Analysis
-
max time kernel
119s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 08:52
Static task
static1
Behavioral task
behavioral1
Sample
21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe
Resource
win10v2004-20240802-en
General
-
Target
21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe
-
Size
252KB
-
MD5
e4ed055c8bb12f3e97eed72634b41be0
-
SHA1
0906b7fc355f475695799cc046b7d496bd2346fa
-
SHA256
21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4
-
SHA512
5980e7a22d1d952df78f0e70191fd1fbf0ff10e2381937a9cbf1f16b073d56d1346a9308b8a938b16e4efcc69cbc7c3a65418ff246de12d9e0a62a0f44126435
-
SSDEEP
6144:i8qTImoqYir+SU/cxnBcPJxFByfzV5QNCxcMg3iaTP1QScfhV:2IqYiKS2cxBKJxkV5QpD3iaTPeScP
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings 2 TTPs 36 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation igfxdct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation igfxdct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation igfxdct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation igfxdct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation igfxdct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation igfxdct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation igfxdct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation igfxdct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation igfxdct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation igfxdct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation igfxdct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation igfxdct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation igfxdct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation igfxdct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation igfxdct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation igfxdct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation igfxdct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation igfxdct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation igfxdct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation igfxdct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation igfxdct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation igfxdct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation igfxdct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation igfxdct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation igfxdct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation igfxdct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation igfxdct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation igfxdct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation igfxdct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation igfxdct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation igfxdct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation igfxdct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation igfxdct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation igfxdct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation igfxdct32.exe -
Deletes itself 1 IoCs
pid Process 2364 igfxdct32.exe -
Executes dropped EXE 36 IoCs
pid Process 2364 igfxdct32.exe 3600 igfxdct32.exe 1360 igfxdct32.exe 4200 igfxdct32.exe 2304 igfxdct32.exe 3380 igfxdct32.exe 4916 igfxdct32.exe 2228 igfxdct32.exe 4220 igfxdct32.exe 2748 igfxdct32.exe 3372 igfxdct32.exe 2724 igfxdct32.exe 2688 igfxdct32.exe 4116 igfxdct32.exe 4488 igfxdct32.exe 2312 igfxdct32.exe 1404 igfxdct32.exe 3684 igfxdct32.exe 4136 igfxdct32.exe 4844 igfxdct32.exe 1708 igfxdct32.exe 4732 igfxdct32.exe 3392 igfxdct32.exe 4820 igfxdct32.exe 5016 igfxdct32.exe 3780 igfxdct32.exe 1284 igfxdct32.exe 3264 igfxdct32.exe 4904 igfxdct32.exe 4384 igfxdct32.exe 3568 igfxdct32.exe 4484 igfxdct32.exe 1532 igfxdct32.exe 4976 igfxdct32.exe 768 igfxdct32.exe 996 igfxdct32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 37 IoCs
pid Process 2576 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe 2364 igfxdct32.exe 3600 igfxdct32.exe 1360 igfxdct32.exe 4200 igfxdct32.exe 2304 igfxdct32.exe 3380 igfxdct32.exe 4916 igfxdct32.exe 2228 igfxdct32.exe 4220 igfxdct32.exe 2748 igfxdct32.exe 3372 igfxdct32.exe 2724 igfxdct32.exe 2688 igfxdct32.exe 4116 igfxdct32.exe 4488 igfxdct32.exe 2312 igfxdct32.exe 1404 igfxdct32.exe 3684 igfxdct32.exe 4136 igfxdct32.exe 4844 igfxdct32.exe 1708 igfxdct32.exe 4732 igfxdct32.exe 3392 igfxdct32.exe 4820 igfxdct32.exe 5016 igfxdct32.exe 3780 igfxdct32.exe 1284 igfxdct32.exe 3264 igfxdct32.exe 4904 igfxdct32.exe 4384 igfxdct32.exe 3568 igfxdct32.exe 4484 igfxdct32.exe 1532 igfxdct32.exe 4976 igfxdct32.exe 768 igfxdct32.exe 996 igfxdct32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 36 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe -
Modifies registry class 36 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdct32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2576 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe 2576 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe 2576 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe 2576 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe 2576 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe 2576 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe 2576 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe 2576 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe 2576 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe 2576 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe 2576 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe 2576 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe 2576 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe 2576 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe 2576 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe 2576 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe 2576 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe 2576 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe 2576 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe 2576 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe 2576 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe 2576 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe 2576 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe 2576 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe 2576 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe 2576 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe 2576 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe 2576 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe 2576 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe 2576 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe 2576 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe 2576 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe 2364 igfxdct32.exe 2364 igfxdct32.exe 2364 igfxdct32.exe 2364 igfxdct32.exe 2364 igfxdct32.exe 2364 igfxdct32.exe 2364 igfxdct32.exe 2364 igfxdct32.exe 2364 igfxdct32.exe 2364 igfxdct32.exe 2364 igfxdct32.exe 2364 igfxdct32.exe 2364 igfxdct32.exe 2364 igfxdct32.exe 2364 igfxdct32.exe 2364 igfxdct32.exe 2364 igfxdct32.exe 2364 igfxdct32.exe 2364 igfxdct32.exe 2364 igfxdct32.exe 2364 igfxdct32.exe 2364 igfxdct32.exe 2364 igfxdct32.exe 2364 igfxdct32.exe 2364 igfxdct32.exe 2364 igfxdct32.exe 2364 igfxdct32.exe 2364 igfxdct32.exe 2364 igfxdct32.exe 2364 igfxdct32.exe 2364 igfxdct32.exe 2364 igfxdct32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2576 wrote to memory of 2364 2576 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe 82 PID 2576 wrote to memory of 2364 2576 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe 82 PID 2576 wrote to memory of 2364 2576 21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe 82 PID 2364 wrote to memory of 3600 2364 igfxdct32.exe 87 PID 2364 wrote to memory of 3600 2364 igfxdct32.exe 87 PID 2364 wrote to memory of 3600 2364 igfxdct32.exe 87 PID 3600 wrote to memory of 1360 3600 igfxdct32.exe 89 PID 3600 wrote to memory of 1360 3600 igfxdct32.exe 89 PID 3600 wrote to memory of 1360 3600 igfxdct32.exe 89 PID 1360 wrote to memory of 4200 1360 igfxdct32.exe 92 PID 1360 wrote to memory of 4200 1360 igfxdct32.exe 92 PID 1360 wrote to memory of 4200 1360 igfxdct32.exe 92 PID 4200 wrote to memory of 2304 4200 igfxdct32.exe 93 PID 4200 wrote to memory of 2304 4200 igfxdct32.exe 93 PID 4200 wrote to memory of 2304 4200 igfxdct32.exe 93 PID 2304 wrote to memory of 3380 2304 igfxdct32.exe 94 PID 2304 wrote to memory of 3380 2304 igfxdct32.exe 94 PID 2304 wrote to memory of 3380 2304 igfxdct32.exe 94 PID 3380 wrote to memory of 4916 3380 igfxdct32.exe 95 PID 3380 wrote to memory of 4916 3380 igfxdct32.exe 95 PID 3380 wrote to memory of 4916 3380 igfxdct32.exe 95 PID 4916 wrote to memory of 2228 4916 igfxdct32.exe 96 PID 4916 wrote to memory of 2228 4916 igfxdct32.exe 96 PID 4916 wrote to memory of 2228 4916 igfxdct32.exe 96 PID 2228 wrote to memory of 4220 2228 igfxdct32.exe 97 PID 2228 wrote to memory of 4220 2228 igfxdct32.exe 97 PID 2228 wrote to memory of 4220 2228 igfxdct32.exe 97 PID 4220 wrote to memory of 2748 4220 igfxdct32.exe 99 PID 4220 wrote to memory of 2748 4220 igfxdct32.exe 99 PID 4220 wrote to memory of 2748 4220 igfxdct32.exe 99 PID 2748 wrote to memory of 3372 2748 igfxdct32.exe 100 PID 2748 wrote to memory of 3372 2748 igfxdct32.exe 100 PID 2748 wrote to memory of 3372 2748 igfxdct32.exe 100 PID 3372 wrote to memory of 2724 3372 igfxdct32.exe 102 PID 3372 wrote to memory of 2724 3372 igfxdct32.exe 102 PID 3372 wrote to memory of 2724 3372 igfxdct32.exe 102 PID 2724 wrote to memory of 2688 2724 igfxdct32.exe 103 PID 2724 wrote to memory of 2688 2724 igfxdct32.exe 103 PID 2724 wrote to memory of 2688 2724 igfxdct32.exe 103 PID 2688 wrote to memory of 4116 2688 igfxdct32.exe 104 PID 2688 wrote to memory of 4116 2688 igfxdct32.exe 104 PID 2688 wrote to memory of 4116 2688 igfxdct32.exe 104 PID 4116 wrote to memory of 4488 4116 igfxdct32.exe 105 PID 4116 wrote to memory of 4488 4116 igfxdct32.exe 105 PID 4116 wrote to memory of 4488 4116 igfxdct32.exe 105 PID 4488 wrote to memory of 2312 4488 igfxdct32.exe 106 PID 4488 wrote to memory of 2312 4488 igfxdct32.exe 106 PID 4488 wrote to memory of 2312 4488 igfxdct32.exe 106 PID 2312 wrote to memory of 1404 2312 igfxdct32.exe 107 PID 2312 wrote to memory of 1404 2312 igfxdct32.exe 107 PID 2312 wrote to memory of 1404 2312 igfxdct32.exe 107 PID 1404 wrote to memory of 3684 1404 igfxdct32.exe 108 PID 1404 wrote to memory of 3684 1404 igfxdct32.exe 108 PID 1404 wrote to memory of 3684 1404 igfxdct32.exe 108 PID 3684 wrote to memory of 4136 3684 igfxdct32.exe 109 PID 3684 wrote to memory of 4136 3684 igfxdct32.exe 109 PID 3684 wrote to memory of 4136 3684 igfxdct32.exe 109 PID 4136 wrote to memory of 4844 4136 igfxdct32.exe 110 PID 4136 wrote to memory of 4844 4136 igfxdct32.exe 110 PID 4136 wrote to memory of 4844 4136 igfxdct32.exe 110 PID 4844 wrote to memory of 1708 4844 igfxdct32.exe 111 PID 4844 wrote to memory of 1708 4844 igfxdct32.exe 111 PID 4844 wrote to memory of 1708 4844 igfxdct32.exe 111 PID 1708 wrote to memory of 4732 1708 igfxdct32.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe"C:\Users\Admin\AppData\Local\Temp\21cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4N.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Users\Admin\AppData\Local\Temp\21CC4B~1.EXE2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE3⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE5⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE7⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE9⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE11⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE13⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE15⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE17⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE19⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE21⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE23⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4732 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3392 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE25⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4820 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5016 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE27⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3780 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1284 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE29⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3264 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4904 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE31⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4384 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3568 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE33⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4484 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1532 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE35⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4976 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:768 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:996
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD5e4ed055c8bb12f3e97eed72634b41be0
SHA10906b7fc355f475695799cc046b7d496bd2346fa
SHA25621cc4b252c5c1acd98a075a299e7a929e53138ec3ee4e5b66920e3d8107440b4
SHA5125980e7a22d1d952df78f0e70191fd1fbf0ff10e2381937a9cbf1f16b073d56d1346a9308b8a938b16e4efcc69cbc7c3a65418ff246de12d9e0a62a0f44126435