfxman86.exe 2904 igfxman86.exe 544 igfxman86.exe 544 igfxman86.exe 1852 igfxman86.exe 1852 igfxman86.exe 2272 igfxman86.exe 2272 igfxman86.exe 2220 igfxman86.exe 2220 igfxman86.exe 1168 igfxman86.exe 1168 igfxman86.exe 1048 igfxman86.exe 1048 igfxman86.exe 1976 igfxman86.exe 1976 igfxman86.exe 928 igfxman86.exe 928 igfxman86.exe 1848 igfxman86.exe 1848 igfxman86.exe 876 igfxman86.exe 876 igfxman86.exe 1508 igfxman86.exe 1508 igfxman86.exe 2728 igfxman86.exe 2728 igfxman86.exe 2624 igfxman86.exe 2624 igfxman86.exe 2968 igfxman86.exe 2968 igfxman86.exe 2616 igfxman86.exe 2616 igfxman86.exe 2696 igfxman86.exe 2696 igfxman86.exe 1624 igfxman86.exe 1624 igfxman86.exe 2376 igfxman86.exe 2376 igfxman86.exe 2144 igfxman86.exe 2144 igfxman86.exe 236 igfxman86.exe 236 igfxman86.exe 2868 igfxman86.exe 2868 igfxman86.exe 2172 igfxman86.exe 2172 igfxman86.exe 604 igfxman86.exe 604 igfxman86.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1456 wrote to memory of 2192 1456 e856b83bbe48cb575c17c32075685c22_JaffaCakes118.exe 29 PID 1456 wrote to memory of 2192 1456 e856b83bbe48cb575c17c32075685c22_JaffaCakes118.exe 29 PID 1456 wrote to memory of 2192 1456 e856b83bbe48cb575c17c32075685c22_JaffaCakes118.exe 29 PID 1456 wrote to memory of 2192 1456 e856b83bbe48cb575c17c32075685c22_JaffaCakes118.exe 29 PID 2192 wrote to memory of 2436 2192 igfxman86.exe 30 PID 2192 wrote to memory of 2436 2192 igfxman86.exe 30 PID 2192 wrote to memory of 2436 2192 igfxman86.exe 30 PID 2192 wrote to memory of 2436 2192 igfxman86.exe 30 PID 2436 wrote to memory of 2672 2436 igfxman86.exe 31 PID 2436 wrote to memory of 2672 2436 igfxman86.exe 31 PID 2436 wrote to memory of 2672 2436 igfxman86.exe 31 PID 2436 wrote to memory of 2672 2436 igfxman86.exe 31 PID 2672 wrote to memory of 2132 2672 igfxman86.exe 32 PID 2672 wrote to memory of 2132 2672 igfxman86.exe 32 PID 2672 wrote to memory of 2132 2672 igfxman86.exe 32 PID 2672 wrote to memory of 2132 2672 igfxman86.exe 32 PID 2132 wrote to memory of 896 2132 igfxman86.exe 33 PID 2132 wrote to memory of 896 2132 igfxman86.exe 33 PID 2132 wrote to memory of 896 2132 igfxman86.exe 33 PID 2132 wrote to memory of 896 2132 igfxman86.exe 33 PID 896 wrote to memory of 2384 896 igfxman86.exe 34 PID 896 wrote to memory of 2384 896 igfxman86.exe 34 PID 896 wrote to memory of 2384 896 igfxman86.exe 34 PID 896 wrote to memory of 2384 896 igfxman86.exe 34 PID 2384 wrote to memory of 924 2384 igfxman86.exe 35 PID 2384 wrote to memory of 924 2384 igfxman86.exe 35 PID 2384 wrote to memory of 924 2384 igfxman86.exe 35 PID 2384 wrote to memory of 924 2384 igfxman86.exe 35 PID 924 wrote to memory of 2904 924 igfxman86.exe 36 PID 924 wrote to memory of 2904 924 igfxman86.exe 36 PID 924 wrote to memory of 2904 924 igfxman86.exe 36 PID 924 wrote to memory of 2904 924 igfxman86.exe 36 PID 2904 wrote to memory of 544 2904 igfxman86.exe 37 PID 2904 wrote to memory of 544 2904 igfxman86.exe 37 PID 2904 wrote to memory of 544 2904 igfxman86.exe 37 PID 2904 wrote to memory of 544 2904 igfxman86.exe 37 PID 544 wrote to memory of 1852 544 igfxman86.exe 38 PID 544 wrote to memory of 1852 544 igfxman86.exe 38 PID 544 wrote to memory of 1852 544 igfxman86.exe 38 PID 544 wrote to memory of 1852 544 igfxman86.exe 38 PID 1852 wrote to memory of 2272 1852 igfxman86.exe 39 PID 1852 wrote to memory of 2272 1852 igfxman86.exe 39 PID 1852 wrote to memory of 2272 1852 igfxman86.exe 39 PID 1852 wrote to memory of 2272 1852 igfxman86.exe 39 PID 2272 wrote to memory of 2220 2272 igfxman86.exe 40 PID 2272 wrote to memory of 2220 2272 igfxman86.exe 40 PID 2272 wrote to memory of 2220 2272 igfxman86.exe 40 PID 2272 wrote to memory of 2220 2272 igfxman86.exe 40 PID 2220 wrote to memory of 1168 2220 igfxman86.exe 41 PID 2220 wrote to memory of 1168 2220 igfxman86.exe 41 PID 2220 wrote to memory of 1168 2220 igfxman86.exe 41 PID 2220 wrote to memory of 1168 2220 igfxman86.exe 41 PID 1168 wrote to memory of 1048 1168 igfxman86.exe 42 PID 1168 wrote to memory of 1048 1168 igfxman86.exe 42 PID 1168 wrote to memory of 1048 1168 igfxman86.exe 42 PID 1168 wrote to memory of 1048 1168 igfxman86.exe 42 PID 1048 wrote to memory of 1976 1048 igfxman86.exe 43 PID 1048 wrote to memory of 1976 1048 igfxman86.exe 43 PID 1048 wrote to memory of 1976 1048 igfxman86.exe 43 PID 1048 wrote to memory of 1976 1048 igfxman86.exe 43 PID 1976 wrote to memory of 928 1976 igfxman86.exe 44 PID 1976 wrote to memory of 928 1976 igfxman86.exe 44 PID 1976 wrote to memory of 928 1976 igfxman86.exe 44 PID 1976 wrote to memory of 928 1976 igfxman86.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\e856b83bbe48cb575c17c32075685c22_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e856b83bbe48cb575c17c32075685c22_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Users\Admin\AppData\Local\Temp\E856B8~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:928 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1848 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE19⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:876 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1508 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2728 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2624 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE23⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2968 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2616 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2696 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1624 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2376 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2144 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE29⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:236 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2868 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2172 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:604 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2008 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2456 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2424 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2512 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE37⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1792 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:316 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE39⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1860 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE40⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1620 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1076 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE42⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1884 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2552 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2536 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3008 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2916 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE47⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2284
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
194KB
MD5e856b83bbe48cb575c17c32075685c22
SHA17d0685256b7bd44171d3320ca6aea90d3929d111
SHA2564655873e3b6e1fb03d845c4c9df30dd0e71c5678c8ca8f58c6682a02cdc96491
SHA512c6653c4f4838ff5fc8acf0a5b28e76ad4072f8f9a1863c4a41a8a730993fb4942813cc2ab8016fe0a8d353d92921329b99934238a1ba4ad5573f2adb98bc10bb