Analysis
-
max time kernel
148s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 15:29
Behavioral task
behavioral1
Sample
eba1c86285046e369dae00b659ac7800_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
eba1c86285046e369dae00b659ac7800_JaffaCakes118.exe
-
Size
229KB
-
MD5
eba1c86285046e369dae00b659ac7800
-
SHA1
3826bfe0ffa7bfdecc88b50fea7a5dd8d1e7b544
-
SHA256
598344a584bd67aed4a5188e0471bbca9242e145efe075348df3236be73de9c7
-
SHA512
7ebba13f1f1aeaa2f33a9cb68e3bfc019e8bab5fb5b35b28299870e6713d5bb0072e3fc39c26c7f3279c365405046d646f86a684cbea3178efab4d1805129573
-
SSDEEP
6144:IkbpuZ9khCYmZ0bDyGj9EylVv9wtGaVCo7Ksvm:ZbYZ9ok0ffjiyv92d
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2748 igfxper32.exe -
Executes dropped EXE 49 IoCs
pid Process 2748 igfxper32.exe 2536 igfxper32.exe 2316 igfxper32.exe 1772 igfxper32.exe 2988 igfxper32.exe 3028 igfxper32.exe 2948 igfxper32.exe 2824 igfxper32.exe 588 igfxper32.exe 1984 igfxper32.exe 2440 igfxper32.exe 676 igfxper32.exe 832 igfxper32.exe 3024 igfxper32.exe 1944 igfxper32.exe 1468 igfxper32.exe 2292 igfxper32.exe 1740 igfxper32.exe 1692 igfxper32.exe 2696 igfxper32.exe 2656 igfxper32.exe 2728 igfxper32.exe 408 igfxper32.exe 2316 igfxper32.exe 804 igfxper32.exe 2204 igfxper32.exe 2884 igfxper32.exe 2952 igfxper32.exe 2888 igfxper32.exe 484 igfxper32.exe 2308 igfxper32.exe 2300 igfxper32.exe 2964 igfxper32.exe 1484 igfxper32.exe 952 igfxper32.exe 1716 igfxper32.exe 832 igfxper32.exe 2004 igfxper32.exe 1952 igfxper32.exe 1616 igfxper32.exe 1040 igfxper32.exe 1900 igfxper32.exe 2296 igfxper32.exe 1688 igfxper32.exe 2696 igfxper32.exe 2656 igfxper32.exe 792 igfxper32.exe 2676 igfxper32.exe 2584 igfxper32.exe -
Loads dropped DLL 64 IoCs
pid Process 2400 eba1c86285046e369dae00b659ac7800_JaffaCakes118.exe 2400 eba1c86285046e369dae00b659ac7800_JaffaCakes118.exe 2748 igfxper32.exe 2748 igfxper32.exe 2536 igfxper32.exe 2536 igfxper32.exe 2316 igfxper32.exe 2316 igfxper32.exe 1772 igfxper32.exe 1772 igfxper32.exe 2988 igfxper32.exe 2988 igfxper32.exe 3028 igfxper32.exe 3028 igfxper32.exe 2948 igfxper32.exe 2948 igfxper32.exe 2824 igfxper32.exe 2824 igfxper32.exe 588 igfxper32.exe 588 igfxper32.exe 1984 igfxper32.exe 1984 igfxper32.exe 2440 igfxper32.exe 2440 igfxper32.exe 676 igfxper32.exe 676 igfxper32.exe 832 igfxper32.exe 832 igfxper32.exe 3024 igfxper32.exe 3024 igfxper32.exe 1944 igfxper32.exe 1944 igfxper32.exe 1468 igfxper32.exe 1468 igfxper32.exe 2292 igfxper32.exe 2292 igfxper32.exe 1740 igfxper32.exe 1740 igfxper32.exe 1692 igfxper32.exe 1692 igfxper32.exe 2696 igfxper32.exe 2696 igfxper32.exe 2656 igfxper32.exe 2656 igfxper32.exe 2728 igfxper32.exe 2728 igfxper32.exe 408 igfxper32.exe 408 igfxper32.exe 2316 igfxper32.exe 2316 igfxper32.exe 804 igfxper32.exe 804 igfxper32.exe 2204 igfxper32.exe 2204 igfxper32.exe 2884 igfxper32.exe 2884 igfxper32.exe 2952 igfxper32.exe 2952 igfxper32.exe 2888 igfxper32.exe 2888 igfxper32.exe 484 igfxper32.exe 484 igfxper32.exe 2308 igfxper32.exe 2308 igfxper32.exe -
resource yara_rule behavioral1/memory/2400-0-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2400-2-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2400-14-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2748-15-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/files/0x000b00000001227d-12.dat upx behavioral1/memory/2748-16-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2748-17-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2748-20-0x00000000034C0000-0x0000000003551000-memory.dmp upx behavioral1/memory/2536-24-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2748-26-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2536-32-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1772-38-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2316-37-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2988-44-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1772-46-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/3028-52-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2988-51-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/3028-56-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2948-65-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2824-63-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2824-70-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1984-77-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/588-76-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1984-83-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2440-89-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/832-96-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/676-95-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/3024-100-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/832-102-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/3024-107-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1468-114-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1944-113-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1468-118-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2292-125-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1740-127-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1692-128-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1692-131-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2656-133-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2696-132-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2656-137-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2696-135-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2728-134-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2728-139-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2316-142-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/408-141-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2316-144-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/804-146-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2204-148-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2884-149-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2952-151-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2884-150-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2952-154-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2884-152-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2888-156-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/484-158-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2308-160-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2300-161-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2300-163-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2964-164-0x0000000003340000-0x00000000033D1000-memory.dmp upx behavioral1/memory/2964-166-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1484-167-0x00000000032D0000-0x0000000003361000-memory.dmp upx behavioral1/memory/1484-169-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/952-170-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1716-171-0x0000000000400000-0x0000000000491000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum eba1c86285046e369dae00b659ac7800_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe eba1c86285046e369dae00b659ac7800_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 50 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eba1c86285046e369dae00b659ac7800_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 2400 eba1c86285046e369dae00b659ac7800_JaffaCakes118.exe 2748 igfxper32.exe 2536 igfxper32.exe 2316 igfxper32.exe 1772 igfxper32.exe 2988 igfxper32.exe 3028 igfxper32.exe 2948 igfxper32.exe 2824 igfxper32.exe 588 igfxper32.exe 1984 igfxper32.exe 2440 igfxper32.exe 676 igfxper32.exe 832 igfxper32.exe 3024 igfxper32.exe 1944 igfxper32.exe 1468 igfxper32.exe 2292 igfxper32.exe 1740 igfxper32.exe 1692 igfxper32.exe 2696 igfxper32.exe 2656 igfxper32.exe 2728 igfxper32.exe 408 igfxper32.exe 2316 igfxper32.exe 804 igfxper32.exe 2204 igfxper32.exe 2884 igfxper32.exe 2952 igfxper32.exe 2888 igfxper32.exe 484 igfxper32.exe 2308 igfxper32.exe 2300 igfxper32.exe 2964 igfxper32.exe 1484 igfxper32.exe 952 igfxper32.exe 1716 igfxper32.exe 832 igfxper32.exe 2004 igfxper32.exe 1952 igfxper32.exe 1616 igfxper32.exe 1040 igfxper32.exe 1900 igfxper32.exe 2296 igfxper32.exe 1688 igfxper32.exe 2696 igfxper32.exe 2656 igfxper32.exe 792 igfxper32.exe 2676 igfxper32.exe 2584 igfxper32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2748 2400 eba1c86285046e369dae00b659ac7800_JaffaCakes118.exe 30 PID 2400 wrote to memory of 2748 2400 eba1c86285046e369dae00b659ac7800_JaffaCakes118.exe 30 PID 2400 wrote to memory of 2748 2400 eba1c86285046e369dae00b659ac7800_JaffaCakes118.exe 30 PID 2400 wrote to memory of 2748 2400 eba1c86285046e369dae00b659ac7800_JaffaCakes118.exe 30 PID 2748 wrote to memory of 2536 2748 igfxper32.exe 31 PID 2748 wrote to memory of 2536 2748 igfxper32.exe 31 PID 2748 wrote to memory of 2536 2748 igfxper32.exe 31 PID 2748 wrote to memory of 2536 2748 igfxper32.exe 31 PID 2536 wrote to memory of 2316 2536 igfxper32.exe 32 PID 2536 wrote to memory of 2316 2536 igfxper32.exe 32 PID 2536 wrote to memory of 2316 2536 igfxper32.exe 32 PID 2536 wrote to memory of 2316 2536 igfxper32.exe 32 PID 2316 wrote to memory of 1772 2316 igfxper32.exe 33 PID 2316 wrote to memory of 1772 2316 igfxper32.exe 33 PID 2316 wrote to memory of 1772 2316 igfxper32.exe 33 PID 2316 wrote to memory of 1772 2316 igfxper32.exe 33 PID 1772 wrote to memory of 2988 1772 igfxper32.exe 34 PID 1772 wrote to memory of 2988 1772 igfxper32.exe 34 PID 1772 wrote to memory of 2988 1772 igfxper32.exe 34 PID 1772 wrote to memory of 2988 1772 igfxper32.exe 34 PID 2988 wrote to memory of 3028 2988 igfxper32.exe 35 PID 2988 wrote to memory of 3028 2988 igfxper32.exe 35 PID 2988 wrote to memory of 3028 2988 igfxper32.exe 35 PID 2988 wrote to memory of 3028 2988 igfxper32.exe 35 PID 3028 wrote to memory of 2948 3028 igfxper32.exe 36 PID 3028 wrote to memory of 2948 3028 igfxper32.exe 36 PID 3028 wrote to memory of 2948 3028 igfxper32.exe 36 PID 3028 wrote to memory of 2948 3028 igfxper32.exe 36 PID 2948 wrote to memory of 2824 2948 igfxper32.exe 37 PID 2948 wrote to memory of 2824 2948 igfxper32.exe 37 PID 2948 wrote to memory of 2824 2948 igfxper32.exe 37 PID 2948 wrote to memory of 2824 2948 igfxper32.exe 37 PID 2824 wrote to memory of 588 2824 igfxper32.exe 38 PID 2824 wrote to memory of 588 2824 igfxper32.exe 38 PID 2824 wrote to memory of 588 2824 igfxper32.exe 38 PID 2824 wrote to memory of 588 2824 igfxper32.exe 38 PID 588 wrote to memory of 1984 588 igfxper32.exe 39 PID 588 wrote to memory of 1984 588 igfxper32.exe 39 PID 588 wrote to memory of 1984 588 igfxper32.exe 39 PID 588 wrote to memory of 1984 588 igfxper32.exe 39 PID 1984 wrote to memory of 2440 1984 igfxper32.exe 40 PID 1984 wrote to memory of 2440 1984 igfxper32.exe 40 PID 1984 wrote to memory of 2440 1984 igfxper32.exe 40 PID 1984 wrote to memory of 2440 1984 igfxper32.exe 40 PID 2440 wrote to memory of 676 2440 igfxper32.exe 41 PID 2440 wrote to memory of 676 2440 igfxper32.exe 41 PID 2440 wrote to memory of 676 2440 igfxper32.exe 41 PID 2440 wrote to memory of 676 2440 igfxper32.exe 41 PID 676 wrote to memory of 832 676 igfxper32.exe 42 PID 676 wrote to memory of 832 676 igfxper32.exe 42 PID 676 wrote to memory of 832 676 igfxper32.exe 42 PID 676 wrote to memory of 832 676 igfxper32.exe 42 PID 832 wrote to memory of 3024 832 igfxper32.exe 43 PID 832 wrote to memory of 3024 832 igfxper32.exe 43 PID 832 wrote to memory of 3024 832 igfxper32.exe 43 PID 832 wrote to memory of 3024 832 igfxper32.exe 43 PID 3024 wrote to memory of 1944 3024 igfxper32.exe 44 PID 3024 wrote to memory of 1944 3024 igfxper32.exe 44 PID 3024 wrote to memory of 1944 3024 igfxper32.exe 44 PID 3024 wrote to memory of 1944 3024 igfxper32.exe 44 PID 1944 wrote to memory of 1468 1944 igfxper32.exe 45 PID 1944 wrote to memory of 1468 1944 igfxper32.exe 45 PID 1944 wrote to memory of 1468 1944 igfxper32.exe 45 PID 1944 wrote to memory of 1468 1944 igfxper32.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\eba1c86285046e369dae00b659ac7800_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eba1c86285046e369dae00b659ac7800_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Users\Admin\AppData\Local\Temp\EBA1C8~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1468 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2292 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1740 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1692 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2696 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2656 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2728 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:408 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2316 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:804 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2204 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2884 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE29⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2952 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2888 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE31⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:484 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2308 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2300 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE34⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2964 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1484 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:952 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1716 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:832 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2004 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1952 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1616 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE42⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1040 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1900 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2296 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1688 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE46⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2696 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE47⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2656 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE48⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:792 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE49⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2676 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE50⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2584
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
229KB
MD5eba1c86285046e369dae00b659ac7800
SHA13826bfe0ffa7bfdecc88b50fea7a5dd8d1e7b544
SHA256598344a584bd67aed4a5188e0471bbca9242e145efe075348df3236be73de9c7
SHA5127ebba13f1f1aeaa2f33a9cb68e3bfc019e8bab5fb5b35b28299870e6713d5bb0072e3fc39c26c7f3279c365405046d646f86a684cbea3178efab4d1805129573