Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 07:12
Behavioral task
behavioral1
Sample
ead32fb8ca704940236ce1797df91134_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ead32fb8ca704940236ce1797df91134_JaffaCakes118.exe
-
Size
227KB
-
MD5
ead32fb8ca704940236ce1797df91134
-
SHA1
3011daea928aa71abbc95d3c222e39e6d0a8dbb9
-
SHA256
52d3948a7b7e51eaaffe25134b76644c85282a1c9d5d5c199e8fdb36ffba6548
-
SHA512
2a678ec838ae494c164c773114bf49d6b06f715b978570adc0bf4b5241ad9e6b1d48006f1d41127968dc4432243b6eda431231e08e7c0052bdbeae50fc53fc29
-
SSDEEP
6144:wnLtNO2QZGmZyU39j1joP2lT7BjrLS9ms40m44Htz6veW:wnRNO2iGmB39j1kIT7Bmcs4O4Avd
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2340 igfxper32.exe -
Executes dropped EXE 49 IoCs
pid Process 2340 igfxper32.exe 2704 igfxper32.exe 2732 igfxper32.exe 1292 igfxper32.exe 1696 igfxper32.exe 2812 igfxper32.exe 2760 igfxper32.exe 1432 igfxper32.exe 2932 igfxper32.exe 1988 igfxper32.exe 908 igfxper32.exe 1500 igfxper32.exe 1588 igfxper32.exe 2940 igfxper32.exe 2520 igfxper32.exe 3048 igfxper32.exe 2200 igfxper32.exe 1332 igfxper32.exe 2460 igfxper32.exe 1404 igfxper32.exe 2996 igfxper32.exe 2584 igfxper32.exe 2324 igfxper32.exe 2548 igfxper32.exe 612 igfxper32.exe 1292 igfxper32.exe 2804 igfxper32.exe 2752 igfxper32.exe 2776 igfxper32.exe 300 igfxper32.exe 2896 igfxper32.exe 2984 igfxper32.exe 2944 igfxper32.exe 1132 igfxper32.exe 952 igfxper32.exe 660 igfxper32.exe 2280 igfxper32.exe 1660 igfxper32.exe 316 igfxper32.exe 648 igfxper32.exe 3060 igfxper32.exe 1968 igfxper32.exe 1560 igfxper32.exe 1928 igfxper32.exe 2680 igfxper32.exe 2772 igfxper32.exe 2848 igfxper32.exe 1376 igfxper32.exe 2824 igfxper32.exe -
Loads dropped DLL 64 IoCs
pid Process 1404 ead32fb8ca704940236ce1797df91134_JaffaCakes118.exe 1404 ead32fb8ca704940236ce1797df91134_JaffaCakes118.exe 2340 igfxper32.exe 2340 igfxper32.exe 2704 igfxper32.exe 2704 igfxper32.exe 2732 igfxper32.exe 2732 igfxper32.exe 1292 igfxper32.exe 1292 igfxper32.exe 1696 igfxper32.exe 1696 igfxper32.exe 2812 igfxper32.exe 2812 igfxper32.exe 2760 igfxper32.exe 2760 igfxper32.exe 1432 igfxper32.exe 1432 igfxper32.exe 2932 igfxper32.exe 2932 igfxper32.exe 1988 igfxper32.exe 1988 igfxper32.exe 908 igfxper32.exe 908 igfxper32.exe 1500 igfxper32.exe 1500 igfxper32.exe 1588 igfxper32.exe 1588 igfxper32.exe 2940 igfxper32.exe 2940 igfxper32.exe 2520 igfxper32.exe 2520 igfxper32.exe 3048 igfxper32.exe 3048 igfxper32.exe 2200 igfxper32.exe 2200 igfxper32.exe 1332 igfxper32.exe 1332 igfxper32.exe 2460 igfxper32.exe 2460 igfxper32.exe 1404 igfxper32.exe 1404 igfxper32.exe 2996 igfxper32.exe 2996 igfxper32.exe 2584 igfxper32.exe 2584 igfxper32.exe 2324 igfxper32.exe 2324 igfxper32.exe 2548 igfxper32.exe 2548 igfxper32.exe 612 igfxper32.exe 612 igfxper32.exe 1292 igfxper32.exe 1292 igfxper32.exe 2804 igfxper32.exe 2804 igfxper32.exe 2752 igfxper32.exe 2752 igfxper32.exe 2776 igfxper32.exe 2776 igfxper32.exe 300 igfxper32.exe 300 igfxper32.exe 2896 igfxper32.exe 2896 igfxper32.exe -
resource yara_rule behavioral1/memory/1404-0-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/1404-2-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/files/0x000c00000001225c-6.dat upx behavioral1/memory/2340-16-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/2340-17-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/2340-15-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/1404-14-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/2704-22-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/2340-24-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/2732-30-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/2704-32-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/2732-39-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/1696-46-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/1292-47-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/1696-54-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/2812-60-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/2760-61-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/2760-67-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/1432-74-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/1988-80-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/2932-82-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/1988-90-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/1500-95-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/908-97-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/1500-102-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/1588-104-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/1588-109-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/2940-115-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/3048-120-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/2520-122-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/3048-128-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/2200-129-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/1332-132-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/2200-134-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/2460-136-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/1332-135-0x00000000034D0000-0x0000000003598000-memory.dmp upx behavioral1/memory/1332-137-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/2460-140-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/2996-143-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/1404-142-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/2584-144-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/2996-146-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/2584-147-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/2324-149-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/2548-148-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/2548-150-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/1292-151-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/612-153-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/1292-155-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/2804-156-0x0000000003320000-0x00000000033E8000-memory.dmp upx behavioral1/memory/2804-158-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/2752-160-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/2776-162-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/300-163-0x0000000003340000-0x0000000003408000-memory.dmp upx behavioral1/memory/300-165-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/2896-167-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/2984-168-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/1132-171-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/2944-170-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/1132-173-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/952-175-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/660-177-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/2280-179-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/1660-182-0x0000000000400000-0x00000000004C8000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum ead32fb8ca704940236ce1797df91134_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe ead32fb8ca704940236ce1797df91134_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 50 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ead32fb8ca704940236ce1797df91134_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 1404 ead32fb8ca704940236ce1797df91134_JaffaCakes118.exe 2340 igfxper32.exe 2704 igfxper32.exe 2732 igfxper32.exe 1292 igfxper32.exe 1696 igfxper32.exe 2812 igfxper32.exe 2760 igfxper32.exe 1432 igfxper32.exe 2932 igfxper32.exe 1988 igfxper32.exe 908 igfxper32.exe 1500 igfxper32.exe 1588 igfxper32.exe 2940 igfxper32.exe 2520 igfxper32.exe 3048 igfxper32.exe 2200 igfxper32.exe 1332 igfxper32.exe 2460 igfxper32.exe 1404 igfxper32.exe 2996 igfxper32.exe 2584 igfxper32.exe 2324 igfxper32.exe 2548 igfxper32.exe 612 igfxper32.exe 1292 igfxper32.exe 2804 igfxper32.exe 2752 igfxper32.exe 2776 igfxper32.exe 300 igfxper32.exe 2896 igfxper32.exe 2984 igfxper32.exe 2944 igfxper32.exe 1132 igfxper32.exe 952 igfxper32.exe 660 igfxper32.exe 2280 igfxper32.exe 1660 igfxper32.exe 316 igfxper32.exe 648 igfxper32.exe 3060 igfxper32.exe 1968 igfxper32.exe 1560 igfxper32.exe 1928 igfxper32.exe 2680 igfxper32.exe 2772 igfxper32.exe 2848 igfxper32.exe 1376 igfxper32.exe 2824 igfxper32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1404 wrote to memory of 2340 1404 ead32fb8ca704940236ce1797df91134_JaffaCakes118.exe 31 PID 1404 wrote to memory of 2340 1404 ead32fb8ca704940236ce1797df91134_JaffaCakes118.exe 31 PID 1404 wrote to memory of 2340 1404 ead32fb8ca704940236ce1797df91134_JaffaCakes118.exe 31 PID 1404 wrote to memory of 2340 1404 ead32fb8ca704940236ce1797df91134_JaffaCakes118.exe 31 PID 2340 wrote to memory of 2704 2340 igfxper32.exe 32 PID 2340 wrote to memory of 2704 2340 igfxper32.exe 32 PID 2340 wrote to memory of 2704 2340 igfxper32.exe 32 PID 2340 wrote to memory of 2704 2340 igfxper32.exe 32 PID 2704 wrote to memory of 2732 2704 igfxper32.exe 33 PID 2704 wrote to memory of 2732 2704 igfxper32.exe 33 PID 2704 wrote to memory of 2732 2704 igfxper32.exe 33 PID 2704 wrote to memory of 2732 2704 igfxper32.exe 33 PID 2732 wrote to memory of 1292 2732 igfxper32.exe 34 PID 2732 wrote to memory of 1292 2732 igfxper32.exe 34 PID 2732 wrote to memory of 1292 2732 igfxper32.exe 34 PID 2732 wrote to memory of 1292 2732 igfxper32.exe 34 PID 1292 wrote to memory of 1696 1292 igfxper32.exe 35 PID 1292 wrote to memory of 1696 1292 igfxper32.exe 35 PID 1292 wrote to memory of 1696 1292 igfxper32.exe 35 PID 1292 wrote to memory of 1696 1292 igfxper32.exe 35 PID 1696 wrote to memory of 2812 1696 igfxper32.exe 36 PID 1696 wrote to memory of 2812 1696 igfxper32.exe 36 PID 1696 wrote to memory of 2812 1696 igfxper32.exe 36 PID 1696 wrote to memory of 2812 1696 igfxper32.exe 36 PID 2812 wrote to memory of 2760 2812 igfxper32.exe 37 PID 2812 wrote to memory of 2760 2812 igfxper32.exe 37 PID 2812 wrote to memory of 2760 2812 igfxper32.exe 37 PID 2812 wrote to memory of 2760 2812 igfxper32.exe 37 PID 2760 wrote to memory of 1432 2760 igfxper32.exe 38 PID 2760 wrote to memory of 1432 2760 igfxper32.exe 38 PID 2760 wrote to memory of 1432 2760 igfxper32.exe 38 PID 2760 wrote to memory of 1432 2760 igfxper32.exe 38 PID 1432 wrote to memory of 2932 1432 igfxper32.exe 39 PID 1432 wrote to memory of 2932 1432 igfxper32.exe 39 PID 1432 wrote to memory of 2932 1432 igfxper32.exe 39 PID 1432 wrote to memory of 2932 1432 igfxper32.exe 39 PID 2932 wrote to memory of 1988 2932 igfxper32.exe 40 PID 2932 wrote to memory of 1988 2932 igfxper32.exe 40 PID 2932 wrote to memory of 1988 2932 igfxper32.exe 40 PID 2932 wrote to memory of 1988 2932 igfxper32.exe 40 PID 1988 wrote to memory of 908 1988 igfxper32.exe 41 PID 1988 wrote to memory of 908 1988 igfxper32.exe 41 PID 1988 wrote to memory of 908 1988 igfxper32.exe 41 PID 1988 wrote to memory of 908 1988 igfxper32.exe 41 PID 908 wrote to memory of 1500 908 igfxper32.exe 42 PID 908 wrote to memory of 1500 908 igfxper32.exe 42 PID 908 wrote to memory of 1500 908 igfxper32.exe 42 PID 908 wrote to memory of 1500 908 igfxper32.exe 42 PID 1500 wrote to memory of 1588 1500 igfxper32.exe 43 PID 1500 wrote to memory of 1588 1500 igfxper32.exe 43 PID 1500 wrote to memory of 1588 1500 igfxper32.exe 43 PID 1500 wrote to memory of 1588 1500 igfxper32.exe 43 PID 1588 wrote to memory of 2940 1588 igfxper32.exe 44 PID 1588 wrote to memory of 2940 1588 igfxper32.exe 44 PID 1588 wrote to memory of 2940 1588 igfxper32.exe 44 PID 1588 wrote to memory of 2940 1588 igfxper32.exe 44 PID 2940 wrote to memory of 2520 2940 igfxper32.exe 45 PID 2940 wrote to memory of 2520 2940 igfxper32.exe 45 PID 2940 wrote to memory of 2520 2940 igfxper32.exe 45 PID 2940 wrote to memory of 2520 2940 igfxper32.exe 45 PID 2520 wrote to memory of 3048 2520 igfxper32.exe 46 PID 2520 wrote to memory of 3048 2520 igfxper32.exe 46 PID 2520 wrote to memory of 3048 2520 igfxper32.exe 46 PID 2520 wrote to memory of 3048 2520 igfxper32.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\ead32fb8ca704940236ce1797df91134_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ead32fb8ca704940236ce1797df91134_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Users\Admin\AppData\Local\Temp\EAD32F~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE17⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3048 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2200 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1332 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2460 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1404 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2996 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2584 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2324 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2548 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:612 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1292 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2804 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE29⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2752 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2776 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:300 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2896 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2984 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2944 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1132 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:952 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:660 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE38⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2280 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1660 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:316 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:648 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE42⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3060 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE43⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1968 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1560 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1928 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE46⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2680 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE47⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2772 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE48⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2848 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE49⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1376 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2824
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
227KB
MD5ead32fb8ca704940236ce1797df91134
SHA13011daea928aa71abbc95d3c222e39e6d0a8dbb9
SHA25652d3948a7b7e51eaaffe25134b76644c85282a1c9d5d5c199e8fdb36ffba6548
SHA5122a678ec838ae494c164c773114bf49d6b06f715b978570adc0bf4b5241ad9e6b1d48006f1d41127968dc4432243b6eda431231e08e7c0052bdbeae50fc53fc29