Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-09-2024 04:29
Behavioral task
behavioral1
Sample
f148f36075f8aa6ec7d70172eeacff08_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f148f36075f8aa6ec7d70172eeacff08_JaffaCakes118.exe
-
Size
240KB
-
MD5
f148f36075f8aa6ec7d70172eeacff08
-
SHA1
0d86b51157dba2cc1a2ed339fb35d9c1b7f62f71
-
SHA256
70c206402f5f0a0a680dd340f16c264564f91d09c6617defce7393615bee9bb4
-
SHA512
954fc981fc39dffcf51ac5b6986bf2093fc089906b04555c4bd5a0ae0b2171ff489776be516716d793bd691e0100e54046b1b5ca580ca9558c5d3d307bfcc2a0
-
SSDEEP
3072:xBf7aNZ0aQsrVVh+ZHD1M5jhyancK9U4mEVpheNWXPOH9tsgn5T8Es:ONnxIJM+tK9PjJeNuPOHxn5YE
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2668 igfxdmt32.exe -
Executes dropped EXE 50 IoCs
pid Process 2668 igfxdmt32.exe 2844 igfxdmt32.exe 2904 igfxdmt32.exe 2580 igfxdmt32.exe 2756 igfxdmt32.exe 1292 igfxdmt32.exe 2816 igfxdmt32.exe 2804 igfxdmt32.exe 1540 igfxdmt32.exe 2484 igfxdmt32.exe 2624 igfxdmt32.exe 1128 igfxdmt32.exe 1372 igfxdmt32.exe 2212 igfxdmt32.exe 932 igfxdmt32.exe 2520 igfxdmt32.exe 2384 igfxdmt32.exe 1940 igfxdmt32.exe 1904 igfxdmt32.exe 2908 igfxdmt32.exe 1984 igfxdmt32.exe 2888 igfxdmt32.exe 2620 igfxdmt32.exe 1916 igfxdmt32.exe 2340 igfxdmt32.exe 1664 igfxdmt32.exe 1492 igfxdmt32.exe 2972 igfxdmt32.exe 2820 igfxdmt32.exe 1752 igfxdmt32.exe 2284 igfxdmt32.exe 860 igfxdmt32.exe 3040 igfxdmt32.exe 2288 igfxdmt32.exe 1108 igfxdmt32.exe 984 igfxdmt32.exe 2540 igfxdmt32.exe 2456 igfxdmt32.exe 1804 igfxdmt32.exe 1704 igfxdmt32.exe 2236 igfxdmt32.exe 1940 igfxdmt32.exe 2376 igfxdmt32.exe 2872 igfxdmt32.exe 1600 igfxdmt32.exe 2708 igfxdmt32.exe 2900 igfxdmt32.exe 2428 igfxdmt32.exe 1472 igfxdmt32.exe 2324 igfxdmt32.exe -
Loads dropped DLL 64 IoCs
pid Process 2156 f148f36075f8aa6ec7d70172eeacff08_JaffaCakes118.exe 2156 f148f36075f8aa6ec7d70172eeacff08_JaffaCakes118.exe 2668 igfxdmt32.exe 2668 igfxdmt32.exe 2844 igfxdmt32.exe 2844 igfxdmt32.exe 2904 igfxdmt32.exe 2904 igfxdmt32.exe 2580 igfxdmt32.exe 2580 igfxdmt32.exe 2756 igfxdmt32.exe 2756 igfxdmt32.exe 1292 igfxdmt32.exe 1292 igfxdmt32.exe 2816 igfxdmt32.exe 2816 igfxdmt32.exe 2804 igfxdmt32.exe 2804 igfxdmt32.exe 1540 igfxdmt32.exe 1540 igfxdmt32.exe 2484 igfxdmt32.exe 2484 igfxdmt32.exe 2624 igfxdmt32.exe 2624 igfxdmt32.exe 1128 igfxdmt32.exe 1128 igfxdmt32.exe 1372 igfxdmt32.exe 1372 igfxdmt32.exe 2212 igfxdmt32.exe 2212 igfxdmt32.exe 932 igfxdmt32.exe 932 igfxdmt32.exe 2520 igfxdmt32.exe 2520 igfxdmt32.exe 2384 igfxdmt32.exe 2384 igfxdmt32.exe 1940 igfxdmt32.exe 1940 igfxdmt32.exe 1904 igfxdmt32.exe 1904 igfxdmt32.exe 2908 igfxdmt32.exe 2908 igfxdmt32.exe 1984 igfxdmt32.exe 1984 igfxdmt32.exe 2888 igfxdmt32.exe 2888 igfxdmt32.exe 2620 igfxdmt32.exe 2620 igfxdmt32.exe 1916 igfxdmt32.exe 1916 igfxdmt32.exe 2340 igfxdmt32.exe 2340 igfxdmt32.exe 1664 igfxdmt32.exe 1664 igfxdmt32.exe 1492 igfxdmt32.exe 1492 igfxdmt32.exe 2972 igfxdmt32.exe 2972 igfxdmt32.exe 2820 igfxdmt32.exe 2820 igfxdmt32.exe 1752 igfxdmt32.exe 1752 igfxdmt32.exe 2284 igfxdmt32.exe 2284 igfxdmt32.exe -
resource yara_rule behavioral1/memory/2156-1-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2156-0-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/files/0x000b000000012266-5.dat upx behavioral1/memory/2668-19-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2668-18-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2668-17-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2156-15-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2668-25-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2844-23-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2904-31-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2844-30-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2904-37-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2580-38-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2756-45-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2580-44-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/1292-54-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2756-51-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2816-58-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/1292-60-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2816-66-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2804-74-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/1540-72-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/1540-80-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2484-82-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2624-86-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2484-88-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2624-94-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/1128-100-0x0000000004B00000-0x0000000004BB4000-memory.dmp upx behavioral1/memory/1128-99-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/1372-105-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2624-106-0x00000000034F0000-0x00000000035A4000-memory.dmp upx behavioral1/memory/2212-112-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/932-113-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2520-120-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/932-119-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2520-125-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2384-126-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/1940-132-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2384-131-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/1940-134-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/1904-135-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2908-137-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/1984-139-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2620-142-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2888-141-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2620-143-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2340-145-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2620-144-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/1916-147-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2340-149-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/1664-150-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/1492-153-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/1664-152-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/1492-155-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2820-157-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2972-159-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2820-163-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2284-168-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/1752-167-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2284-170-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/860-171-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/860-173-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/3040-176-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2288-178-0x0000000000400000-0x00000000004B4000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 f148f36075f8aa6ec7d70172eeacff08_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum f148f36075f8aa6ec7d70172eeacff08_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmt32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File opened for modification C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File created C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File created C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File opened for modification C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File opened for modification C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File created C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmt32.exe File opened for modification C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmt32.exe File created C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File created C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File created C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File opened for modification C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File opened for modification C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File opened for modification C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File created C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File created C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmt32.exe File opened for modification C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File opened for modification C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmt32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmt32.exe File created C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmt32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmt32.exe File opened for modification C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File created C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmt32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmt32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmt32.exe File opened for modification C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File opened for modification C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File opened for modification C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File opened for modification C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmt32.exe File created C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File opened for modification C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File created C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File opened for modification C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File opened for modification C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File created C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmt32.exe File opened for modification C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File created C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File created C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File created C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmt32.exe File opened for modification C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File created C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File created C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmt32.exe File created C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmt32.exe File created C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File created C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmt32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmt32.exe File opened for modification C:\Windows\SysWOW64\ f148f36075f8aa6ec7d70172eeacff08_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File created C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File created C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File opened for modification C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe File opened for modification C:\Windows\SysWOW64\igfxdmt32.exe igfxdmt32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 50 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f148f36075f8aa6ec7d70172eeacff08_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmt32.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 2156 f148f36075f8aa6ec7d70172eeacff08_JaffaCakes118.exe 2668 igfxdmt32.exe 2844 igfxdmt32.exe 2904 igfxdmt32.exe 2580 igfxdmt32.exe 2756 igfxdmt32.exe 1292 igfxdmt32.exe 2816 igfxdmt32.exe 2804 igfxdmt32.exe 1540 igfxdmt32.exe 2484 igfxdmt32.exe 2624 igfxdmt32.exe 1128 igfxdmt32.exe 1372 igfxdmt32.exe 2212 igfxdmt32.exe 932 igfxdmt32.exe 2520 igfxdmt32.exe 2384 igfxdmt32.exe 1940 igfxdmt32.exe 1904 igfxdmt32.exe 2908 igfxdmt32.exe 1984 igfxdmt32.exe 2888 igfxdmt32.exe 2620 igfxdmt32.exe 1916 igfxdmt32.exe 2340 igfxdmt32.exe 1664 igfxdmt32.exe 1492 igfxdmt32.exe 2972 igfxdmt32.exe 2820 igfxdmt32.exe 1752 igfxdmt32.exe 2284 igfxdmt32.exe 860 igfxdmt32.exe 3040 igfxdmt32.exe 2288 igfxdmt32.exe 1108 igfxdmt32.exe 984 igfxdmt32.exe 2540 igfxdmt32.exe 2456 igfxdmt32.exe 1804 igfxdmt32.exe 1704 igfxdmt32.exe 1940 igfxdmt32.exe 2376 igfxdmt32.exe 2872 igfxdmt32.exe 1600 igfxdmt32.exe 2708 igfxdmt32.exe 2900 igfxdmt32.exe 2428 igfxdmt32.exe 1472 igfxdmt32.exe 2324 igfxdmt32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2668 2156 f148f36075f8aa6ec7d70172eeacff08_JaffaCakes118.exe 30 PID 2156 wrote to memory of 2668 2156 f148f36075f8aa6ec7d70172eeacff08_JaffaCakes118.exe 30 PID 2156 wrote to memory of 2668 2156 f148f36075f8aa6ec7d70172eeacff08_JaffaCakes118.exe 30 PID 2156 wrote to memory of 2668 2156 f148f36075f8aa6ec7d70172eeacff08_JaffaCakes118.exe 30 PID 2668 wrote to memory of 2844 2668 igfxdmt32.exe 31 PID 2668 wrote to memory of 2844 2668 igfxdmt32.exe 31 PID 2668 wrote to memory of 2844 2668 igfxdmt32.exe 31 PID 2668 wrote to memory of 2844 2668 igfxdmt32.exe 31 PID 2844 wrote to memory of 2904 2844 igfxdmt32.exe 32 PID 2844 wrote to memory of 2904 2844 igfxdmt32.exe 32 PID 2844 wrote to memory of 2904 2844 igfxdmt32.exe 32 PID 2844 wrote to memory of 2904 2844 igfxdmt32.exe 32 PID 2904 wrote to memory of 2580 2904 igfxdmt32.exe 34 PID 2904 wrote to memory of 2580 2904 igfxdmt32.exe 34 PID 2904 wrote to memory of 2580 2904 igfxdmt32.exe 34 PID 2904 wrote to memory of 2580 2904 igfxdmt32.exe 34 PID 2580 wrote to memory of 2756 2580 igfxdmt32.exe 35 PID 2580 wrote to memory of 2756 2580 igfxdmt32.exe 35 PID 2580 wrote to memory of 2756 2580 igfxdmt32.exe 35 PID 2580 wrote to memory of 2756 2580 igfxdmt32.exe 35 PID 2756 wrote to memory of 1292 2756 igfxdmt32.exe 36 PID 2756 wrote to memory of 1292 2756 igfxdmt32.exe 36 PID 2756 wrote to memory of 1292 2756 igfxdmt32.exe 36 PID 2756 wrote to memory of 1292 2756 igfxdmt32.exe 36 PID 1292 wrote to memory of 2816 1292 igfxdmt32.exe 37 PID 1292 wrote to memory of 2816 1292 igfxdmt32.exe 37 PID 1292 wrote to memory of 2816 1292 igfxdmt32.exe 37 PID 1292 wrote to memory of 2816 1292 igfxdmt32.exe 37 PID 2816 wrote to memory of 2804 2816 igfxdmt32.exe 38 PID 2816 wrote to memory of 2804 2816 igfxdmt32.exe 38 PID 2816 wrote to memory of 2804 2816 igfxdmt32.exe 38 PID 2816 wrote to memory of 2804 2816 igfxdmt32.exe 38 PID 2804 wrote to memory of 1540 2804 igfxdmt32.exe 39 PID 2804 wrote to memory of 1540 2804 igfxdmt32.exe 39 PID 2804 wrote to memory of 1540 2804 igfxdmt32.exe 39 PID 2804 wrote to memory of 1540 2804 igfxdmt32.exe 39 PID 1540 wrote to memory of 2484 1540 igfxdmt32.exe 40 PID 1540 wrote to memory of 2484 1540 igfxdmt32.exe 40 PID 1540 wrote to memory of 2484 1540 igfxdmt32.exe 40 PID 1540 wrote to memory of 2484 1540 igfxdmt32.exe 40 PID 2484 wrote to memory of 2624 2484 igfxdmt32.exe 41 PID 2484 wrote to memory of 2624 2484 igfxdmt32.exe 41 PID 2484 wrote to memory of 2624 2484 igfxdmt32.exe 41 PID 2484 wrote to memory of 2624 2484 igfxdmt32.exe 41 PID 2624 wrote to memory of 1128 2624 igfxdmt32.exe 42 PID 2624 wrote to memory of 1128 2624 igfxdmt32.exe 42 PID 2624 wrote to memory of 1128 2624 igfxdmt32.exe 42 PID 2624 wrote to memory of 1128 2624 igfxdmt32.exe 42 PID 1128 wrote to memory of 1372 1128 igfxdmt32.exe 43 PID 1128 wrote to memory of 1372 1128 igfxdmt32.exe 43 PID 1128 wrote to memory of 1372 1128 igfxdmt32.exe 43 PID 1128 wrote to memory of 1372 1128 igfxdmt32.exe 43 PID 1372 wrote to memory of 2212 1372 igfxdmt32.exe 44 PID 1372 wrote to memory of 2212 1372 igfxdmt32.exe 44 PID 1372 wrote to memory of 2212 1372 igfxdmt32.exe 44 PID 1372 wrote to memory of 2212 1372 igfxdmt32.exe 44 PID 2212 wrote to memory of 932 2212 igfxdmt32.exe 45 PID 2212 wrote to memory of 932 2212 igfxdmt32.exe 45 PID 2212 wrote to memory of 932 2212 igfxdmt32.exe 45 PID 2212 wrote to memory of 932 2212 igfxdmt32.exe 45 PID 932 wrote to memory of 2520 932 igfxdmt32.exe 46 PID 932 wrote to memory of 2520 932 igfxdmt32.exe 46 PID 932 wrote to memory of 2520 932 igfxdmt32.exe 46 PID 932 wrote to memory of 2520 932 igfxdmt32.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\f148f36075f8aa6ec7d70172eeacff08_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f148f36075f8aa6ec7d70172eeacff08_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Users\Admin\AppData\Local\Temp\F148F3~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2520 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2384 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1940 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1904 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2908 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1984 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2888 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2620 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1916 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2340 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1664 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1492 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE29⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2972 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2820 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1752 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2284 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:860 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3040 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE35⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2288 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1108 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:984 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2540 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2456 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1804 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1704 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2236 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1940 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE44⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2376 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2872 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1600 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE47⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2708 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE48⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2900 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE49⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2428 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE50⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1472 -
C:\Windows\SysWOW64\igfxdmt32.exe"C:\Windows\system32\igfxdmt32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE51⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:2324
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD5f148f36075f8aa6ec7d70172eeacff08
SHA10d86b51157dba2cc1a2ed339fb35d9c1b7f62f71
SHA25670c206402f5f0a0a680dd340f16c264564f91d09c6617defce7393615bee9bb4
SHA512954fc981fc39dffcf51ac5b6986bf2093fc089906b04555c4bd5a0ae0b2171ff489776be516716d793bd691e0100e54046b1b5ca580ca9558c5d3d307bfcc2a0