Analysis
-
max time kernel
148s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-09-2024 16:13
Static task
static1
Behavioral task
behavioral1
Sample
f25e1718c46759c9efc5a3b762817afc_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f25e1718c46759c9efc5a3b762817afc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f25e1718c46759c9efc5a3b762817afc_JaffaCakes118.exe
-
Size
288KB
-
MD5
f25e1718c46759c9efc5a3b762817afc
-
SHA1
e6beda436c6de39ad14442f7a0d1147860044771
-
SHA256
771e11a0254f407da8eb855cb85ae357f4255f7b41e27bc28e9dcd835bff7faa
-
SHA512
e7c12cc54845e3d22ba260be4fa204cc6f3b064b36322a5dc1d95f9026f755c89698de3bd5d9bd9ae50ed05e61edc45ad837d878f3bad51b407d5526e70bf888
-
SSDEEP
3072:Mfd77aJDLiX0ZxUzilNt+Z4QTEKt6pt736NDNy3SagNoXMOoIPME58a:ghGJU0Zx6dEKO6FNyvgNwlPME5R
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2568 intelgfx32.exe -
Executes dropped EXE 44 IoCs
pid Process 2652 intelgfx32.exe 2568 intelgfx32.exe 2608 intelgfx32.exe 2604 intelgfx32.exe 2628 intelgfx32.exe 2448 intelgfx32.exe 2804 intelgfx32.exe 1680 intelgfx32.exe 2928 intelgfx32.exe 2256 intelgfx32.exe 1064 intelgfx32.exe 2540 intelgfx32.exe 1868 intelgfx32.exe 1712 intelgfx32.exe 1860 intelgfx32.exe 988 intelgfx32.exe 1788 intelgfx32.exe 1732 intelgfx32.exe 2248 intelgfx32.exe 2168 intelgfx32.exe 2752 intelgfx32.exe 2980 intelgfx32.exe 3040 intelgfx32.exe 2748 intelgfx32.exe 2624 intelgfx32.exe 1444 intelgfx32.exe 2324 intelgfx32.exe 1276 intelgfx32.exe 2804 intelgfx32.exe 852 intelgfx32.exe 1312 intelgfx32.exe 1856 intelgfx32.exe 2948 intelgfx32.exe 3000 intelgfx32.exe 1868 intelgfx32.exe 2364 intelgfx32.exe 1824 intelgfx32.exe 2152 intelgfx32.exe 1720 intelgfx32.exe 2428 intelgfx32.exe 2480 intelgfx32.exe 544 intelgfx32.exe 1592 intelgfx32.exe 2508 intelgfx32.exe -
Loads dropped DLL 64 IoCs
pid Process 2640 f25e1718c46759c9efc5a3b762817afc_JaffaCakes118.exe 2640 f25e1718c46759c9efc5a3b762817afc_JaffaCakes118.exe 2652 intelgfx32.exe 2652 intelgfx32.exe 2568 intelgfx32.exe 2568 intelgfx32.exe 2608 intelgfx32.exe 2608 intelgfx32.exe 2604 intelgfx32.exe 2604 intelgfx32.exe 2628 intelgfx32.exe 2628 intelgfx32.exe 2448 intelgfx32.exe 2448 intelgfx32.exe 2804 intelgfx32.exe 2804 intelgfx32.exe 1680 intelgfx32.exe 1680 intelgfx32.exe 2928 intelgfx32.exe 2928 intelgfx32.exe 2256 intelgfx32.exe 2256 intelgfx32.exe 1064 intelgfx32.exe 1064 intelgfx32.exe 2540 intelgfx32.exe 2540 intelgfx32.exe 1868 intelgfx32.exe 1868 intelgfx32.exe 1712 intelgfx32.exe 1712 intelgfx32.exe 1860 intelgfx32.exe 1860 intelgfx32.exe 988 intelgfx32.exe 988 intelgfx32.exe 1788 intelgfx32.exe 1788 intelgfx32.exe 1732 intelgfx32.exe 1732 intelgfx32.exe 2248 intelgfx32.exe 2248 intelgfx32.exe 2168 intelgfx32.exe 2168 intelgfx32.exe 2752 intelgfx32.exe 2752 intelgfx32.exe 2980 intelgfx32.exe 2980 intelgfx32.exe 3040 intelgfx32.exe 3040 intelgfx32.exe 2748 intelgfx32.exe 2748 intelgfx32.exe 2624 intelgfx32.exe 2624 intelgfx32.exe 1444 intelgfx32.exe 1444 intelgfx32.exe 2324 intelgfx32.exe 2324 intelgfx32.exe 1276 intelgfx32.exe 1276 intelgfx32.exe 2804 intelgfx32.exe 2804 intelgfx32.exe 852 intelgfx32.exe 852 intelgfx32.exe 1312 intelgfx32.exe 1312 intelgfx32.exe -
resource yara_rule behavioral1/memory/2640-4-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2640-9-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2640-10-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2640-8-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2640-7-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2640-5-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2640-2-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2640-23-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2568-39-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2568-38-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2568-37-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2568-36-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2568-44-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2604-58-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2604-63-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2448-77-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2448-82-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1680-96-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1680-101-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2256-115-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2256-122-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2540-135-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2540-141-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1712-154-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1712-159-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/988-172-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/988-180-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1732-193-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1732-198-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2168-211-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2980-221-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2980-224-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2748-234-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2748-237-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1444-247-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1444-250-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1276-259-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1276-263-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/852-272-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/852-276-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1856-284-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1856-289-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/3000-301-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2364-313-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2152-325-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2428-337-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/544-349-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 46 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum f25e1718c46759c9efc5a3b762817afc_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 f25e1718c46759c9efc5a3b762817afc_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 intelgfx32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ intelgfx32.exe File opened for modification C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ intelgfx32.exe File created C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ intelgfx32.exe File opened for modification C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File created C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File created C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ intelgfx32.exe File opened for modification C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File created C:\Windows\SysWOW64\intelgfx32.exe f25e1718c46759c9efc5a3b762817afc_JaffaCakes118.exe File created C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File created C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\intelgfx32.exe f25e1718c46759c9efc5a3b762817afc_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ f25e1718c46759c9efc5a3b762817afc_JaffaCakes118.exe File created C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ intelgfx32.exe File opened for modification C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ intelgfx32.exe File opened for modification C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ intelgfx32.exe File created C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File created C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File created C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ intelgfx32.exe File created C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ intelgfx32.exe File opened for modification C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ intelgfx32.exe File opened for modification C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ intelgfx32.exe File opened for modification C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File created C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File created C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File created C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ intelgfx32.exe File created C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File created C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File created C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File created C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File created C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File created C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ intelgfx32.exe File opened for modification C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe -
Suspicious use of SetThreadContext 23 IoCs
description pid Process procid_target PID 2248 set thread context of 2640 2248 f25e1718c46759c9efc5a3b762817afc_JaffaCakes118.exe 31 PID 2652 set thread context of 2568 2652 intelgfx32.exe 33 PID 2608 set thread context of 2604 2608 intelgfx32.exe 35 PID 2628 set thread context of 2448 2628 intelgfx32.exe 37 PID 2804 set thread context of 1680 2804 intelgfx32.exe 39 PID 2928 set thread context of 2256 2928 intelgfx32.exe 41 PID 1064 set thread context of 2540 1064 intelgfx32.exe 43 PID 1868 set thread context of 1712 1868 intelgfx32.exe 45 PID 1860 set thread context of 988 1860 intelgfx32.exe 47 PID 1788 set thread context of 1732 1788 intelgfx32.exe 49 PID 2248 set thread context of 2168 2248 intelgfx32.exe 51 PID 2752 set thread context of 2980 2752 intelgfx32.exe 53 PID 3040 set thread context of 2748 3040 intelgfx32.exe 55 PID 2624 set thread context of 1444 2624 intelgfx32.exe 57 PID 2324 set thread context of 1276 2324 intelgfx32.exe 59 PID 2804 set thread context of 852 2804 intelgfx32.exe 61 PID 1312 set thread context of 1856 1312 intelgfx32.exe 64 PID 2948 set thread context of 3000 2948 intelgfx32.exe 66 PID 1868 set thread context of 2364 1868 intelgfx32.exe 68 PID 1824 set thread context of 2152 1824 intelgfx32.exe 70 PID 1720 set thread context of 2428 1720 intelgfx32.exe 72 PID 2480 set thread context of 544 2480 intelgfx32.exe 74 PID 1592 set thread context of 2508 1592 intelgfx32.exe 76 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 45 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f25e1718c46759c9efc5a3b762817afc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f25e1718c46759c9efc5a3b762817afc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intelgfx32.exe -
Suspicious behavior: EnumeratesProcesses 45 IoCs
pid Process 2640 f25e1718c46759c9efc5a3b762817afc_JaffaCakes118.exe 2640 f25e1718c46759c9efc5a3b762817afc_JaffaCakes118.exe 2568 intelgfx32.exe 2568 intelgfx32.exe 2604 intelgfx32.exe 2604 intelgfx32.exe 2448 intelgfx32.exe 2448 intelgfx32.exe 1680 intelgfx32.exe 1680 intelgfx32.exe 2256 intelgfx32.exe 2256 intelgfx32.exe 2540 intelgfx32.exe 2540 intelgfx32.exe 1712 intelgfx32.exe 1712 intelgfx32.exe 988 intelgfx32.exe 988 intelgfx32.exe 1732 intelgfx32.exe 1732 intelgfx32.exe 2168 intelgfx32.exe 2168 intelgfx32.exe 2980 intelgfx32.exe 2980 intelgfx32.exe 2748 intelgfx32.exe 2748 intelgfx32.exe 1444 intelgfx32.exe 1444 intelgfx32.exe 1276 intelgfx32.exe 1276 intelgfx32.exe 852 intelgfx32.exe 852 intelgfx32.exe 1856 intelgfx32.exe 1856 intelgfx32.exe 3000 intelgfx32.exe 3000 intelgfx32.exe 2364 intelgfx32.exe 2364 intelgfx32.exe 2152 intelgfx32.exe 2152 intelgfx32.exe 2428 intelgfx32.exe 2428 intelgfx32.exe 544 intelgfx32.exe 544 intelgfx32.exe 2508 intelgfx32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2640 2248 f25e1718c46759c9efc5a3b762817afc_JaffaCakes118.exe 31 PID 2248 wrote to memory of 2640 2248 f25e1718c46759c9efc5a3b762817afc_JaffaCakes118.exe 31 PID 2248 wrote to memory of 2640 2248 f25e1718c46759c9efc5a3b762817afc_JaffaCakes118.exe 31 PID 2248 wrote to memory of 2640 2248 f25e1718c46759c9efc5a3b762817afc_JaffaCakes118.exe 31 PID 2248 wrote to memory of 2640 2248 f25e1718c46759c9efc5a3b762817afc_JaffaCakes118.exe 31 PID 2248 wrote to memory of 2640 2248 f25e1718c46759c9efc5a3b762817afc_JaffaCakes118.exe 31 PID 2248 wrote to memory of 2640 2248 f25e1718c46759c9efc5a3b762817afc_JaffaCakes118.exe 31 PID 2640 wrote to memory of 2652 2640 f25e1718c46759c9efc5a3b762817afc_JaffaCakes118.exe 32 PID 2640 wrote to memory of 2652 2640 f25e1718c46759c9efc5a3b762817afc_JaffaCakes118.exe 32 PID 2640 wrote to memory of 2652 2640 f25e1718c46759c9efc5a3b762817afc_JaffaCakes118.exe 32 PID 2640 wrote to memory of 2652 2640 f25e1718c46759c9efc5a3b762817afc_JaffaCakes118.exe 32 PID 2652 wrote to memory of 2568 2652 intelgfx32.exe 33 PID 2652 wrote to memory of 2568 2652 intelgfx32.exe 33 PID 2652 wrote to memory of 2568 2652 intelgfx32.exe 33 PID 2652 wrote to memory of 2568 2652 intelgfx32.exe 33 PID 2652 wrote to memory of 2568 2652 intelgfx32.exe 33 PID 2652 wrote to memory of 2568 2652 intelgfx32.exe 33 PID 2652 wrote to memory of 2568 2652 intelgfx32.exe 33 PID 2568 wrote to memory of 2608 2568 intelgfx32.exe 34 PID 2568 wrote to memory of 2608 2568 intelgfx32.exe 34 PID 2568 wrote to memory of 2608 2568 intelgfx32.exe 34 PID 2568 wrote to memory of 2608 2568 intelgfx32.exe 34 PID 2608 wrote to memory of 2604 2608 intelgfx32.exe 35 PID 2608 wrote to memory of 2604 2608 intelgfx32.exe 35 PID 2608 wrote to memory of 2604 2608 intelgfx32.exe 35 PID 2608 wrote to memory of 2604 2608 intelgfx32.exe 35 PID 2608 wrote to memory of 2604 2608 intelgfx32.exe 35 PID 2608 wrote to memory of 2604 2608 intelgfx32.exe 35 PID 2608 wrote to memory of 2604 2608 intelgfx32.exe 35 PID 2604 wrote to memory of 2628 2604 intelgfx32.exe 36 PID 2604 wrote to memory of 2628 2604 intelgfx32.exe 36 PID 2604 wrote to memory of 2628 2604 intelgfx32.exe 36 PID 2604 wrote to memory of 2628 2604 intelgfx32.exe 36 PID 2628 wrote to memory of 2448 2628 intelgfx32.exe 37 PID 2628 wrote to memory of 2448 2628 intelgfx32.exe 37 PID 2628 wrote to memory of 2448 2628 intelgfx32.exe 37 PID 2628 wrote to memory of 2448 2628 intelgfx32.exe 37 PID 2628 wrote to memory of 2448 2628 intelgfx32.exe 37 PID 2628 wrote to memory of 2448 2628 intelgfx32.exe 37 PID 2628 wrote to memory of 2448 2628 intelgfx32.exe 37 PID 2448 wrote to memory of 2804 2448 intelgfx32.exe 38 PID 2448 wrote to memory of 2804 2448 intelgfx32.exe 38 PID 2448 wrote to memory of 2804 2448 intelgfx32.exe 38 PID 2448 wrote to memory of 2804 2448 intelgfx32.exe 38 PID 2804 wrote to memory of 1680 2804 intelgfx32.exe 39 PID 2804 wrote to memory of 1680 2804 intelgfx32.exe 39 PID 2804 wrote to memory of 1680 2804 intelgfx32.exe 39 PID 2804 wrote to memory of 1680 2804 intelgfx32.exe 39 PID 2804 wrote to memory of 1680 2804 intelgfx32.exe 39 PID 2804 wrote to memory of 1680 2804 intelgfx32.exe 39 PID 2804 wrote to memory of 1680 2804 intelgfx32.exe 39 PID 1680 wrote to memory of 2928 1680 intelgfx32.exe 40 PID 1680 wrote to memory of 2928 1680 intelgfx32.exe 40 PID 1680 wrote to memory of 2928 1680 intelgfx32.exe 40 PID 1680 wrote to memory of 2928 1680 intelgfx32.exe 40 PID 2928 wrote to memory of 2256 2928 intelgfx32.exe 41 PID 2928 wrote to memory of 2256 2928 intelgfx32.exe 41 PID 2928 wrote to memory of 2256 2928 intelgfx32.exe 41 PID 2928 wrote to memory of 2256 2928 intelgfx32.exe 41 PID 2928 wrote to memory of 2256 2928 intelgfx32.exe 41 PID 2928 wrote to memory of 2256 2928 intelgfx32.exe 41 PID 2928 wrote to memory of 2256 2928 intelgfx32.exe 41 PID 2256 wrote to memory of 1064 2256 intelgfx32.exe 42 PID 2256 wrote to memory of 1064 2256 intelgfx32.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\f25e1718c46759c9efc5a3b762817afc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f25e1718c46759c9efc5a3b762817afc_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\f25e1718c46759c9efc5a3b762817afc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f25e1718c46759c9efc5a3b762817afc_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Users\Admin\AppData\Local\Temp\F25E17~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Users\Admin\AppData\Local\Temp\F25E17~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1064 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2540 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1868 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1712 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1860 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:988 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1788 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1732 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2248 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2168 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2752 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2980 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3040 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2748 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2624 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1444 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2324 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1276 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2804 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:852 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE33⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1312 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1856 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2948 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3000 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1868 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2364 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1824 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2152 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1720 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE42⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2428 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2480 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:544 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1592 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:2508
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288KB
MD5f25e1718c46759c9efc5a3b762817afc
SHA1e6beda436c6de39ad14442f7a0d1147860044771
SHA256771e11a0254f407da8eb855cb85ae357f4255f7b41e27bc28e9dcd835bff7faa
SHA512e7c12cc54845e3d22ba260be4fa204cc6f3b064b36322a5dc1d95f9026f755c89698de3bd5d9bd9ae50ed05e61edc45ad837d878f3bad51b407d5526e70bf888