Analysis
-
max time kernel
148s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 04:10
Behavioral task
behavioral1
Sample
ef0adc381b8f91ba4d15f1974d1ad6d6_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ef0adc381b8f91ba4d15f1974d1ad6d6_JaffaCakes118.exe
-
Size
509KB
-
MD5
ef0adc381b8f91ba4d15f1974d1ad6d6
-
SHA1
1788493893e381e7ce524bd1508ff17b832c3050
-
SHA256
8a9cc40e3fe71fbb57dbb77c88b321a98ff1e8a9187214da6de1d88a22d3c6d5
-
SHA512
310a7a628d0144b1eb957fe94aa483f5cb7f32be05b758c6bdd555a1de09587783b646fbeeba4ef40545a5403181c253fa2da3d5aa37f9f74f9d6d4e65ba01da
-
SSDEEP
6144:+5SkUafGDETiAT/KZUxZ0nnHCu9q0ubDWHACSlDJ:FoOAv/sUuni6ADWHEdJ
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2392 igfxman86.exe -
Executes dropped EXE 47 IoCs
pid Process 2392 igfxman86.exe 2820 igfxman86.exe 2832 igfxman86.exe 2836 igfxman86.exe 2440 igfxman86.exe 1648 igfxman86.exe 1460 igfxman86.exe 2368 igfxman86.exe 2852 igfxman86.exe 2104 igfxman86.exe 2152 igfxman86.exe 2592 igfxman86.exe 2124 igfxman86.exe 2376 igfxman86.exe 792 igfxman86.exe 288 igfxman86.exe 2464 igfxman86.exe 2192 igfxman86.exe 1780 igfxman86.exe 1324 igfxman86.exe 3060 igfxman86.exe 2744 igfxman86.exe 2768 igfxman86.exe 2644 igfxman86.exe 1220 igfxman86.exe 2440 igfxman86.exe 1684 igfxman86.exe 1304 igfxman86.exe 2840 igfxman86.exe 2368 igfxman86.exe 2316 igfxman86.exe 2992 igfxman86.exe 1520 igfxman86.exe 2444 igfxman86.exe 784 igfxman86.exe 2020 igfxman86.exe 1944 igfxman86.exe 2500 igfxman86.exe 2408 igfxman86.exe 912 igfxman86.exe 3020 igfxman86.exe 1852 igfxman86.exe 2344 igfxman86.exe 2236 igfxman86.exe 3028 igfxman86.exe 3000 igfxman86.exe 2432 igfxman86.exe -
Loads dropped DLL 64 IoCs
pid Process 1732 ef0adc381b8f91ba4d15f1974d1ad6d6_JaffaCakes118.exe 1732 ef0adc381b8f91ba4d15f1974d1ad6d6_JaffaCakes118.exe 2392 igfxman86.exe 2392 igfxman86.exe 2820 igfxman86.exe 2820 igfxman86.exe 2832 igfxman86.exe 2832 igfxman86.exe 2836 igfxman86.exe 2836 igfxman86.exe 2440 igfxman86.exe 2440 igfxman86.exe 1648 igfxman86.exe 1648 igfxman86.exe 1460 igfxman86.exe 1460 igfxman86.exe 2368 igfxman86.exe 2368 igfxman86.exe 2852 igfxman86.exe 2852 igfxman86.exe 2104 igfxman86.exe 2104 igfxman86.exe 2152 igfxman86.exe 2152 igfxman86.exe 2592 igfxman86.exe 2592 igfxman86.exe 2124 igfxman86.exe 2124 igfxman86.exe 2376 igfxman86.exe 2376 igfxman86.exe 792 igfxman86.exe 792 igfxman86.exe 288 igfxman86.exe 288 igfxman86.exe 2464 igfxman86.exe 2464 igfxman86.exe 2192 igfxman86.exe 2192 igfxman86.exe 1780 igfxman86.exe 1780 igfxman86.exe 1324 igfxman86.exe 1324 igfxman86.exe 3060 igfxman86.exe 3060 igfxman86.exe 2744 igfxman86.exe 2744 igfxman86.exe 2768 igfxman86.exe 2768 igfxman86.exe 2644 igfxman86.exe 2644 igfxman86.exe 1220 igfxman86.exe 1220 igfxman86.exe 2440 igfxman86.exe 2440 igfxman86.exe 1684 igfxman86.exe 1684 igfxman86.exe 1304 igfxman86.exe 1304 igfxman86.exe 2840 igfxman86.exe 2840 igfxman86.exe 2368 igfxman86.exe 2368 igfxman86.exe 2316 igfxman86.exe 2316 igfxman86.exe -
resource yara_rule behavioral1/memory/1732-0-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/files/0x00080000000120ff-5.dat upx behavioral1/memory/2852-67-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2104-76-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2152-85-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2376-101-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2124-100-0x00000000032D0000-0x0000000003361000-memory.dmp upx behavioral1/memory/1324-126-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2644-139-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2368-153-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2444-165-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2020-171-0x0000000003650000-0x00000000036E1000-memory.dmp upx behavioral1/memory/2500-175-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1852-187-0x0000000000400000-0x0000000000491000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 ef0adc381b8f91ba4d15f1974d1ad6d6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum ef0adc381b8f91ba4d15f1974d1ad6d6_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File opened for modification C:\Windows\SysWOW64\ ef0adc381b8f91ba4d15f1974d1ad6d6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 48 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef0adc381b8f91ba4d15f1974d1ad6d6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1732 ef0adc381b8f91ba4d15f1974d1ad6d6_JaffaCakes118.exe 1732 ef0adc381b8f91ba4d15f1974d1ad6d6_JaffaCakes118.exe 2392 igfxman86.exe 2392 igfxman86.exe 2820 igfxman86.exe 2820 igfxman86.exe 2832 igfxman86.exe 2832 igfxman86.exe 2836 igfxman86.exe 2836 igfxman86.exe 2440 igfxman86.exe 2440 igfxman86.exe 1648 igfxman86.exe 1648 igfxman86.exe 1460 igfxman86.exe 1460 igfxman86.exe 2368 igfxman86.exe 2368 igfxman86.exe 2852 igfxman86.exe 2852 igfxman86.exe 2104 igfxman86.exe 2104 igfxman86.exe 2152 igfxman86.exe 2152 igfxman86.exe 2592 igfxman86.exe 2592 igfxman86.exe 2124 igfxman86.exe 2124 igfxman86.exe 2376 igfxman86.exe 2376 igfxman86.exe 792 igfxman86.exe 792 igfxman86.exe 288 igfxman86.exe 288 igfxman86.exe 2464 igfxman86.exe 2464 igfxman86.exe 2192 igfxman86.exe 2192 igfxman86.exe 1780 igfxman86.exe 1780 igfxman86.exe 1324 igfxman86.exe 1324 igfxman86.exe 3060 igfxman86.exe 3060 igfxman86.exe 2744 igfxman86.exe 2744 igfxman86.exe 2768 igfxman86.exe 2768 igfxman86.exe 2644 igfxman86.exe 2644 igfxman86.exe 1220 igfxman86.exe 1220 igfxman86.exe 2440 igfxman86.exe 2440 igfxman86.exe 1684 igfxman86.exe 1684 igfxman86.exe 1304 igfxman86.exe 1304 igfxman86.exe 2840 igfxman86.exe 2840 igfxman86.exe 2368 igfxman86.exe 2368 igfxman86.exe 2316 igfxman86.exe 2316 igfxman86.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2392 1732 ef0adc381b8f91ba4d15f1974d1ad6d6_JaffaCakes118.exe 30 PID 1732 wrote to memory of 2392 1732 ef0adc381b8f91ba4d15f1974d1ad6d6_JaffaCakes118.exe 30 PID 1732 wrote to memory of 2392 1732 ef0adc381b8f91ba4d15f1974d1ad6d6_JaffaCakes118.exe 30 PID 1732 wrote to memory of 2392 1732 ef0adc381b8f91ba4d15f1974d1ad6d6_JaffaCakes118.exe 30 PID 2392 wrote to memory of 2820 2392 igfxman86.exe 31 PID 2392 wrote to memory of 2820 2392 igfxman86.exe 31 PID 2392 wrote to memory of 2820 2392 igfxman86.exe 31 PID 2392 wrote to memory of 2820 2392 igfxman86.exe 31 PID 2820 wrote to memory of 2832 2820 igfxman86.exe 32 PID 2820 wrote to memory of 2832 2820 igfxman86.exe 32 PID 2820 wrote to memory of 2832 2820 igfxman86.exe 32 PID 2820 wrote to memory of 2832 2820 igfxman86.exe 32 PID 2832 wrote to memory of 2836 2832 igfxman86.exe 34 PID 2832 wrote to memory of 2836 2832 igfxman86.exe 34 PID 2832 wrote to memory of 2836 2832 igfxman86.exe 34 PID 2832 wrote to memory of 2836 2832 igfxman86.exe 34 PID 2836 wrote to memory of 2440 2836 igfxman86.exe 35 PID 2836 wrote to memory of 2440 2836 igfxman86.exe 35 PID 2836 wrote to memory of 2440 2836 igfxman86.exe 35 PID 2836 wrote to memory of 2440 2836 igfxman86.exe 35 PID 2440 wrote to memory of 1648 2440 igfxman86.exe 36 PID 2440 wrote to memory of 1648 2440 igfxman86.exe 36 PID 2440 wrote to memory of 1648 2440 igfxman86.exe 36 PID 2440 wrote to memory of 1648 2440 igfxman86.exe 36 PID 1648 wrote to memory of 1460 1648 igfxman86.exe 37 PID 1648 wrote to memory of 1460 1648 igfxman86.exe 37 PID 1648 wrote to memory of 1460 1648 igfxman86.exe 37 PID 1648 wrote to memory of 1460 1648 igfxman86.exe 37 PID 1460 wrote to memory of 2368 1460 igfxman86.exe 38 PID 1460 wrote to memory of 2368 1460 igfxman86.exe 38 PID 1460 wrote to memory of 2368 1460 igfxman86.exe 38 PID 1460 wrote to memory of 2368 1460 igfxman86.exe 38 PID 2368 wrote to memory of 2852 2368 igfxman86.exe 39 PID 2368 wrote to memory of 2852 2368 igfxman86.exe 39 PID 2368 wrote to memory of 2852 2368 igfxman86.exe 39 PID 2368 wrote to memory of 2852 2368 igfxman86.exe 39 PID 2852 wrote to memory of 2104 2852 igfxman86.exe 40 PID 2852 wrote to memory of 2104 2852 igfxman86.exe 40 PID 2852 wrote to memory of 2104 2852 igfxman86.exe 40 PID 2852 wrote to memory of 2104 2852 igfxman86.exe 40 PID 2104 wrote to memory of 2152 2104 igfxman86.exe 41 PID 2104 wrote to memory of 2152 2104 igfxman86.exe 41 PID 2104 wrote to memory of 2152 2104 igfxman86.exe 41 PID 2104 wrote to memory of 2152 2104 igfxman86.exe 41 PID 2152 wrote to memory of 2592 2152 igfxman86.exe 42 PID 2152 wrote to memory of 2592 2152 igfxman86.exe 42 PID 2152 wrote to memory of 2592 2152 igfxman86.exe 42 PID 2152 wrote to memory of 2592 2152 igfxman86.exe 42 PID 2592 wrote to memory of 2124 2592 igfxman86.exe 43 PID 2592 wrote to memory of 2124 2592 igfxman86.exe 43 PID 2592 wrote to memory of 2124 2592 igfxman86.exe 43 PID 2592 wrote to memory of 2124 2592 igfxman86.exe 43 PID 2124 wrote to memory of 2376 2124 igfxman86.exe 44 PID 2124 wrote to memory of 2376 2124 igfxman86.exe 44 PID 2124 wrote to memory of 2376 2124 igfxman86.exe 44 PID 2124 wrote to memory of 2376 2124 igfxman86.exe 44 PID 2376 wrote to memory of 792 2376 igfxman86.exe 45 PID 2376 wrote to memory of 792 2376 igfxman86.exe 45 PID 2376 wrote to memory of 792 2376 igfxman86.exe 45 PID 2376 wrote to memory of 792 2376 igfxman86.exe 45 PID 792 wrote to memory of 288 792 igfxman86.exe 46 PID 792 wrote to memory of 288 792 igfxman86.exe 46 PID 792 wrote to memory of 288 792 igfxman86.exe 46 PID 792 wrote to memory of 288 792 igfxman86.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef0adc381b8f91ba4d15f1974d1ad6d6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ef0adc381b8f91ba4d15f1974d1ad6d6_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Users\Admin\AppData\Local\Temp\EF0ADC~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE11⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:288 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2464 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2192 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1780 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1324 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3060 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2744 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2768 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE25⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2644 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1220 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2440 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1684 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE29⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1304 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2840 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2368 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2316 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2992 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1520 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2444 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:784 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2020 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1944 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2500 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2408 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:912 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE42⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3020 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1852 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2344 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2236 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE46⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3028 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE47⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3000 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE48⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2432
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
509KB
MD5ef0adc381b8f91ba4d15f1974d1ad6d6
SHA11788493893e381e7ce524bd1508ff17b832c3050
SHA2568a9cc40e3fe71fbb57dbb77c88b321a98ff1e8a9187214da6de1d88a22d3c6d5
SHA512310a7a628d0144b1eb957fe94aa483f5cb7f32be05b758c6bdd555a1de09587783b646fbeeba4ef40545a5403181c253fa2da3d5aa37f9f74f9d6d4e65ba01da