Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 23:19
Behavioral task
behavioral1
Sample
ec61a8003d836eb279f50d1ed24244c5_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ec61a8003d836eb279f50d1ed24244c5_JaffaCakes118.exe
-
Size
194KB
-
MD5
ec61a8003d836eb279f50d1ed24244c5
-
SHA1
bd19b24b2663ffeeea2b3777bf56b4316a1183a0
-
SHA256
b8ef3081a38a6b9b29fd5da1b416443f9bba271c354a499cc1a1bc16e301be7d
-
SHA512
1530acaf7c4974fef4c144fb186a9db93542bf5b591f89a3ce86ac710049e5ef46a0f670b495d0131372d3db5516706312bc114507f4aa34667babef6c5525f2
-
SSDEEP
3072:eoZJRnJE6B4GUyfMdzEANiCBYSs7sSUjM18lZXLGZ2rL2aD+K+vFdzZYZR:FdeFGUfzEANil7cM1KLGZ23T+K+dzZY3
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2948 igfxdkc32.exe -
Executes dropped EXE 47 IoCs
pid Process 2948 igfxdkc32.exe 2752 igfxdkc32.exe 2708 igfxdkc32.exe 2544 igfxdkc32.exe 2100 igfxdkc32.exe 2368 igfxdkc32.exe 1604 igfxdkc32.exe 576 igfxdkc32.exe 2604 igfxdkc32.exe 2360 igfxdkc32.exe 1916 igfxdkc32.exe 1792 igfxdkc32.exe 972 igfxdkc32.exe 1732 igfxdkc32.exe 2476 igfxdkc32.exe 2624 igfxdkc32.exe 1888 igfxdkc32.exe 1500 igfxdkc32.exe 2928 igfxdkc32.exe 2740 igfxdkc32.exe 2800 igfxdkc32.exe 2992 igfxdkc32.exe 2660 igfxdkc32.exe 2468 igfxdkc32.exe 2320 igfxdkc32.exe 592 igfxdkc32.exe 2332 igfxdkc32.exe 768 igfxdkc32.exe 1960 igfxdkc32.exe 2276 igfxdkc32.exe 2516 igfxdkc32.exe 2032 igfxdkc32.exe 712 igfxdkc32.exe 1940 igfxdkc32.exe 788 igfxdkc32.exe 2968 igfxdkc32.exe 1584 igfxdkc32.exe 2200 igfxdkc32.exe 1780 igfxdkc32.exe 1888 igfxdkc32.exe 316 igfxdkc32.exe 2336 igfxdkc32.exe 2148 igfxdkc32.exe 2728 igfxdkc32.exe 1152 igfxdkc32.exe 2664 igfxdkc32.exe 2960 igfxdkc32.exe -
Loads dropped DLL 64 IoCs
pid Process 2148 ec61a8003d836eb279f50d1ed24244c5_JaffaCakes118.exe 2148 ec61a8003d836eb279f50d1ed24244c5_JaffaCakes118.exe 2948 igfxdkc32.exe 2948 igfxdkc32.exe 2752 igfxdkc32.exe 2752 igfxdkc32.exe 2708 igfxdkc32.exe 2708 igfxdkc32.exe 2544 igfxdkc32.exe 2544 igfxdkc32.exe 2100 igfxdkc32.exe 2100 igfxdkc32.exe 2368 igfxdkc32.exe 2368 igfxdkc32.exe 1604 igfxdkc32.exe 1604 igfxdkc32.exe 576 igfxdkc32.exe 576 igfxdkc32.exe 2604 igfxdkc32.exe 2604 igfxdkc32.exe 2360 igfxdkc32.exe 2360 igfxdkc32.exe 1916 igfxdkc32.exe 1916 igfxdkc32.exe 1792 igfxdkc32.exe 1792 igfxdkc32.exe 972 igfxdkc32.exe 972 igfxdkc32.exe 1732 igfxdkc32.exe 1732 igfxdkc32.exe 2476 igfxdkc32.exe 2476 igfxdkc32.exe 2624 igfxdkc32.exe 2624 igfxdkc32.exe 1888 igfxdkc32.exe 1888 igfxdkc32.exe 1500 igfxdkc32.exe 1500 igfxdkc32.exe 2928 igfxdkc32.exe 2928 igfxdkc32.exe 2740 igfxdkc32.exe 2740 igfxdkc32.exe 2800 igfxdkc32.exe 2800 igfxdkc32.exe 2992 igfxdkc32.exe 2992 igfxdkc32.exe 2660 igfxdkc32.exe 2660 igfxdkc32.exe 2468 igfxdkc32.exe 2468 igfxdkc32.exe 2320 igfxdkc32.exe 2320 igfxdkc32.exe 592 igfxdkc32.exe 592 igfxdkc32.exe 2332 igfxdkc32.exe 2332 igfxdkc32.exe 768 igfxdkc32.exe 768 igfxdkc32.exe 1960 igfxdkc32.exe 1960 igfxdkc32.exe 2276 igfxdkc32.exe 2276 igfxdkc32.exe 2516 igfxdkc32.exe 2516 igfxdkc32.exe -
resource yara_rule behavioral1/memory/2148-0-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2148-2-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/files/0x000e000000013a51-6.dat upx behavioral1/memory/2948-13-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2948-14-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2948-17-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2148-16-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2948-25-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2708-31-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2752-30-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2708-35-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2544-41-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2368-47-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2100-49-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/1604-57-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2368-56-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/1604-64-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/576-71-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2604-72-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2604-79-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/1916-87-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2360-86-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/1916-93-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/1792-99-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/972-100-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/972-107-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/1732-112-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2624-120-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2476-119-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2624-124-0x00000000034A0000-0x0000000003522000-memory.dmp upx behavioral1/memory/2624-126-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/1888-127-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/1888-132-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2928-135-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/1500-134-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2928-137-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2800-140-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2740-139-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2800-142-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2992-144-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2660-146-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2468-149-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2320-150-0x0000000003780000-0x0000000003802000-memory.dmp upx behavioral1/memory/592-153-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2320-152-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/592-155-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/768-159-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2332-158-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/768-161-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/1960-162-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2276-165-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/1960-164-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2276-167-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2032-169-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2516-168-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2032-171-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/712-173-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2516-172-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/712-175-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/1940-176-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/1940-178-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2968-180-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/788-179-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/788-181-0x0000000000400000-0x0000000000482000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 ec61a8003d836eb279f50d1ed24244c5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdkc32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File created C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File created C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File created C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe ec61a8003d836eb279f50d1ed24244c5_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File created C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File created C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File created C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File created C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File created C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File created C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File created C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File created C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File created C:\Windows\SysWOW64\igfxdkc32.exe ec61a8003d836eb279f50d1ed24244c5_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File created C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File created C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File created C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File created C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File created C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdkc32.exe File opened for modification C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe File created C:\Windows\SysWOW64\igfxdkc32.exe igfxdkc32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 48 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec61a8003d836eb279f50d1ed24244c5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdkc32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2148 ec61a8003d836eb279f50d1ed24244c5_JaffaCakes118.exe 2148 ec61a8003d836eb279f50d1ed24244c5_JaffaCakes118.exe 2948 igfxdkc32.exe 2948 igfxdkc32.exe 2752 igfxdkc32.exe 2752 igfxdkc32.exe 2708 igfxdkc32.exe 2708 igfxdkc32.exe 2544 igfxdkc32.exe 2544 igfxdkc32.exe 2100 igfxdkc32.exe 2100 igfxdkc32.exe 2368 igfxdkc32.exe 2368 igfxdkc32.exe 1604 igfxdkc32.exe 1604 igfxdkc32.exe 576 igfxdkc32.exe 576 igfxdkc32.exe 2604 igfxdkc32.exe 2604 igfxdkc32.exe 2360 igfxdkc32.exe 2360 igfxdkc32.exe 1916 igfxdkc32.exe 1916 igfxdkc32.exe 1792 igfxdkc32.exe 1792 igfxdkc32.exe 972 igfxdkc32.exe 972 igfxdkc32.exe 1732 igfxdkc32.exe 1732 igfxdkc32.exe 2476 igfxdkc32.exe 2476 igfxdkc32.exe 2624 igfxdkc32.exe 2624 igfxdkc32.exe 1888 igfxdkc32.exe 1888 igfxdkc32.exe 1500 igfxdkc32.exe 1500 igfxdkc32.exe 2928 igfxdkc32.exe 2928 igfxdkc32.exe 2740 igfxdkc32.exe 2740 igfxdkc32.exe 2800 igfxdkc32.exe 2800 igfxdkc32.exe 2992 igfxdkc32.exe 2992 igfxdkc32.exe 2660 igfxdkc32.exe 2660 igfxdkc32.exe 2468 igfxdkc32.exe 2468 igfxdkc32.exe 2320 igfxdkc32.exe 2320 igfxdkc32.exe 592 igfxdkc32.exe 592 igfxdkc32.exe 2332 igfxdkc32.exe 2332 igfxdkc32.exe 768 igfxdkc32.exe 768 igfxdkc32.exe 1960 igfxdkc32.exe 1960 igfxdkc32.exe 2276 igfxdkc32.exe 2276 igfxdkc32.exe 2516 igfxdkc32.exe 2516 igfxdkc32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2948 2148 ec61a8003d836eb279f50d1ed24244c5_JaffaCakes118.exe 31 PID 2148 wrote to memory of 2948 2148 ec61a8003d836eb279f50d1ed24244c5_JaffaCakes118.exe 31 PID 2148 wrote to memory of 2948 2148 ec61a8003d836eb279f50d1ed24244c5_JaffaCakes118.exe 31 PID 2148 wrote to memory of 2948 2148 ec61a8003d836eb279f50d1ed24244c5_JaffaCakes118.exe 31 PID 2948 wrote to memory of 2752 2948 igfxdkc32.exe 32 PID 2948 wrote to memory of 2752 2948 igfxdkc32.exe 32 PID 2948 wrote to memory of 2752 2948 igfxdkc32.exe 32 PID 2948 wrote to memory of 2752 2948 igfxdkc32.exe 32 PID 2752 wrote to memory of 2708 2752 igfxdkc32.exe 33 PID 2752 wrote to memory of 2708 2752 igfxdkc32.exe 33 PID 2752 wrote to memory of 2708 2752 igfxdkc32.exe 33 PID 2752 wrote to memory of 2708 2752 igfxdkc32.exe 33 PID 2708 wrote to memory of 2544 2708 igfxdkc32.exe 34 PID 2708 wrote to memory of 2544 2708 igfxdkc32.exe 34 PID 2708 wrote to memory of 2544 2708 igfxdkc32.exe 34 PID 2708 wrote to memory of 2544 2708 igfxdkc32.exe 34 PID 2544 wrote to memory of 2100 2544 igfxdkc32.exe 35 PID 2544 wrote to memory of 2100 2544 igfxdkc32.exe 35 PID 2544 wrote to memory of 2100 2544 igfxdkc32.exe 35 PID 2544 wrote to memory of 2100 2544 igfxdkc32.exe 35 PID 2100 wrote to memory of 2368 2100 igfxdkc32.exe 36 PID 2100 wrote to memory of 2368 2100 igfxdkc32.exe 36 PID 2100 wrote to memory of 2368 2100 igfxdkc32.exe 36 PID 2100 wrote to memory of 2368 2100 igfxdkc32.exe 36 PID 2368 wrote to memory of 1604 2368 igfxdkc32.exe 37 PID 2368 wrote to memory of 1604 2368 igfxdkc32.exe 37 PID 2368 wrote to memory of 1604 2368 igfxdkc32.exe 37 PID 2368 wrote to memory of 1604 2368 igfxdkc32.exe 37 PID 1604 wrote to memory of 576 1604 igfxdkc32.exe 38 PID 1604 wrote to memory of 576 1604 igfxdkc32.exe 38 PID 1604 wrote to memory of 576 1604 igfxdkc32.exe 38 PID 1604 wrote to memory of 576 1604 igfxdkc32.exe 38 PID 576 wrote to memory of 2604 576 igfxdkc32.exe 39 PID 576 wrote to memory of 2604 576 igfxdkc32.exe 39 PID 576 wrote to memory of 2604 576 igfxdkc32.exe 39 PID 576 wrote to memory of 2604 576 igfxdkc32.exe 39 PID 2604 wrote to memory of 2360 2604 igfxdkc32.exe 40 PID 2604 wrote to memory of 2360 2604 igfxdkc32.exe 40 PID 2604 wrote to memory of 2360 2604 igfxdkc32.exe 40 PID 2604 wrote to memory of 2360 2604 igfxdkc32.exe 40 PID 2360 wrote to memory of 1916 2360 igfxdkc32.exe 41 PID 2360 wrote to memory of 1916 2360 igfxdkc32.exe 41 PID 2360 wrote to memory of 1916 2360 igfxdkc32.exe 41 PID 2360 wrote to memory of 1916 2360 igfxdkc32.exe 41 PID 1916 wrote to memory of 1792 1916 igfxdkc32.exe 42 PID 1916 wrote to memory of 1792 1916 igfxdkc32.exe 42 PID 1916 wrote to memory of 1792 1916 igfxdkc32.exe 42 PID 1916 wrote to memory of 1792 1916 igfxdkc32.exe 42 PID 1792 wrote to memory of 972 1792 igfxdkc32.exe 43 PID 1792 wrote to memory of 972 1792 igfxdkc32.exe 43 PID 1792 wrote to memory of 972 1792 igfxdkc32.exe 43 PID 1792 wrote to memory of 972 1792 igfxdkc32.exe 43 PID 972 wrote to memory of 1732 972 igfxdkc32.exe 44 PID 972 wrote to memory of 1732 972 igfxdkc32.exe 44 PID 972 wrote to memory of 1732 972 igfxdkc32.exe 44 PID 972 wrote to memory of 1732 972 igfxdkc32.exe 44 PID 1732 wrote to memory of 2476 1732 igfxdkc32.exe 45 PID 1732 wrote to memory of 2476 1732 igfxdkc32.exe 45 PID 1732 wrote to memory of 2476 1732 igfxdkc32.exe 45 PID 1732 wrote to memory of 2476 1732 igfxdkc32.exe 45 PID 2476 wrote to memory of 2624 2476 igfxdkc32.exe 46 PID 2476 wrote to memory of 2624 2476 igfxdkc32.exe 46 PID 2476 wrote to memory of 2624 2476 igfxdkc32.exe 46 PID 2476 wrote to memory of 2624 2476 igfxdkc32.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec61a8003d836eb279f50d1ed24244c5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ec61a8003d836eb279f50d1ed24244c5_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Users\Admin\AppData\Local\Temp\EC61A8~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2624 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1888 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1500 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2928 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2740 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2800 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2992 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2660 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2468 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2320 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE27⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:592 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2332 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE29⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:768 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1960 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2276 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2516 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2032 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:712 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1940 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:788 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE37⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2968 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1584 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2200 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1780 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1888 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE42⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:316 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2336 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2148 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2728 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1152 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE47⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2664 -
C:\Windows\SysWOW64\igfxdkc32.exe"C:\Windows\system32\igfxdkc32.exe" C:\Windows\SysWOW64\IGFXDK~1.EXE48⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2960
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
194KB
MD5ec61a8003d836eb279f50d1ed24244c5
SHA1bd19b24b2663ffeeea2b3777bf56b4316a1183a0
SHA256b8ef3081a38a6b9b29fd5da1b416443f9bba271c354a499cc1a1bc16e301be7d
SHA5121530acaf7c4974fef4c144fb186a9db93542bf5b591f89a3ce86ac710049e5ef46a0f670b495d0131372d3db5516706312bc114507f4aa34667babef6c5525f2