Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 08:49
Behavioral task
behavioral1
Sample
ef71c9c4670205398d4b7937f5f2498f_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ef71c9c4670205398d4b7937f5f2498f_JaffaCakes118.exe
-
Size
257KB
-
MD5
ef71c9c4670205398d4b7937f5f2498f
-
SHA1
af6601b12fb96903dfbdfe9be30750fc7ac1116b
-
SHA256
36787779630dbc9a8a62099387f9541b6cc98db05cc8c5ce10d41892cf39ae9a
-
SHA512
35d8d4917171aad114a6c18e9a9c8d0d2bc4cd14d358d3ea0c1e6a7eac885eb39e5f7eef97a9c1ed2e32be1c430a5658a408fed4e295c9f825a477a9f088b793
-
SSDEEP
6144:Ab+G4B1qBhWste4wmZ0nRvStn9pazG+JwHa5hb8x:Wy1SwstMy0RatbMG+Jw65ho
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2704 igfxpcv32.exe -
Executes dropped EXE 46 IoCs
pid Process 2704 igfxpcv32.exe 2556 igfxpcv32.exe 1752 igfxpcv32.exe 236 igfxpcv32.exe 480 igfxpcv32.exe 2160 igfxpcv32.exe 2912 igfxpcv32.exe 1696 igfxpcv32.exe 572 igfxpcv32.exe 596 igfxpcv32.exe 2188 igfxpcv32.exe 1924 igfxpcv32.exe 876 igfxpcv32.exe 2104 igfxpcv32.exe 2368 igfxpcv32.exe 2300 igfxpcv32.exe 1436 igfxpcv32.exe 2996 igfxpcv32.exe 1780 igfxpcv32.exe 2944 igfxpcv32.exe 2716 igfxpcv32.exe 2596 igfxpcv32.exe 3012 igfxpcv32.exe 1220 igfxpcv32.exe 2128 igfxpcv32.exe 2088 igfxpcv32.exe 2732 igfxpcv32.exe 2380 igfxpcv32.exe 1300 igfxpcv32.exe 1672 igfxpcv32.exe 2312 igfxpcv32.exe 2232 igfxpcv32.exe 2264 igfxpcv32.exe 376 igfxpcv32.exe 264 igfxpcv32.exe 1788 igfxpcv32.exe 1628 igfxpcv32.exe 1692 igfxpcv32.exe 2932 igfxpcv32.exe 1808 igfxpcv32.exe 1520 igfxpcv32.exe 1636 igfxpcv32.exe 2132 igfxpcv32.exe 2940 igfxpcv32.exe 2832 igfxpcv32.exe 1212 igfxpcv32.exe -
Loads dropped DLL 64 IoCs
pid Process 1728 ef71c9c4670205398d4b7937f5f2498f_JaffaCakes118.exe 1728 ef71c9c4670205398d4b7937f5f2498f_JaffaCakes118.exe 2704 igfxpcv32.exe 2704 igfxpcv32.exe 2556 igfxpcv32.exe 2556 igfxpcv32.exe 1752 igfxpcv32.exe 1752 igfxpcv32.exe 236 igfxpcv32.exe 236 igfxpcv32.exe 480 igfxpcv32.exe 480 igfxpcv32.exe 2160 igfxpcv32.exe 2160 igfxpcv32.exe 2912 igfxpcv32.exe 2912 igfxpcv32.exe 1696 igfxpcv32.exe 1696 igfxpcv32.exe 572 igfxpcv32.exe 572 igfxpcv32.exe 596 igfxpcv32.exe 596 igfxpcv32.exe 2188 igfxpcv32.exe 2188 igfxpcv32.exe 1924 igfxpcv32.exe 1924 igfxpcv32.exe 876 igfxpcv32.exe 876 igfxpcv32.exe 2104 igfxpcv32.exe 2104 igfxpcv32.exe 2368 igfxpcv32.exe 2368 igfxpcv32.exe 2300 igfxpcv32.exe 2300 igfxpcv32.exe 1436 igfxpcv32.exe 1436 igfxpcv32.exe 2996 igfxpcv32.exe 2996 igfxpcv32.exe 1780 igfxpcv32.exe 1780 igfxpcv32.exe 2944 igfxpcv32.exe 2944 igfxpcv32.exe 2716 igfxpcv32.exe 2716 igfxpcv32.exe 2596 igfxpcv32.exe 2596 igfxpcv32.exe 3012 igfxpcv32.exe 3012 igfxpcv32.exe 1220 igfxpcv32.exe 1220 igfxpcv32.exe 2128 igfxpcv32.exe 2128 igfxpcv32.exe 2088 igfxpcv32.exe 2088 igfxpcv32.exe 2732 igfxpcv32.exe 2732 igfxpcv32.exe 2380 igfxpcv32.exe 2380 igfxpcv32.exe 1300 igfxpcv32.exe 1300 igfxpcv32.exe 1672 igfxpcv32.exe 1672 igfxpcv32.exe 2312 igfxpcv32.exe 2312 igfxpcv32.exe -
resource yara_rule behavioral1/memory/1728-0-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/1728-2-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/files/0x00090000000120f9-6.dat upx behavioral1/memory/2704-18-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2704-19-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2704-17-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/1728-16-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2556-24-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2704-26-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2556-34-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/1752-32-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2556-31-0x00000000031D0000-0x0000000003267000-memory.dmp upx behavioral1/memory/236-40-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/1752-39-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/480-46-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/236-48-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2160-54-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/480-53-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2160-58-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2912-64-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/1696-65-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/1696-71-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/596-77-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/572-76-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2188-82-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/596-84-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/1924-89-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2188-87-0x0000000003450000-0x00000000034E7000-memory.dmp upx behavioral1/memory/2188-90-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/1924-97-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/1924-95-0x0000000002FA0000-0x0000000003037000-memory.dmp upx behavioral1/memory/876-103-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2104-104-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2104-110-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2368-116-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/1436-123-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2300-125-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/1436-131-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2996-133-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/1780-134-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/1780-136-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2944-137-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2716-140-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2944-139-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2596-143-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2716-142-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2596-145-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/3012-146-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/3012-148-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/1220-150-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2128-151-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2088-154-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2128-153-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2088-157-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2732-155-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2380-158-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2732-160-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2380-162-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/1300-164-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/1672-166-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2312-167-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2312-169-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2264-170-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2232-172-0x0000000000400000-0x0000000000497000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 ef71c9c4670205398d4b7937f5f2498f_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum ef71c9c4670205398d4b7937f5f2498f_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpcv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpcv32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File created C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\ igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File created C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\ igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\ igfxpcv32.exe File created C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\ igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\ igfxpcv32.exe File created C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\ igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\ igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\ igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\ igfxpcv32.exe File created C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\ igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File created C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File created C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File created C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File created C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File created C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\ igfxpcv32.exe File created C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File created C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File created C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File created C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File created C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File created C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File created C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File created C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\ igfxpcv32.exe File created C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File created C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File created C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File created C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File created C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\ igfxpcv32.exe File created C:\Windows\SysWOW64\igfxpcv32.exe ef71c9c4670205398d4b7937f5f2498f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxpcv32.exe File created C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\ igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\ igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\ igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\ igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\ igfxpcv32.exe File created C:\Windows\SysWOW64\igfxpcv32.exe igfxpcv32.exe File opened for modification C:\Windows\SysWOW64\ igfxpcv32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 47 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef71c9c4670205398d4b7937f5f2498f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpcv32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1728 ef71c9c4670205398d4b7937f5f2498f_JaffaCakes118.exe 1728 ef71c9c4670205398d4b7937f5f2498f_JaffaCakes118.exe 2704 igfxpcv32.exe 2704 igfxpcv32.exe 2556 igfxpcv32.exe 2556 igfxpcv32.exe 1752 igfxpcv32.exe 1752 igfxpcv32.exe 236 igfxpcv32.exe 236 igfxpcv32.exe 480 igfxpcv32.exe 480 igfxpcv32.exe 2160 igfxpcv32.exe 2160 igfxpcv32.exe 2912 igfxpcv32.exe 2912 igfxpcv32.exe 1696 igfxpcv32.exe 1696 igfxpcv32.exe 572 igfxpcv32.exe 572 igfxpcv32.exe 596 igfxpcv32.exe 596 igfxpcv32.exe 2188 igfxpcv32.exe 2188 igfxpcv32.exe 1924 igfxpcv32.exe 1924 igfxpcv32.exe 876 igfxpcv32.exe 876 igfxpcv32.exe 2104 igfxpcv32.exe 2104 igfxpcv32.exe 2368 igfxpcv32.exe 2368 igfxpcv32.exe 2300 igfxpcv32.exe 2300 igfxpcv32.exe 1436 igfxpcv32.exe 1436 igfxpcv32.exe 2996 igfxpcv32.exe 2996 igfxpcv32.exe 1780 igfxpcv32.exe 1780 igfxpcv32.exe 2944 igfxpcv32.exe 2944 igfxpcv32.exe 2716 igfxpcv32.exe 2716 igfxpcv32.exe 2596 igfxpcv32.exe 2596 igfxpcv32.exe 3012 igfxpcv32.exe 3012 igfxpcv32.exe 1220 igfxpcv32.exe 1220 igfxpcv32.exe 2128 igfxpcv32.exe 2128 igfxpcv32.exe 2088 igfxpcv32.exe 2088 igfxpcv32.exe 2732 igfxpcv32.exe 2732 igfxpcv32.exe 2380 igfxpcv32.exe 2380 igfxpcv32.exe 1300 igfxpcv32.exe 1300 igfxpcv32.exe 1672 igfxpcv32.exe 1672 igfxpcv32.exe 2312 igfxpcv32.exe 2312 igfxpcv32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2704 1728 ef71c9c4670205398d4b7937f5f2498f_JaffaCakes118.exe 30 PID 1728 wrote to memory of 2704 1728 ef71c9c4670205398d4b7937f5f2498f_JaffaCakes118.exe 30 PID 1728 wrote to memory of 2704 1728 ef71c9c4670205398d4b7937f5f2498f_JaffaCakes118.exe 30 PID 1728 wrote to memory of 2704 1728 ef71c9c4670205398d4b7937f5f2498f_JaffaCakes118.exe 30 PID 2704 wrote to memory of 2556 2704 igfxpcv32.exe 31 PID 2704 wrote to memory of 2556 2704 igfxpcv32.exe 31 PID 2704 wrote to memory of 2556 2704 igfxpcv32.exe 31 PID 2704 wrote to memory of 2556 2704 igfxpcv32.exe 31 PID 2556 wrote to memory of 1752 2556 igfxpcv32.exe 32 PID 2556 wrote to memory of 1752 2556 igfxpcv32.exe 32 PID 2556 wrote to memory of 1752 2556 igfxpcv32.exe 32 PID 2556 wrote to memory of 1752 2556 igfxpcv32.exe 32 PID 1752 wrote to memory of 236 1752 igfxpcv32.exe 33 PID 1752 wrote to memory of 236 1752 igfxpcv32.exe 33 PID 1752 wrote to memory of 236 1752 igfxpcv32.exe 33 PID 1752 wrote to memory of 236 1752 igfxpcv32.exe 33 PID 236 wrote to memory of 480 236 igfxpcv32.exe 34 PID 236 wrote to memory of 480 236 igfxpcv32.exe 34 PID 236 wrote to memory of 480 236 igfxpcv32.exe 34 PID 236 wrote to memory of 480 236 igfxpcv32.exe 34 PID 480 wrote to memory of 2160 480 igfxpcv32.exe 35 PID 480 wrote to memory of 2160 480 igfxpcv32.exe 35 PID 480 wrote to memory of 2160 480 igfxpcv32.exe 35 PID 480 wrote to memory of 2160 480 igfxpcv32.exe 35 PID 2160 wrote to memory of 2912 2160 igfxpcv32.exe 36 PID 2160 wrote to memory of 2912 2160 igfxpcv32.exe 36 PID 2160 wrote to memory of 2912 2160 igfxpcv32.exe 36 PID 2160 wrote to memory of 2912 2160 igfxpcv32.exe 36 PID 2912 wrote to memory of 1696 2912 igfxpcv32.exe 37 PID 2912 wrote to memory of 1696 2912 igfxpcv32.exe 37 PID 2912 wrote to memory of 1696 2912 igfxpcv32.exe 37 PID 2912 wrote to memory of 1696 2912 igfxpcv32.exe 37 PID 1696 wrote to memory of 572 1696 igfxpcv32.exe 38 PID 1696 wrote to memory of 572 1696 igfxpcv32.exe 38 PID 1696 wrote to memory of 572 1696 igfxpcv32.exe 38 PID 1696 wrote to memory of 572 1696 igfxpcv32.exe 38 PID 572 wrote to memory of 596 572 igfxpcv32.exe 39 PID 572 wrote to memory of 596 572 igfxpcv32.exe 39 PID 572 wrote to memory of 596 572 igfxpcv32.exe 39 PID 572 wrote to memory of 596 572 igfxpcv32.exe 39 PID 596 wrote to memory of 2188 596 igfxpcv32.exe 40 PID 596 wrote to memory of 2188 596 igfxpcv32.exe 40 PID 596 wrote to memory of 2188 596 igfxpcv32.exe 40 PID 596 wrote to memory of 2188 596 igfxpcv32.exe 40 PID 2188 wrote to memory of 1924 2188 igfxpcv32.exe 41 PID 2188 wrote to memory of 1924 2188 igfxpcv32.exe 41 PID 2188 wrote to memory of 1924 2188 igfxpcv32.exe 41 PID 2188 wrote to memory of 1924 2188 igfxpcv32.exe 41 PID 1924 wrote to memory of 876 1924 igfxpcv32.exe 42 PID 1924 wrote to memory of 876 1924 igfxpcv32.exe 42 PID 1924 wrote to memory of 876 1924 igfxpcv32.exe 42 PID 1924 wrote to memory of 876 1924 igfxpcv32.exe 42 PID 876 wrote to memory of 2104 876 igfxpcv32.exe 43 PID 876 wrote to memory of 2104 876 igfxpcv32.exe 43 PID 876 wrote to memory of 2104 876 igfxpcv32.exe 43 PID 876 wrote to memory of 2104 876 igfxpcv32.exe 43 PID 2104 wrote to memory of 2368 2104 igfxpcv32.exe 44 PID 2104 wrote to memory of 2368 2104 igfxpcv32.exe 44 PID 2104 wrote to memory of 2368 2104 igfxpcv32.exe 44 PID 2104 wrote to memory of 2368 2104 igfxpcv32.exe 44 PID 2368 wrote to memory of 2300 2368 igfxpcv32.exe 45 PID 2368 wrote to memory of 2300 2368 igfxpcv32.exe 45 PID 2368 wrote to memory of 2300 2368 igfxpcv32.exe 45 PID 2368 wrote to memory of 2300 2368 igfxpcv32.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef71c9c4670205398d4b7937f5f2498f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ef71c9c4670205398d4b7937f5f2498f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Users\Admin\AppData\Local\Temp\EF71C9~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:236 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:480 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2300 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1436 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2996 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1780 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2944 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2716 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2596 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3012 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1220 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2128 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2088 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2732 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE29⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2380 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1300 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1672 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE32⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2312 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2232 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE34⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2264 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:376 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:264 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1788 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1628 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1692 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2932 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1808 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE42⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1520 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1636 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2132 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE45⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2940 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2832 -
C:\Windows\SysWOW64\igfxpcv32.exe"C:\Windows\system32\igfxpcv32.exe" C:\Windows\SysWOW64\IGFXPC~1.EXE47⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1212
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257KB
MD5ef71c9c4670205398d4b7937f5f2498f
SHA1af6601b12fb96903dfbdfe9be30750fc7ac1116b
SHA25636787779630dbc9a8a62099387f9541b6cc98db05cc8c5ce10d41892cf39ae9a
SHA51235d8d4917171aad114a6c18e9a9c8d0d2bc4cd14d358d3ea0c1e6a7eac885eb39e5f7eef97a9c1ed2e32be1c430a5658a408fed4e295c9f825a477a9f088b793