Analysis
-
max time kernel
150s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 00:27
Behavioral task
behavioral1
Sample
ea40a8812fe134d016e69821d683894e_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
ea40a8812fe134d016e69821d683894e_JaffaCakes118.exe
-
Size
213KB
-
MD5
ea40a8812fe134d016e69821d683894e
-
SHA1
9de98e619bdeaaba0afd40d6edaf705345e955c3
-
SHA256
0e05a7b223afcc64878c6810222b1c9df924be1484681eff9cdb81677c56a8ab
-
SHA512
00f85d0d6a1e69fd26113ed976781f0c4e1a4dc76c5391bd82c197fe1ad82271ddcd17551aacc5a30fd4c2324cc43bf7a62689063b4643d68e1209d4007a4c3b
-
SSDEEP
3072:oZDeZcvudycLy/307B64bA3EihhQOm1kXMPok8Vv4SGWjc2v5eGVcmYEy7udNLNL:1dZoeO3Ekokcoj+ZK7vo8qgX+5DN6gK
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2744 igfxdm32.exe -
Executes dropped EXE 45 IoCs
pid Process 2744 igfxdm32.exe 2836 igfxdm32.exe 2604 igfxdm32.exe 1040 igfxdm32.exe 2272 igfxdm32.exe 2268 igfxdm32.exe 2920 igfxdm32.exe 1100 igfxdm32.exe 1332 igfxdm32.exe 2172 igfxdm32.exe 2332 igfxdm32.exe 568 igfxdm32.exe 2276 igfxdm32.exe 2376 igfxdm32.exe 1724 igfxdm32.exe 1540 igfxdm32.exe 2156 igfxdm32.exe 896 igfxdm32.exe 2580 igfxdm32.exe 2892 igfxdm32.exe 2860 igfxdm32.exe 2788 igfxdm32.exe 320 igfxdm32.exe 3048 igfxdm32.exe 1776 igfxdm32.exe 2536 igfxdm32.exe 2792 igfxdm32.exe 1484 igfxdm32.exe 1020 igfxdm32.exe 2040 igfxdm32.exe 2956 igfxdm32.exe 1804 igfxdm32.exe 764 igfxdm32.exe 936 igfxdm32.exe 2020 igfxdm32.exe 472 igfxdm32.exe 1748 igfxdm32.exe 1656 igfxdm32.exe 1256 igfxdm32.exe 700 igfxdm32.exe 640 igfxdm32.exe 2300 igfxdm32.exe 2712 igfxdm32.exe 1928 igfxdm32.exe 2808 igfxdm32.exe -
Loads dropped DLL 64 IoCs
pid Process 2544 ea40a8812fe134d016e69821d683894e_JaffaCakes118.exe 2544 ea40a8812fe134d016e69821d683894e_JaffaCakes118.exe 2744 igfxdm32.exe 2744 igfxdm32.exe 2836 igfxdm32.exe 2836 igfxdm32.exe 2604 igfxdm32.exe 2604 igfxdm32.exe 1040 igfxdm32.exe 1040 igfxdm32.exe 2272 igfxdm32.exe 2272 igfxdm32.exe 2268 igfxdm32.exe 2268 igfxdm32.exe 2920 igfxdm32.exe 2920 igfxdm32.exe 1100 igfxdm32.exe 1100 igfxdm32.exe 1332 igfxdm32.exe 1332 igfxdm32.exe 2172 igfxdm32.exe 2172 igfxdm32.exe 2332 igfxdm32.exe 2332 igfxdm32.exe 568 igfxdm32.exe 568 igfxdm32.exe 2276 igfxdm32.exe 2276 igfxdm32.exe 2376 igfxdm32.exe 2376 igfxdm32.exe 1724 igfxdm32.exe 1724 igfxdm32.exe 1540 igfxdm32.exe 1540 igfxdm32.exe 2156 igfxdm32.exe 2156 igfxdm32.exe 896 igfxdm32.exe 896 igfxdm32.exe 2580 igfxdm32.exe 2580 igfxdm32.exe 2892 igfxdm32.exe 2892 igfxdm32.exe 2860 igfxdm32.exe 2860 igfxdm32.exe 2788 igfxdm32.exe 2788 igfxdm32.exe 320 igfxdm32.exe 320 igfxdm32.exe 3048 igfxdm32.exe 3048 igfxdm32.exe 1776 igfxdm32.exe 1776 igfxdm32.exe 2536 igfxdm32.exe 2536 igfxdm32.exe 2792 igfxdm32.exe 2792 igfxdm32.exe 1484 igfxdm32.exe 1484 igfxdm32.exe 1020 igfxdm32.exe 1020 igfxdm32.exe 2040 igfxdm32.exe 2040 igfxdm32.exe 2956 igfxdm32.exe 2956 igfxdm32.exe -
resource yara_rule behavioral1/memory/2544-0-0x0000000013110000-0x0000000013172000-memory.dmp upx behavioral1/files/0x00080000000120fd-6.dat upx behavioral1/memory/2744-13-0x0000000013110000-0x0000000013172000-memory.dmp upx behavioral1/memory/2604-31-0x0000000013110000-0x0000000013172000-memory.dmp upx behavioral1/memory/2920-55-0x0000000013110000-0x0000000013172000-memory.dmp upx behavioral1/memory/3048-146-0x0000000013110000-0x0000000013172000-memory.dmp upx behavioral1/memory/764-172-0x0000000013110000-0x0000000013172000-memory.dmp upx behavioral1/memory/472-179-0x0000000013110000-0x0000000013172000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum ea40a8812fe134d016e69821d683894e_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdm32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\igfxdm32.exe ea40a8812fe134d016e69821d683894e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxdm32.exe File opened for modification C:\Windows\SysWOW64\igfxdm32.exe igfxdm32.exe File opened for modification C:\Windows\SysWOW64\igfxdm32.exe igfxdm32.exe File created C:\Windows\SysWOW64\igfxdm32.exe igfxdm32.exe File created C:\Windows\SysWOW64\igfxdm32.exe igfxdm32.exe File opened for modification C:\Windows\SysWOW64\igfxdm32.exe igfxdm32.exe File opened for modification C:\Windows\SysWOW64\igfxdm32.exe igfxdm32.exe File opened for modification C:\Windows\SysWOW64\igfxdm32.exe igfxdm32.exe File opened for modification C:\Windows\SysWOW64\ igfxdm32.exe File opened for modification C:\Windows\SysWOW64\ igfxdm32.exe File opened for modification C:\Windows\SysWOW64\ igfxdm32.exe File created C:\Windows\SysWOW64\igfxdm32.exe igfxdm32.exe File opened for modification C:\Windows\SysWOW64\ igfxdm32.exe File opened for modification C:\Windows\SysWOW64\ igfxdm32.exe File opened for modification C:\Windows\SysWOW64\igfxdm32.exe igfxdm32.exe File opened for modification C:\Windows\SysWOW64\igfxdm32.exe igfxdm32.exe File opened for modification C:\Windows\SysWOW64\igfxdm32.exe ea40a8812fe134d016e69821d683894e_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxdm32.exe igfxdm32.exe File opened for modification C:\Windows\SysWOW64\igfxdm32.exe igfxdm32.exe File created C:\Windows\SysWOW64\igfxdm32.exe igfxdm32.exe File opened for modification C:\Windows\SysWOW64\ igfxdm32.exe File opened for modification C:\Windows\SysWOW64\igfxdm32.exe igfxdm32.exe File opened for modification C:\Windows\SysWOW64\ igfxdm32.exe File opened for modification C:\Windows\SysWOW64\igfxdm32.exe igfxdm32.exe File opened for modification C:\Windows\SysWOW64\igfxdm32.exe igfxdm32.exe File created C:\Windows\SysWOW64\igfxdm32.exe igfxdm32.exe File opened for modification C:\Windows\SysWOW64\igfxdm32.exe igfxdm32.exe File opened for modification C:\Windows\SysWOW64\ igfxdm32.exe File opened for modification C:\Windows\SysWOW64\igfxdm32.exe igfxdm32.exe File created C:\Windows\SysWOW64\igfxdm32.exe igfxdm32.exe File opened for modification C:\Windows\SysWOW64\ igfxdm32.exe File created C:\Windows\SysWOW64\igfxdm32.exe igfxdm32.exe File opened for modification C:\Windows\SysWOW64\igfxdm32.exe igfxdm32.exe File created C:\Windows\SysWOW64\igfxdm32.exe igfxdm32.exe File created C:\Windows\SysWOW64\igfxdm32.exe igfxdm32.exe File opened for modification C:\Windows\SysWOW64\ igfxdm32.exe File opened for modification C:\Windows\SysWOW64\ igfxdm32.exe File opened for modification C:\Windows\SysWOW64\ igfxdm32.exe File opened for modification C:\Windows\SysWOW64\igfxdm32.exe igfxdm32.exe File created C:\Windows\SysWOW64\igfxdm32.exe igfxdm32.exe File created C:\Windows\SysWOW64\igfxdm32.exe igfxdm32.exe File opened for modification C:\Windows\SysWOW64\ igfxdm32.exe File opened for modification C:\Windows\SysWOW64\ igfxdm32.exe File opened for modification C:\Windows\SysWOW64\ igfxdm32.exe File created C:\Windows\SysWOW64\igfxdm32.exe igfxdm32.exe File created C:\Windows\SysWOW64\igfxdm32.exe igfxdm32.exe File opened for modification C:\Windows\SysWOW64\ igfxdm32.exe File opened for modification C:\Windows\SysWOW64\ igfxdm32.exe File created C:\Windows\SysWOW64\igfxdm32.exe igfxdm32.exe File opened for modification C:\Windows\SysWOW64\igfxdm32.exe igfxdm32.exe File created C:\Windows\SysWOW64\igfxdm32.exe igfxdm32.exe File opened for modification C:\Windows\SysWOW64\igfxdm32.exe igfxdm32.exe File opened for modification C:\Windows\SysWOW64\igfxdm32.exe igfxdm32.exe File opened for modification C:\Windows\SysWOW64\ igfxdm32.exe File created C:\Windows\SysWOW64\igfxdm32.exe igfxdm32.exe File created C:\Windows\SysWOW64\igfxdm32.exe igfxdm32.exe File created C:\Windows\SysWOW64\igfxdm32.exe igfxdm32.exe File opened for modification C:\Windows\SysWOW64\ igfxdm32.exe File opened for modification C:\Windows\SysWOW64\igfxdm32.exe igfxdm32.exe File created C:\Windows\SysWOW64\igfxdm32.exe igfxdm32.exe File opened for modification C:\Windows\SysWOW64\igfxdm32.exe igfxdm32.exe File opened for modification C:\Windows\SysWOW64\ igfxdm32.exe File opened for modification C:\Windows\SysWOW64\ igfxdm32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 46 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea40a8812fe134d016e69821d683894e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdm32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2544 ea40a8812fe134d016e69821d683894e_JaffaCakes118.exe 2544 ea40a8812fe134d016e69821d683894e_JaffaCakes118.exe 2744 igfxdm32.exe 2744 igfxdm32.exe 2836 igfxdm32.exe 2836 igfxdm32.exe 2604 igfxdm32.exe 2604 igfxdm32.exe 1040 igfxdm32.exe 1040 igfxdm32.exe 2272 igfxdm32.exe 2272 igfxdm32.exe 2268 igfxdm32.exe 2268 igfxdm32.exe 2920 igfxdm32.exe 2920 igfxdm32.exe 1100 igfxdm32.exe 1100 igfxdm32.exe 1332 igfxdm32.exe 1332 igfxdm32.exe 2172 igfxdm32.exe 2172 igfxdm32.exe 2332 igfxdm32.exe 2332 igfxdm32.exe 568 igfxdm32.exe 568 igfxdm32.exe 2276 igfxdm32.exe 2276 igfxdm32.exe 2376 igfxdm32.exe 2376 igfxdm32.exe 1724 igfxdm32.exe 1724 igfxdm32.exe 1540 igfxdm32.exe 1540 igfxdm32.exe 2156 igfxdm32.exe 2156 igfxdm32.exe 896 igfxdm32.exe 896 igfxdm32.exe 2580 igfxdm32.exe 2580 igfxdm32.exe 2892 igfxdm32.exe 2892 igfxdm32.exe 2860 igfxdm32.exe 2860 igfxdm32.exe 2788 igfxdm32.exe 2788 igfxdm32.exe 320 igfxdm32.exe 320 igfxdm32.exe 3048 igfxdm32.exe 3048 igfxdm32.exe 1776 igfxdm32.exe 1776 igfxdm32.exe 2536 igfxdm32.exe 2536 igfxdm32.exe 2792 igfxdm32.exe 2792 igfxdm32.exe 1484 igfxdm32.exe 1484 igfxdm32.exe 1020 igfxdm32.exe 1020 igfxdm32.exe 2040 igfxdm32.exe 2040 igfxdm32.exe 2956 igfxdm32.exe 2956 igfxdm32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2744 2544 ea40a8812fe134d016e69821d683894e_JaffaCakes118.exe 29 PID 2544 wrote to memory of 2744 2544 ea40a8812fe134d016e69821d683894e_JaffaCakes118.exe 29 PID 2544 wrote to memory of 2744 2544 ea40a8812fe134d016e69821d683894e_JaffaCakes118.exe 29 PID 2544 wrote to memory of 2744 2544 ea40a8812fe134d016e69821d683894e_JaffaCakes118.exe 29 PID 2744 wrote to memory of 2836 2744 igfxdm32.exe 30 PID 2744 wrote to memory of 2836 2744 igfxdm32.exe 30 PID 2744 wrote to memory of 2836 2744 igfxdm32.exe 30 PID 2744 wrote to memory of 2836 2744 igfxdm32.exe 30 PID 2836 wrote to memory of 2604 2836 igfxdm32.exe 31 PID 2836 wrote to memory of 2604 2836 igfxdm32.exe 31 PID 2836 wrote to memory of 2604 2836 igfxdm32.exe 31 PID 2836 wrote to memory of 2604 2836 igfxdm32.exe 31 PID 2604 wrote to memory of 1040 2604 igfxdm32.exe 32 PID 2604 wrote to memory of 1040 2604 igfxdm32.exe 32 PID 2604 wrote to memory of 1040 2604 igfxdm32.exe 32 PID 2604 wrote to memory of 1040 2604 igfxdm32.exe 32 PID 1040 wrote to memory of 2272 1040 igfxdm32.exe 33 PID 1040 wrote to memory of 2272 1040 igfxdm32.exe 33 PID 1040 wrote to memory of 2272 1040 igfxdm32.exe 33 PID 1040 wrote to memory of 2272 1040 igfxdm32.exe 33 PID 2272 wrote to memory of 2268 2272 igfxdm32.exe 34 PID 2272 wrote to memory of 2268 2272 igfxdm32.exe 34 PID 2272 wrote to memory of 2268 2272 igfxdm32.exe 34 PID 2272 wrote to memory of 2268 2272 igfxdm32.exe 34 PID 2268 wrote to memory of 2920 2268 igfxdm32.exe 35 PID 2268 wrote to memory of 2920 2268 igfxdm32.exe 35 PID 2268 wrote to memory of 2920 2268 igfxdm32.exe 35 PID 2268 wrote to memory of 2920 2268 igfxdm32.exe 35 PID 2920 wrote to memory of 1100 2920 igfxdm32.exe 36 PID 2920 wrote to memory of 1100 2920 igfxdm32.exe 36 PID 2920 wrote to memory of 1100 2920 igfxdm32.exe 36 PID 2920 wrote to memory of 1100 2920 igfxdm32.exe 36 PID 1100 wrote to memory of 1332 1100 igfxdm32.exe 37 PID 1100 wrote to memory of 1332 1100 igfxdm32.exe 37 PID 1100 wrote to memory of 1332 1100 igfxdm32.exe 37 PID 1100 wrote to memory of 1332 1100 igfxdm32.exe 37 PID 1332 wrote to memory of 2172 1332 igfxdm32.exe 38 PID 1332 wrote to memory of 2172 1332 igfxdm32.exe 38 PID 1332 wrote to memory of 2172 1332 igfxdm32.exe 38 PID 1332 wrote to memory of 2172 1332 igfxdm32.exe 38 PID 2172 wrote to memory of 2332 2172 igfxdm32.exe 39 PID 2172 wrote to memory of 2332 2172 igfxdm32.exe 39 PID 2172 wrote to memory of 2332 2172 igfxdm32.exe 39 PID 2172 wrote to memory of 2332 2172 igfxdm32.exe 39 PID 2332 wrote to memory of 568 2332 igfxdm32.exe 40 PID 2332 wrote to memory of 568 2332 igfxdm32.exe 40 PID 2332 wrote to memory of 568 2332 igfxdm32.exe 40 PID 2332 wrote to memory of 568 2332 igfxdm32.exe 40 PID 568 wrote to memory of 2276 568 igfxdm32.exe 41 PID 568 wrote to memory of 2276 568 igfxdm32.exe 41 PID 568 wrote to memory of 2276 568 igfxdm32.exe 41 PID 568 wrote to memory of 2276 568 igfxdm32.exe 41 PID 2276 wrote to memory of 2376 2276 igfxdm32.exe 42 PID 2276 wrote to memory of 2376 2276 igfxdm32.exe 42 PID 2276 wrote to memory of 2376 2276 igfxdm32.exe 42 PID 2276 wrote to memory of 2376 2276 igfxdm32.exe 42 PID 2376 wrote to memory of 1724 2376 igfxdm32.exe 43 PID 2376 wrote to memory of 1724 2376 igfxdm32.exe 43 PID 2376 wrote to memory of 1724 2376 igfxdm32.exe 43 PID 2376 wrote to memory of 1724 2376 igfxdm32.exe 43 PID 1724 wrote to memory of 1540 1724 igfxdm32.exe 44 PID 1724 wrote to memory of 1540 1724 igfxdm32.exe 44 PID 1724 wrote to memory of 1540 1724 igfxdm32.exe 44 PID 1724 wrote to memory of 1540 1724 igfxdm32.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea40a8812fe134d016e69821d683894e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea40a8812fe134d016e69821d683894e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Users\Admin\AppData\Local\Temp\EA40A8~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1540 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2156 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:896 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2580 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2892 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2860 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2788 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:320 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3048 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1776 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2536 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2792 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1484 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1020 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2040 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2956 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1804 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:764 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:936 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2020 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:472 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1748 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1656 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1256 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe41⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:700 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe42⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:640 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe43⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2300 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2712 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1928 -
C:\Windows\SysWOW64\igfxdm32.exe"C:\Windows\system32\igfxdm32.exe" C:\Windows\SysWOW64\igfxdm32.exe46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2808
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD5ea40a8812fe134d016e69821d683894e
SHA19de98e619bdeaaba0afd40d6edaf705345e955c3
SHA2560e05a7b223afcc64878c6810222b1c9df924be1484681eff9cdb81677c56a8ab
SHA51200f85d0d6a1e69fd26113ed976781f0c4e1a4dc76c5391bd82c197fe1ad82271ddcd17551aacc5a30fd4c2324cc43bf7a62689063b4643d68e1209d4007a4c3b