Analysis
-
max time kernel
148s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
22-09-2024 14:07
Static task
static1
Behavioral task
behavioral1
Sample
f229b1a16bcfb54da9ab0f8ebf867893_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f229b1a16bcfb54da9ab0f8ebf867893_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f229b1a16bcfb54da9ab0f8ebf867893_JaffaCakes118.exe
-
Size
275KB
-
MD5
f229b1a16bcfb54da9ab0f8ebf867893
-
SHA1
0cef6a5f6f8556a21ec0178939f751a83aaef142
-
SHA256
d8cdbcc8242341bbe31abf95d03323ede43b1b42918151b76a0eb2acf9987779
-
SHA512
c5e26bd3b7d826513cba42321209f0e8d7b387e7202db6e425fdbf57747182115bed21005b91bfd690f6b3b8fc3437cc1066e8ee225dabb71ef7bcafbcd7c081
-
SSDEEP
6144:doW592yiazyh4aabRqnzIp4mysBGi0q+vU52dXLt4E:GeLQhsnpKQuqOXLtz
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2180 igfxpd32.exe -
Executes dropped EXE 64 IoCs
pid Process 2180 igfxpd32.exe 3020 igfxpd32.exe 2844 igfxpd32.exe 2724 igfxpd32.exe 2268 igfxpd32.exe 2548 igfxpd32.exe 1992 igfxpd32.exe 2120 igfxpd32.exe 2916 igfxpd32.exe 948 igfxpd32.exe 1656 igfxpd32.exe 1728 igfxpd32.exe 2088 igfxpd32.exe 2416 igfxpd32.exe 896 igfxpd32.exe 2664 igfxpd32.exe 2384 igfxpd32.exe 2376 igfxpd32.exe 2040 igfxpd32.exe 2680 igfxpd32.exe 1216 igfxpd32.exe 1504 igfxpd32.exe 676 igfxpd32.exe 1680 igfxpd32.exe 2960 igfxpd32.exe 2712 igfxpd32.exe 3004 igfxpd32.exe 1976 igfxpd32.exe 656 igfxpd32.exe 2528 igfxpd32.exe 1200 igfxpd32.exe 2548 igfxpd32.exe 1980 igfxpd32.exe 1940 igfxpd32.exe 3040 igfxpd32.exe 1692 igfxpd32.exe 1760 igfxpd32.exe 2372 igfxpd32.exe 1932 igfxpd32.exe 2148 igfxpd32.exe 2380 igfxpd32.exe 1608 igfxpd32.exe 2604 igfxpd32.exe 1512 igfxpd32.exe 2664 igfxpd32.exe 2384 igfxpd32.exe 1020 igfxpd32.exe 2040 igfxpd32.exe 2680 igfxpd32.exe 1216 igfxpd32.exe 2656 igfxpd32.exe 1572 igfxpd32.exe 2332 igfxpd32.exe 2944 igfxpd32.exe 348 igfxpd32.exe 3008 igfxpd32.exe 3004 igfxpd32.exe 1976 igfxpd32.exe 1556 igfxpd32.exe 1904 igfxpd32.exe 1892 igfxpd32.exe 1032 igfxpd32.exe 2464 igfxpd32.exe 2280 igfxpd32.exe -
Loads dropped DLL 64 IoCs
pid Process 1096 f229b1a16bcfb54da9ab0f8ebf867893_JaffaCakes118.exe 1096 f229b1a16bcfb54da9ab0f8ebf867893_JaffaCakes118.exe 2180 igfxpd32.exe 2180 igfxpd32.exe 3020 igfxpd32.exe 3020 igfxpd32.exe 2844 igfxpd32.exe 2844 igfxpd32.exe 2724 igfxpd32.exe 2724 igfxpd32.exe 2268 igfxpd32.exe 2268 igfxpd32.exe 2548 igfxpd32.exe 2548 igfxpd32.exe 1992 igfxpd32.exe 1992 igfxpd32.exe 2120 igfxpd32.exe 2120 igfxpd32.exe 2916 igfxpd32.exe 2916 igfxpd32.exe 948 igfxpd32.exe 948 igfxpd32.exe 1656 igfxpd32.exe 1656 igfxpd32.exe 1728 igfxpd32.exe 1728 igfxpd32.exe 2088 igfxpd32.exe 2088 igfxpd32.exe 2416 igfxpd32.exe 2416 igfxpd32.exe 896 igfxpd32.exe 896 igfxpd32.exe 2664 igfxpd32.exe 2664 igfxpd32.exe 2384 igfxpd32.exe 2384 igfxpd32.exe 2376 igfxpd32.exe 2376 igfxpd32.exe 2040 igfxpd32.exe 2040 igfxpd32.exe 2680 igfxpd32.exe 2680 igfxpd32.exe 1216 igfxpd32.exe 1216 igfxpd32.exe 1504 igfxpd32.exe 1504 igfxpd32.exe 676 igfxpd32.exe 676 igfxpd32.exe 1680 igfxpd32.exe 1680 igfxpd32.exe 2960 igfxpd32.exe 2960 igfxpd32.exe 2712 igfxpd32.exe 2712 igfxpd32.exe 3004 igfxpd32.exe 3004 igfxpd32.exe 1976 igfxpd32.exe 1976 igfxpd32.exe 656 igfxpd32.exe 656 igfxpd32.exe 2528 igfxpd32.exe 2528 igfxpd32.exe 1200 igfxpd32.exe 1200 igfxpd32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe f229b1a16bcfb54da9ab0f8ebf867893_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f229b1a16bcfb54da9ab0f8ebf867893_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1096 f229b1a16bcfb54da9ab0f8ebf867893_JaffaCakes118.exe 1096 f229b1a16bcfb54da9ab0f8ebf867893_JaffaCakes118.exe 2180 igfxpd32.exe 2180 igfxpd32.exe 3020 igfxpd32.exe 3020 igfxpd32.exe 2844 igfxpd32.exe 2844 igfxpd32.exe 2724 igfxpd32.exe 2724 igfxpd32.exe 2268 igfxpd32.exe 2268 igfxpd32.exe 2548 igfxpd32.exe 2548 igfxpd32.exe 1992 igfxpd32.exe 1992 igfxpd32.exe 2120 igfxpd32.exe 2120 igfxpd32.exe 2916 igfxpd32.exe 2916 igfxpd32.exe 948 igfxpd32.exe 948 igfxpd32.exe 1656 igfxpd32.exe 1656 igfxpd32.exe 1728 igfxpd32.exe 1728 igfxpd32.exe 2088 igfxpd32.exe 2088 igfxpd32.exe 2416 igfxpd32.exe 2416 igfxpd32.exe 896 igfxpd32.exe 896 igfxpd32.exe 2664 igfxpd32.exe 2664 igfxpd32.exe 2384 igfxpd32.exe 2384 igfxpd32.exe 2376 igfxpd32.exe 2376 igfxpd32.exe 2040 igfxpd32.exe 2040 igfxpd32.exe 2680 igfxpd32.exe 2680 igfxpd32.exe 1216 igfxpd32.exe 1216 igfxpd32.exe 1504 igfxpd32.exe 1504 igfxpd32.exe 676 igfxpd32.exe 676 igfxpd32.exe 1680 igfxpd32.exe 1680 igfxpd32.exe 2960 igfxpd32.exe 2960 igfxpd32.exe 2712 igfxpd32.exe 2712 igfxpd32.exe 3004 igfxpd32.exe 3004 igfxpd32.exe 1976 igfxpd32.exe 1976 igfxpd32.exe 656 igfxpd32.exe 656 igfxpd32.exe 2528 igfxpd32.exe 2528 igfxpd32.exe 1200 igfxpd32.exe 1200 igfxpd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1096 wrote to memory of 2180 1096 f229b1a16bcfb54da9ab0f8ebf867893_JaffaCakes118.exe 30 PID 1096 wrote to memory of 2180 1096 f229b1a16bcfb54da9ab0f8ebf867893_JaffaCakes118.exe 30 PID 1096 wrote to memory of 2180 1096 f229b1a16bcfb54da9ab0f8ebf867893_JaffaCakes118.exe 30 PID 1096 wrote to memory of 2180 1096 f229b1a16bcfb54da9ab0f8ebf867893_JaffaCakes118.exe 30 PID 2180 wrote to memory of 3020 2180 igfxpd32.exe 31 PID 2180 wrote to memory of 3020 2180 igfxpd32.exe 31 PID 2180 wrote to memory of 3020 2180 igfxpd32.exe 31 PID 2180 wrote to memory of 3020 2180 igfxpd32.exe 31 PID 3020 wrote to memory of 2844 3020 igfxpd32.exe 32 PID 3020 wrote to memory of 2844 3020 igfxpd32.exe 32 PID 3020 wrote to memory of 2844 3020 igfxpd32.exe 32 PID 3020 wrote to memory of 2844 3020 igfxpd32.exe 32 PID 2844 wrote to memory of 2724 2844 igfxpd32.exe 33 PID 2844 wrote to memory of 2724 2844 igfxpd32.exe 33 PID 2844 wrote to memory of 2724 2844 igfxpd32.exe 33 PID 2844 wrote to memory of 2724 2844 igfxpd32.exe 33 PID 2724 wrote to memory of 2268 2724 igfxpd32.exe 34 PID 2724 wrote to memory of 2268 2724 igfxpd32.exe 34 PID 2724 wrote to memory of 2268 2724 igfxpd32.exe 34 PID 2724 wrote to memory of 2268 2724 igfxpd32.exe 34 PID 2268 wrote to memory of 2548 2268 igfxpd32.exe 35 PID 2268 wrote to memory of 2548 2268 igfxpd32.exe 35 PID 2268 wrote to memory of 2548 2268 igfxpd32.exe 35 PID 2268 wrote to memory of 2548 2268 igfxpd32.exe 35 PID 2548 wrote to memory of 1992 2548 igfxpd32.exe 36 PID 2548 wrote to memory of 1992 2548 igfxpd32.exe 36 PID 2548 wrote to memory of 1992 2548 igfxpd32.exe 36 PID 2548 wrote to memory of 1992 2548 igfxpd32.exe 36 PID 1992 wrote to memory of 2120 1992 igfxpd32.exe 37 PID 1992 wrote to memory of 2120 1992 igfxpd32.exe 37 PID 1992 wrote to memory of 2120 1992 igfxpd32.exe 37 PID 1992 wrote to memory of 2120 1992 igfxpd32.exe 37 PID 2120 wrote to memory of 2916 2120 igfxpd32.exe 38 PID 2120 wrote to memory of 2916 2120 igfxpd32.exe 38 PID 2120 wrote to memory of 2916 2120 igfxpd32.exe 38 PID 2120 wrote to memory of 2916 2120 igfxpd32.exe 38 PID 2916 wrote to memory of 948 2916 igfxpd32.exe 39 PID 2916 wrote to memory of 948 2916 igfxpd32.exe 39 PID 2916 wrote to memory of 948 2916 igfxpd32.exe 39 PID 2916 wrote to memory of 948 2916 igfxpd32.exe 39 PID 948 wrote to memory of 1656 948 igfxpd32.exe 40 PID 948 wrote to memory of 1656 948 igfxpd32.exe 40 PID 948 wrote to memory of 1656 948 igfxpd32.exe 40 PID 948 wrote to memory of 1656 948 igfxpd32.exe 40 PID 1656 wrote to memory of 1728 1656 igfxpd32.exe 41 PID 1656 wrote to memory of 1728 1656 igfxpd32.exe 41 PID 1656 wrote to memory of 1728 1656 igfxpd32.exe 41 PID 1656 wrote to memory of 1728 1656 igfxpd32.exe 41 PID 1728 wrote to memory of 2088 1728 igfxpd32.exe 42 PID 1728 wrote to memory of 2088 1728 igfxpd32.exe 42 PID 1728 wrote to memory of 2088 1728 igfxpd32.exe 42 PID 1728 wrote to memory of 2088 1728 igfxpd32.exe 42 PID 2088 wrote to memory of 2416 2088 igfxpd32.exe 43 PID 2088 wrote to memory of 2416 2088 igfxpd32.exe 43 PID 2088 wrote to memory of 2416 2088 igfxpd32.exe 43 PID 2088 wrote to memory of 2416 2088 igfxpd32.exe 43 PID 2416 wrote to memory of 896 2416 igfxpd32.exe 44 PID 2416 wrote to memory of 896 2416 igfxpd32.exe 44 PID 2416 wrote to memory of 896 2416 igfxpd32.exe 44 PID 2416 wrote to memory of 896 2416 igfxpd32.exe 44 PID 896 wrote to memory of 2664 896 igfxpd32.exe 45 PID 896 wrote to memory of 2664 896 igfxpd32.exe 45 PID 896 wrote to memory of 2664 896 igfxpd32.exe 45 PID 896 wrote to memory of 2664 896 igfxpd32.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\f229b1a16bcfb54da9ab0f8ebf867893_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f229b1a16bcfb54da9ab0f8ebf867893_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Users\Admin\AppData\Local\Temp\F229B1~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2664 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2384 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2376 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2040 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2680 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1216 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1504 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:676 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1680 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2960 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2712 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3004 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1976 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:656 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2528 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1200 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2548 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1980 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1940 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3040 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1692 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1760 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2372 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1932 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2148 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe42⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2380 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1608 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2604 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1512 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2664 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2384 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe48⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1020 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe49⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2040 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe50⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2680 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe51⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1216 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe52⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2656 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe53⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1572 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe54⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2332 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2944 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe56⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:348 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe57⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3008 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe58⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3004 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe59⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1976 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe60⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1556 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe61⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1904 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe62⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1892 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe63⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1032 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe64⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2464 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe65⤵
- Executes dropped EXE
- Maps connected drives based on registry
PID:2280 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe66⤵
- System Location Discovery: System Language Discovery
PID:1940 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe67⤵PID:3040
-
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe68⤵
- System Location Discovery: System Language Discovery
PID:2900
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
275KB
MD5f229b1a16bcfb54da9ab0f8ebf867893
SHA10cef6a5f6f8556a21ec0178939f751a83aaef142
SHA256d8cdbcc8242341bbe31abf95d03323ede43b1b42918151b76a0eb2acf9987779
SHA512c5e26bd3b7d826513cba42321209f0e8d7b387e7202db6e425fdbf57747182115bed21005b91bfd690f6b3b8fc3437cc1066e8ee225dabb71ef7bcafbcd7c081