Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 18:57
Static task
static1
Behavioral task
behavioral1
Sample
ebfdca373b694d175590ee1d86b8f5ef_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ebfdca373b694d175590ee1d86b8f5ef_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ebfdca373b694d175590ee1d86b8f5ef_JaffaCakes118.exe
-
Size
226KB
-
MD5
ebfdca373b694d175590ee1d86b8f5ef
-
SHA1
74d881336d47dec3fb6dc0369694bbfeb226a7c4
-
SHA256
47783962d917b335169c70722ffb2d0f1bdae7e0b81f7c1beb9cf3782fd94737
-
SHA512
9423acb9f3ce7d1c89263565bc4026ac53c3b707953daa52d5a05c336aea00c10bbf53506778c6c8fb6ea5276f99c44ab7b183e2466e61574b5502357459f5f8
-
SSDEEP
6144:ymBWkMPptXkstoAZO3pLe2jzQRbvnI3aZ:ymckapysSAZIeZZ9
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings 2 TTPs 44 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation ebfdca373b694d175590ee1d86b8f5ef_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation igfxrpc32.exe -
Deletes itself 1 IoCs
pid Process 3572 igfxrpc32.exe -
Executes dropped EXE 44 IoCs
pid Process 3572 igfxrpc32.exe 1016 igfxrpc32.exe 4804 igfxrpc32.exe 3540 igfxrpc32.exe 1040 igfxrpc32.exe 4656 igfxrpc32.exe 400 igfxrpc32.exe 860 igfxrpc32.exe 8 igfxrpc32.exe 1772 igfxrpc32.exe 2464 igfxrpc32.exe 2716 igfxrpc32.exe 5072 igfxrpc32.exe 1992 igfxrpc32.exe 1320 igfxrpc32.exe 2728 igfxrpc32.exe 4404 igfxrpc32.exe 3148 igfxrpc32.exe 3880 igfxrpc32.exe 3440 igfxrpc32.exe 1800 igfxrpc32.exe 5012 igfxrpc32.exe 1908 igfxrpc32.exe 1476 igfxrpc32.exe 4256 igfxrpc32.exe 1016 igfxrpc32.exe 4160 igfxrpc32.exe 1320 igfxrpc32.exe 2340 igfxrpc32.exe 3252 igfxrpc32.exe 4712 igfxrpc32.exe 1372 igfxrpc32.exe 4800 igfxrpc32.exe 4264 igfxrpc32.exe 2264 igfxrpc32.exe 4296 igfxrpc32.exe 2552 igfxrpc32.exe 3960 igfxrpc32.exe 4904 igfxrpc32.exe 3020 igfxrpc32.exe 2700 igfxrpc32.exe 760 igfxrpc32.exe 3368 igfxrpc32.exe 3804 igfxrpc32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum ebfdca373b694d175590ee1d86b8f5ef_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxrpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxrpc32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe File created C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe File opened for modification C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxrpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxrpc32.exe File created C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxrpc32.exe File opened for modification C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe File created C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe File opened for modification C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxrpc32.exe File created C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxrpc32.exe File created C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxrpc32.exe File opened for modification C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe File opened for modification C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe File opened for modification C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe File created C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe File created C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxrpc32.exe File created C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe File opened for modification C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe File created C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxrpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxrpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxrpc32.exe File created C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxrpc32.exe File opened for modification C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxrpc32.exe File opened for modification C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxrpc32.exe File created C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxrpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxrpc32.exe File created C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe File created C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe File created C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxrpc32.exe File created C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe File opened for modification C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe File opened for modification C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe File created C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe File created C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe File created C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe File created C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxrpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxrpc32.exe File created C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxrpc32.exe File opened for modification C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe File opened for modification C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe File opened for modification C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe File created C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe File opened for modification C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe File opened for modification C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe File opened for modification C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxrpc32.exe File opened for modification C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe File created C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe File opened for modification C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxrpc32.exe File opened for modification C:\Windows\SysWOW64\igfxrpc32.exe igfxrpc32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 44 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebfdca373b694d175590ee1d86b8f5ef_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxrpc32.exe -
Modifies registry class 44 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ebfdca373b694d175590ee1d86b8f5ef_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxrpc32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3604 ebfdca373b694d175590ee1d86b8f5ef_JaffaCakes118.exe 3604 ebfdca373b694d175590ee1d86b8f5ef_JaffaCakes118.exe 3604 ebfdca373b694d175590ee1d86b8f5ef_JaffaCakes118.exe 3604 ebfdca373b694d175590ee1d86b8f5ef_JaffaCakes118.exe 3604 ebfdca373b694d175590ee1d86b8f5ef_JaffaCakes118.exe 3604 ebfdca373b694d175590ee1d86b8f5ef_JaffaCakes118.exe 3604 ebfdca373b694d175590ee1d86b8f5ef_JaffaCakes118.exe 3604 ebfdca373b694d175590ee1d86b8f5ef_JaffaCakes118.exe 3604 ebfdca373b694d175590ee1d86b8f5ef_JaffaCakes118.exe 3604 ebfdca373b694d175590ee1d86b8f5ef_JaffaCakes118.exe 3604 ebfdca373b694d175590ee1d86b8f5ef_JaffaCakes118.exe 3604 ebfdca373b694d175590ee1d86b8f5ef_JaffaCakes118.exe 3604 ebfdca373b694d175590ee1d86b8f5ef_JaffaCakes118.exe 3604 ebfdca373b694d175590ee1d86b8f5ef_JaffaCakes118.exe 3604 ebfdca373b694d175590ee1d86b8f5ef_JaffaCakes118.exe 3604 ebfdca373b694d175590ee1d86b8f5ef_JaffaCakes118.exe 3604 ebfdca373b694d175590ee1d86b8f5ef_JaffaCakes118.exe 3604 ebfdca373b694d175590ee1d86b8f5ef_JaffaCakes118.exe 3604 ebfdca373b694d175590ee1d86b8f5ef_JaffaCakes118.exe 3604 ebfdca373b694d175590ee1d86b8f5ef_JaffaCakes118.exe 3604 ebfdca373b694d175590ee1d86b8f5ef_JaffaCakes118.exe 3604 ebfdca373b694d175590ee1d86b8f5ef_JaffaCakes118.exe 3604 ebfdca373b694d175590ee1d86b8f5ef_JaffaCakes118.exe 3604 ebfdca373b694d175590ee1d86b8f5ef_JaffaCakes118.exe 3604 ebfdca373b694d175590ee1d86b8f5ef_JaffaCakes118.exe 3604 ebfdca373b694d175590ee1d86b8f5ef_JaffaCakes118.exe 3604 ebfdca373b694d175590ee1d86b8f5ef_JaffaCakes118.exe 3604 ebfdca373b694d175590ee1d86b8f5ef_JaffaCakes118.exe 3604 ebfdca373b694d175590ee1d86b8f5ef_JaffaCakes118.exe 3604 ebfdca373b694d175590ee1d86b8f5ef_JaffaCakes118.exe 3572 igfxrpc32.exe 3572 igfxrpc32.exe 3572 igfxrpc32.exe 3572 igfxrpc32.exe 3572 igfxrpc32.exe 3572 igfxrpc32.exe 3572 igfxrpc32.exe 3572 igfxrpc32.exe 3572 igfxrpc32.exe 3572 igfxrpc32.exe 3572 igfxrpc32.exe 3572 igfxrpc32.exe 3572 igfxrpc32.exe 3572 igfxrpc32.exe 3572 igfxrpc32.exe 3572 igfxrpc32.exe 3572 igfxrpc32.exe 3572 igfxrpc32.exe 3572 igfxrpc32.exe 3572 igfxrpc32.exe 3572 igfxrpc32.exe 3572 igfxrpc32.exe 3572 igfxrpc32.exe 3572 igfxrpc32.exe 3572 igfxrpc32.exe 3572 igfxrpc32.exe 3572 igfxrpc32.exe 3572 igfxrpc32.exe 3572 igfxrpc32.exe 3572 igfxrpc32.exe 1016 igfxrpc32.exe 1016 igfxrpc32.exe 1016 igfxrpc32.exe 1016 igfxrpc32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3604 wrote to memory of 3572 3604 ebfdca373b694d175590ee1d86b8f5ef_JaffaCakes118.exe 84 PID 3604 wrote to memory of 3572 3604 ebfdca373b694d175590ee1d86b8f5ef_JaffaCakes118.exe 84 PID 3604 wrote to memory of 3572 3604 ebfdca373b694d175590ee1d86b8f5ef_JaffaCakes118.exe 84 PID 3572 wrote to memory of 1016 3572 igfxrpc32.exe 87 PID 3572 wrote to memory of 1016 3572 igfxrpc32.exe 87 PID 3572 wrote to memory of 1016 3572 igfxrpc32.exe 87 PID 1016 wrote to memory of 4804 1016 igfxrpc32.exe 89 PID 1016 wrote to memory of 4804 1016 igfxrpc32.exe 89 PID 1016 wrote to memory of 4804 1016 igfxrpc32.exe 89 PID 4804 wrote to memory of 3540 4804 igfxrpc32.exe 92 PID 4804 wrote to memory of 3540 4804 igfxrpc32.exe 92 PID 4804 wrote to memory of 3540 4804 igfxrpc32.exe 92 PID 3540 wrote to memory of 1040 3540 igfxrpc32.exe 93 PID 3540 wrote to memory of 1040 3540 igfxrpc32.exe 93 PID 3540 wrote to memory of 1040 3540 igfxrpc32.exe 93 PID 1040 wrote to memory of 4656 1040 igfxrpc32.exe 94 PID 1040 wrote to memory of 4656 1040 igfxrpc32.exe 94 PID 1040 wrote to memory of 4656 1040 igfxrpc32.exe 94 PID 4656 wrote to memory of 400 4656 igfxrpc32.exe 95 PID 4656 wrote to memory of 400 4656 igfxrpc32.exe 95 PID 4656 wrote to memory of 400 4656 igfxrpc32.exe 95 PID 400 wrote to memory of 860 400 igfxrpc32.exe 96 PID 400 wrote to memory of 860 400 igfxrpc32.exe 96 PID 400 wrote to memory of 860 400 igfxrpc32.exe 96 PID 860 wrote to memory of 8 860 igfxrpc32.exe 98 PID 860 wrote to memory of 8 860 igfxrpc32.exe 98 PID 860 wrote to memory of 8 860 igfxrpc32.exe 98 PID 8 wrote to memory of 1772 8 igfxrpc32.exe 100 PID 8 wrote to memory of 1772 8 igfxrpc32.exe 100 PID 8 wrote to memory of 1772 8 igfxrpc32.exe 100 PID 1772 wrote to memory of 2464 1772 igfxrpc32.exe 101 PID 1772 wrote to memory of 2464 1772 igfxrpc32.exe 101 PID 1772 wrote to memory of 2464 1772 igfxrpc32.exe 101 PID 2464 wrote to memory of 2716 2464 igfxrpc32.exe 102 PID 2464 wrote to memory of 2716 2464 igfxrpc32.exe 102 PID 2464 wrote to memory of 2716 2464 igfxrpc32.exe 102 PID 2716 wrote to memory of 5072 2716 igfxrpc32.exe 103 PID 2716 wrote to memory of 5072 2716 igfxrpc32.exe 103 PID 2716 wrote to memory of 5072 2716 igfxrpc32.exe 103 PID 5072 wrote to memory of 1992 5072 igfxrpc32.exe 104 PID 5072 wrote to memory of 1992 5072 igfxrpc32.exe 104 PID 5072 wrote to memory of 1992 5072 igfxrpc32.exe 104 PID 1992 wrote to memory of 1320 1992 igfxrpc32.exe 105 PID 1992 wrote to memory of 1320 1992 igfxrpc32.exe 105 PID 1992 wrote to memory of 1320 1992 igfxrpc32.exe 105 PID 1320 wrote to memory of 2728 1320 igfxrpc32.exe 106 PID 1320 wrote to memory of 2728 1320 igfxrpc32.exe 106 PID 1320 wrote to memory of 2728 1320 igfxrpc32.exe 106 PID 2728 wrote to memory of 4404 2728 igfxrpc32.exe 107 PID 2728 wrote to memory of 4404 2728 igfxrpc32.exe 107 PID 2728 wrote to memory of 4404 2728 igfxrpc32.exe 107 PID 4404 wrote to memory of 3148 4404 igfxrpc32.exe 108 PID 4404 wrote to memory of 3148 4404 igfxrpc32.exe 108 PID 4404 wrote to memory of 3148 4404 igfxrpc32.exe 108 PID 3148 wrote to memory of 3880 3148 igfxrpc32.exe 109 PID 3148 wrote to memory of 3880 3148 igfxrpc32.exe 109 PID 3148 wrote to memory of 3880 3148 igfxrpc32.exe 109 PID 3880 wrote to memory of 3440 3880 igfxrpc32.exe 110 PID 3880 wrote to memory of 3440 3880 igfxrpc32.exe 110 PID 3880 wrote to memory of 3440 3880 igfxrpc32.exe 110 PID 3440 wrote to memory of 1800 3440 igfxrpc32.exe 111 PID 3440 wrote to memory of 1800 3440 igfxrpc32.exe 111 PID 3440 wrote to memory of 1800 3440 igfxrpc32.exe 111 PID 1800 wrote to memory of 5012 1800 igfxrpc32.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebfdca373b694d175590ee1d86b8f5ef_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ebfdca373b694d175590ee1d86b8f5ef_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Users\Admin\AppData\Local\Temp\EBFDCA~1.EXE2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE5⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE7⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE9⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE11⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE13⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE15⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE17⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE19⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE21⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE23⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5012 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1908 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE25⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1476 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4256 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE27⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1016 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4160 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE29⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1320 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2340 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE31⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3252 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4712 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE33⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1372 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4800 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE35⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4264 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2264 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE37⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4296 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2552 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE39⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3960 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE40⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4904 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE41⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3020 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2700 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE43⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:760 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE44⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3368 -
C:\Windows\SysWOW64\igfxrpc32.exe"C:\Windows\system32\igfxrpc32.exe" C:\Windows\SysWOW64\IGFXRP~1.EXE45⤵
- Executes dropped EXE
- Maps connected drives based on registry
PID:3804
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226KB
MD5ebfdca373b694d175590ee1d86b8f5ef
SHA174d881336d47dec3fb6dc0369694bbfeb226a7c4
SHA25647783962d917b335169c70722ffb2d0f1bdae7e0b81f7c1beb9cf3782fd94737
SHA5129423acb9f3ce7d1c89263565bc4026ac53c3b707953daa52d5a05c336aea00c10bbf53506778c6c8fb6ea5276f99c44ab7b183e2466e61574b5502357459f5f8