Analysis
-
max time kernel
148s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 04:37
Behavioral task
behavioral1
Sample
ef1468580814f6552c19be6b02ba2b32_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ef1468580814f6552c19be6b02ba2b32_JaffaCakes118.exe
-
Size
197KB
-
MD5
ef1468580814f6552c19be6b02ba2b32
-
SHA1
66c3f835fbe68e8ab1f6b8c729c903db48c8b792
-
SHA256
68be06f4942d31a2271bdfd2a47f60fb8d02e137dffb8c37707377d173908d65
-
SHA512
b3bbe454d7804b4e8608daa2e99b76e2581d97e8f4c8501005a348c0e2b9303914816863530428fe30c75de7bf51750904e14a28e946a87e35e5552cc7e64ba2
-
SSDEEP
6144:uzIrfiLhOUkIyYSQLVK+7Qvf/oe6jWm6OED+/:u0rfiL8UkI9K+7CoJym6Z+/
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 3060 igfxpx32.exe -
Executes dropped EXE 45 IoCs
pid Process 3060 igfxpx32.exe 2928 igfxpx32.exe 2640 igfxpx32.exe 2684 igfxpx32.exe 524 igfxpx32.exe 2812 igfxpx32.exe 1652 igfxpx32.exe 2040 igfxpx32.exe 2196 igfxpx32.exe 2116 igfxpx32.exe 556 igfxpx32.exe 828 igfxpx32.exe 1068 igfxpx32.exe 1716 igfxpx32.exe 3028 igfxpx32.exe 1164 igfxpx32.exe 760 igfxpx32.exe 1612 igfxpx32.exe 1732 igfxpx32.exe 2988 igfxpx32.exe 2096 igfxpx32.exe 2776 igfxpx32.exe 2676 igfxpx32.exe 1292 igfxpx32.exe 3000 igfxpx32.exe 264 igfxpx32.exe 1200 igfxpx32.exe 2972 igfxpx32.exe 1772 igfxpx32.exe 2400 igfxpx32.exe 1720 igfxpx32.exe 904 igfxpx32.exe 1904 igfxpx32.exe 1392 igfxpx32.exe 644 igfxpx32.exe 1068 igfxpx32.exe 2460 igfxpx32.exe 2296 igfxpx32.exe 756 igfxpx32.exe 1692 igfxpx32.exe 968 igfxpx32.exe 2544 igfxpx32.exe 2548 igfxpx32.exe 3068 igfxpx32.exe 2412 igfxpx32.exe -
Loads dropped DLL 64 IoCs
pid Process 1732 ef1468580814f6552c19be6b02ba2b32_JaffaCakes118.exe 1732 ef1468580814f6552c19be6b02ba2b32_JaffaCakes118.exe 3060 igfxpx32.exe 3060 igfxpx32.exe 2928 igfxpx32.exe 2928 igfxpx32.exe 2640 igfxpx32.exe 2640 igfxpx32.exe 2684 igfxpx32.exe 2684 igfxpx32.exe 524 igfxpx32.exe 524 igfxpx32.exe 2812 igfxpx32.exe 2812 igfxpx32.exe 1652 igfxpx32.exe 1652 igfxpx32.exe 2040 igfxpx32.exe 2040 igfxpx32.exe 2196 igfxpx32.exe 2196 igfxpx32.exe 2116 igfxpx32.exe 2116 igfxpx32.exe 556 igfxpx32.exe 556 igfxpx32.exe 828 igfxpx32.exe 828 igfxpx32.exe 1068 igfxpx32.exe 1068 igfxpx32.exe 1716 igfxpx32.exe 1716 igfxpx32.exe 3028 igfxpx32.exe 3028 igfxpx32.exe 1164 igfxpx32.exe 1164 igfxpx32.exe 760 igfxpx32.exe 760 igfxpx32.exe 1612 igfxpx32.exe 1612 igfxpx32.exe 1732 igfxpx32.exe 1732 igfxpx32.exe 2988 igfxpx32.exe 2988 igfxpx32.exe 2096 igfxpx32.exe 2096 igfxpx32.exe 2776 igfxpx32.exe 2776 igfxpx32.exe 2676 igfxpx32.exe 2676 igfxpx32.exe 1292 igfxpx32.exe 1292 igfxpx32.exe 3000 igfxpx32.exe 3000 igfxpx32.exe 264 igfxpx32.exe 264 igfxpx32.exe 1200 igfxpx32.exe 1200 igfxpx32.exe 2972 igfxpx32.exe 2972 igfxpx32.exe 1772 igfxpx32.exe 1772 igfxpx32.exe 2400 igfxpx32.exe 2400 igfxpx32.exe 1720 igfxpx32.exe 1720 igfxpx32.exe -
resource yara_rule behavioral1/memory/1732-0-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral1/files/0x0007000000012118-12.dat upx behavioral1/memory/3060-21-0x00000000032C0000-0x0000000003338000-memory.dmp upx behavioral1/memory/524-48-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral1/memory/828-93-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral1/memory/1716-105-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral1/memory/1068-103-0x0000000003290000-0x0000000003308000-memory.dmp upx behavioral1/memory/3028-114-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral1/memory/1612-131-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral1/memory/2776-146-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral1/memory/1292-154-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral1/memory/3000-157-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral1/memory/1068-186-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral1/memory/968-196-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral1/memory/2548-203-0x0000000000400000-0x0000000000478000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 ef1468580814f6552c19be6b02ba2b32_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum ef1468580814f6552c19be6b02ba2b32_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpx32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ ef1468580814f6552c19be6b02ba2b32_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File opened for modification C:\Windows\SysWOW64\ igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe File created C:\Windows\SysWOW64\igfxpx32.exe ef1468580814f6552c19be6b02ba2b32_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxpx32.exe igfxpx32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 46 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef1468580814f6552c19be6b02ba2b32_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpx32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1732 ef1468580814f6552c19be6b02ba2b32_JaffaCakes118.exe 1732 ef1468580814f6552c19be6b02ba2b32_JaffaCakes118.exe 3060 igfxpx32.exe 3060 igfxpx32.exe 2928 igfxpx32.exe 2928 igfxpx32.exe 2640 igfxpx32.exe 2640 igfxpx32.exe 2684 igfxpx32.exe 2684 igfxpx32.exe 524 igfxpx32.exe 524 igfxpx32.exe 2812 igfxpx32.exe 2812 igfxpx32.exe 1652 igfxpx32.exe 1652 igfxpx32.exe 2040 igfxpx32.exe 2040 igfxpx32.exe 2196 igfxpx32.exe 2196 igfxpx32.exe 2116 igfxpx32.exe 2116 igfxpx32.exe 556 igfxpx32.exe 556 igfxpx32.exe 828 igfxpx32.exe 828 igfxpx32.exe 1068 igfxpx32.exe 1068 igfxpx32.exe 1716 igfxpx32.exe 1716 igfxpx32.exe 3028 igfxpx32.exe 3028 igfxpx32.exe 1164 igfxpx32.exe 1164 igfxpx32.exe 760 igfxpx32.exe 760 igfxpx32.exe 1612 igfxpx32.exe 1612 igfxpx32.exe 1732 igfxpx32.exe 1732 igfxpx32.exe 2988 igfxpx32.exe 2988 igfxpx32.exe 2096 igfxpx32.exe 2096 igfxpx32.exe 2776 igfxpx32.exe 2776 igfxpx32.exe 2676 igfxpx32.exe 2676 igfxpx32.exe 1292 igfxpx32.exe 1292 igfxpx32.exe 3000 igfxpx32.exe 3000 igfxpx32.exe 264 igfxpx32.exe 264 igfxpx32.exe 1200 igfxpx32.exe 1200 igfxpx32.exe 2972 igfxpx32.exe 2972 igfxpx32.exe 1772 igfxpx32.exe 1772 igfxpx32.exe 2400 igfxpx32.exe 2400 igfxpx32.exe 1720 igfxpx32.exe 1720 igfxpx32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1732 wrote to memory of 3060 1732 ef1468580814f6552c19be6b02ba2b32_JaffaCakes118.exe 30 PID 1732 wrote to memory of 3060 1732 ef1468580814f6552c19be6b02ba2b32_JaffaCakes118.exe 30 PID 1732 wrote to memory of 3060 1732 ef1468580814f6552c19be6b02ba2b32_JaffaCakes118.exe 30 PID 1732 wrote to memory of 3060 1732 ef1468580814f6552c19be6b02ba2b32_JaffaCakes118.exe 30 PID 3060 wrote to memory of 2928 3060 igfxpx32.exe 31 PID 3060 wrote to memory of 2928 3060 igfxpx32.exe 31 PID 3060 wrote to memory of 2928 3060 igfxpx32.exe 31 PID 3060 wrote to memory of 2928 3060 igfxpx32.exe 31 PID 2928 wrote to memory of 2640 2928 igfxpx32.exe 33 PID 2928 wrote to memory of 2640 2928 igfxpx32.exe 33 PID 2928 wrote to memory of 2640 2928 igfxpx32.exe 33 PID 2928 wrote to memory of 2640 2928 igfxpx32.exe 33 PID 2640 wrote to memory of 2684 2640 igfxpx32.exe 34 PID 2640 wrote to memory of 2684 2640 igfxpx32.exe 34 PID 2640 wrote to memory of 2684 2640 igfxpx32.exe 34 PID 2640 wrote to memory of 2684 2640 igfxpx32.exe 34 PID 2684 wrote to memory of 524 2684 igfxpx32.exe 35 PID 2684 wrote to memory of 524 2684 igfxpx32.exe 35 PID 2684 wrote to memory of 524 2684 igfxpx32.exe 35 PID 2684 wrote to memory of 524 2684 igfxpx32.exe 35 PID 524 wrote to memory of 2812 524 igfxpx32.exe 36 PID 524 wrote to memory of 2812 524 igfxpx32.exe 36 PID 524 wrote to memory of 2812 524 igfxpx32.exe 36 PID 524 wrote to memory of 2812 524 igfxpx32.exe 36 PID 2812 wrote to memory of 1652 2812 igfxpx32.exe 37 PID 2812 wrote to memory of 1652 2812 igfxpx32.exe 37 PID 2812 wrote to memory of 1652 2812 igfxpx32.exe 37 PID 2812 wrote to memory of 1652 2812 igfxpx32.exe 37 PID 1652 wrote to memory of 2040 1652 igfxpx32.exe 38 PID 1652 wrote to memory of 2040 1652 igfxpx32.exe 38 PID 1652 wrote to memory of 2040 1652 igfxpx32.exe 38 PID 1652 wrote to memory of 2040 1652 igfxpx32.exe 38 PID 2040 wrote to memory of 2196 2040 igfxpx32.exe 39 PID 2040 wrote to memory of 2196 2040 igfxpx32.exe 39 PID 2040 wrote to memory of 2196 2040 igfxpx32.exe 39 PID 2040 wrote to memory of 2196 2040 igfxpx32.exe 39 PID 2196 wrote to memory of 2116 2196 igfxpx32.exe 40 PID 2196 wrote to memory of 2116 2196 igfxpx32.exe 40 PID 2196 wrote to memory of 2116 2196 igfxpx32.exe 40 PID 2196 wrote to memory of 2116 2196 igfxpx32.exe 40 PID 2116 wrote to memory of 556 2116 igfxpx32.exe 41 PID 2116 wrote to memory of 556 2116 igfxpx32.exe 41 PID 2116 wrote to memory of 556 2116 igfxpx32.exe 41 PID 2116 wrote to memory of 556 2116 igfxpx32.exe 41 PID 556 wrote to memory of 828 556 igfxpx32.exe 42 PID 556 wrote to memory of 828 556 igfxpx32.exe 42 PID 556 wrote to memory of 828 556 igfxpx32.exe 42 PID 556 wrote to memory of 828 556 igfxpx32.exe 42 PID 828 wrote to memory of 1068 828 igfxpx32.exe 43 PID 828 wrote to memory of 1068 828 igfxpx32.exe 43 PID 828 wrote to memory of 1068 828 igfxpx32.exe 43 PID 828 wrote to memory of 1068 828 igfxpx32.exe 43 PID 1068 wrote to memory of 1716 1068 igfxpx32.exe 44 PID 1068 wrote to memory of 1716 1068 igfxpx32.exe 44 PID 1068 wrote to memory of 1716 1068 igfxpx32.exe 44 PID 1068 wrote to memory of 1716 1068 igfxpx32.exe 44 PID 1716 wrote to memory of 3028 1716 igfxpx32.exe 45 PID 1716 wrote to memory of 3028 1716 igfxpx32.exe 45 PID 1716 wrote to memory of 3028 1716 igfxpx32.exe 45 PID 1716 wrote to memory of 3028 1716 igfxpx32.exe 45 PID 3028 wrote to memory of 1164 3028 igfxpx32.exe 46 PID 3028 wrote to memory of 1164 3028 igfxpx32.exe 46 PID 3028 wrote to memory of 1164 3028 igfxpx32.exe 46 PID 3028 wrote to memory of 1164 3028 igfxpx32.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef1468580814f6552c19be6b02ba2b32_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ef1468580814f6552c19be6b02ba2b32_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Users\Admin\AppData\Local\Temp\EF1468~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1164 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:760 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1612 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1732 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2988 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2096 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2776 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2676 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1292 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3000 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:264 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1200 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2972 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1772 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2400 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1720 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:904 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1904 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1392 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:644 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1068 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2460 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2296 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:756 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1692 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe42⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:968 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2544 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2548 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3068 -
C:\Windows\SysWOW64\igfxpx32.exe"C:\Windows\system32\igfxpx32.exe" C:\Windows\SysWOW64\igfxpx32.exe46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2412
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
197KB
MD5ef1468580814f6552c19be6b02ba2b32
SHA166c3f835fbe68e8ab1f6b8c729c903db48c8b792
SHA25668be06f4942d31a2271bdfd2a47f60fb8d02e137dffb8c37707377d173908d65
SHA512b3bbe454d7804b4e8608daa2e99b76e2581d97e8f4c8501005a348c0e2b9303914816863530428fe30c75de7bf51750904e14a28e946a87e35e5552cc7e64ba2