Analysis
-
max time kernel
148s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-09-2024 19:31
Behavioral task
behavioral1
Sample
f45ba1d46debf5df8ffd9fb3639f4daf_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f45ba1d46debf5df8ffd9fb3639f4daf_JaffaCakes118.exe
-
Size
232KB
-
MD5
f45ba1d46debf5df8ffd9fb3639f4daf
-
SHA1
4f26613249f597c535039e6f815d318f96ab29ef
-
SHA256
34cb613dc986a0c9f64bd35f761268e462768545d1a769fb88e620c2ba5a8de6
-
SHA512
9a9e8d4709c891b6eaf3d9fb69623bb28d96b4e34488b104b5d68161db80921dcf1bc4cdee2c9a73581a254692301ab675e977a895d87c1225806dcbdd4d78ac
-
SSDEEP
6144:GkbpuZ9khCYmZ0bDyGj9EylVv9wtGaVCo7Ksvm:PbYZ9ok0ffjiyv92d
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2560 igfxper32.exe -
Executes dropped EXE 50 IoCs
pid Process 2560 igfxper32.exe 2632 igfxper32.exe 2680 igfxper32.exe 1940 igfxper32.exe 308 igfxper32.exe 2688 igfxper32.exe 1916 igfxper32.exe 1472 igfxper32.exe 2484 igfxper32.exe 1956 igfxper32.exe 2304 igfxper32.exe 2356 igfxper32.exe 352 igfxper32.exe 2316 igfxper32.exe 552 igfxper32.exe 1688 igfxper32.exe 2020 igfxper32.exe 2320 igfxper32.exe 2092 igfxper32.exe 2240 igfxper32.exe 2412 igfxper32.exe 2640 igfxper32.exe 2620 igfxper32.exe 2668 igfxper32.exe 1932 igfxper32.exe 1200 igfxper32.exe 2024 igfxper32.exe 1268 igfxper32.exe 2840 igfxper32.exe 1840 igfxper32.exe 2996 igfxper32.exe 2940 igfxper32.exe 2308 igfxper32.exe 1096 igfxper32.exe 2176 igfxper32.exe 2136 igfxper32.exe 2344 igfxper32.exe 2340 igfxper32.exe 1552 igfxper32.exe 1152 igfxper32.exe 1748 igfxper32.exe 2084 igfxper32.exe 1832 igfxper32.exe 2972 igfxper32.exe 2660 igfxper32.exe 2296 igfxper32.exe 1668 igfxper32.exe 2496 igfxper32.exe 1572 igfxper32.exe 1768 igfxper32.exe -
Loads dropped DLL 64 IoCs
pid Process 1832 f45ba1d46debf5df8ffd9fb3639f4daf_JaffaCakes118.exe 1832 f45ba1d46debf5df8ffd9fb3639f4daf_JaffaCakes118.exe 2560 igfxper32.exe 2560 igfxper32.exe 2632 igfxper32.exe 2632 igfxper32.exe 2680 igfxper32.exe 2680 igfxper32.exe 1940 igfxper32.exe 1940 igfxper32.exe 308 igfxper32.exe 308 igfxper32.exe 2688 igfxper32.exe 2688 igfxper32.exe 1916 igfxper32.exe 1916 igfxper32.exe 1472 igfxper32.exe 1472 igfxper32.exe 2484 igfxper32.exe 2484 igfxper32.exe 1956 igfxper32.exe 1956 igfxper32.exe 2304 igfxper32.exe 2304 igfxper32.exe 2356 igfxper32.exe 2356 igfxper32.exe 352 igfxper32.exe 352 igfxper32.exe 2316 igfxper32.exe 2316 igfxper32.exe 552 igfxper32.exe 552 igfxper32.exe 1688 igfxper32.exe 1688 igfxper32.exe 2020 igfxper32.exe 2020 igfxper32.exe 2320 igfxper32.exe 2320 igfxper32.exe 2092 igfxper32.exe 2092 igfxper32.exe 2240 igfxper32.exe 2240 igfxper32.exe 2412 igfxper32.exe 2412 igfxper32.exe 2640 igfxper32.exe 2640 igfxper32.exe 2620 igfxper32.exe 2620 igfxper32.exe 2668 igfxper32.exe 2668 igfxper32.exe 1932 igfxper32.exe 1932 igfxper32.exe 1200 igfxper32.exe 1200 igfxper32.exe 2024 igfxper32.exe 2024 igfxper32.exe 1268 igfxper32.exe 1268 igfxper32.exe 2840 igfxper32.exe 2840 igfxper32.exe 1840 igfxper32.exe 1840 igfxper32.exe 2996 igfxper32.exe 2996 igfxper32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum f45ba1d46debf5df8ffd9fb3639f4daf_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxper32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe f45ba1d46debf5df8ffd9fb3639f4daf_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File opened for modification C:\Windows\SysWOW64\ igfxper32.exe File created C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe File opened for modification C:\Windows\SysWOW64\igfxper32.exe igfxper32.exe -
resource yara_rule behavioral1/memory/1832-0-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/1832-2-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/files/0x000b000000012253-8.dat upx behavioral1/memory/1832-15-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/2560-16-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/2560-17-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/2560-24-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/2632-33-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/2680-31-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/2680-40-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/1940-41-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/1940-46-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/308-51-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/308-52-0x0000000003550000-0x00000000035F4000-memory.dmp upx behavioral1/memory/1916-57-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/2688-59-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/308-60-0x0000000003550000-0x00000000035F4000-memory.dmp upx behavioral1/memory/1472-66-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/1916-68-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/1916-65-0x0000000003300000-0x00000000033A4000-memory.dmp upx behavioral1/memory/2484-75-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/1472-74-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/1956-84-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/2484-82-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/1956-89-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/2304-88-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/2304-95-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/2356-101-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/352-106-0x0000000003370000-0x0000000003414000-memory.dmp upx behavioral1/memory/352-108-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/2316-114-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/552-112-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/1688-121-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/552-120-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/1688-125-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/2020-132-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/2320-133-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/2240-134-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/2092-136-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/2240-138-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/2640-139-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/2412-141-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/2620-142-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/2640-144-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/2620-147-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/2668-145-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/2668-149-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/1932-150-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/1200-152-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/1932-151-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/2024-154-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/1200-156-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/1932-153-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/1268-159-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/2024-158-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/1268-161-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/2840-162-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/2840-163-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/1840-164-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/2840-165-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/1840-167-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/2940-170-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/2996-169-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/2940-172-0x0000000000400000-0x00000000004A4000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 51 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f45ba1d46debf5df8ffd9fb3639f4daf_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxper32.exe -
Suspicious behavior: EnumeratesProcesses 51 IoCs
pid Process 1832 f45ba1d46debf5df8ffd9fb3639f4daf_JaffaCakes118.exe 2560 igfxper32.exe 2632 igfxper32.exe 2680 igfxper32.exe 1940 igfxper32.exe 308 igfxper32.exe 2688 igfxper32.exe 1916 igfxper32.exe 1472 igfxper32.exe 2484 igfxper32.exe 1956 igfxper32.exe 2304 igfxper32.exe 2356 igfxper32.exe 352 igfxper32.exe 2316 igfxper32.exe 552 igfxper32.exe 1688 igfxper32.exe 2020 igfxper32.exe 2320 igfxper32.exe 2092 igfxper32.exe 2240 igfxper32.exe 2412 igfxper32.exe 2640 igfxper32.exe 2620 igfxper32.exe 2668 igfxper32.exe 1932 igfxper32.exe 1200 igfxper32.exe 2024 igfxper32.exe 1268 igfxper32.exe 2840 igfxper32.exe 1840 igfxper32.exe 2996 igfxper32.exe 2940 igfxper32.exe 2308 igfxper32.exe 1096 igfxper32.exe 2176 igfxper32.exe 2136 igfxper32.exe 2344 igfxper32.exe 2340 igfxper32.exe 1552 igfxper32.exe 1152 igfxper32.exe 1748 igfxper32.exe 2084 igfxper32.exe 1832 igfxper32.exe 2972 igfxper32.exe 2660 igfxper32.exe 2296 igfxper32.exe 1668 igfxper32.exe 2496 igfxper32.exe 1572 igfxper32.exe 1768 igfxper32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1832 wrote to memory of 2560 1832 f45ba1d46debf5df8ffd9fb3639f4daf_JaffaCakes118.exe 30 PID 1832 wrote to memory of 2560 1832 f45ba1d46debf5df8ffd9fb3639f4daf_JaffaCakes118.exe 30 PID 1832 wrote to memory of 2560 1832 f45ba1d46debf5df8ffd9fb3639f4daf_JaffaCakes118.exe 30 PID 1832 wrote to memory of 2560 1832 f45ba1d46debf5df8ffd9fb3639f4daf_JaffaCakes118.exe 30 PID 2560 wrote to memory of 2632 2560 igfxper32.exe 31 PID 2560 wrote to memory of 2632 2560 igfxper32.exe 31 PID 2560 wrote to memory of 2632 2560 igfxper32.exe 31 PID 2560 wrote to memory of 2632 2560 igfxper32.exe 31 PID 2632 wrote to memory of 2680 2632 igfxper32.exe 33 PID 2632 wrote to memory of 2680 2632 igfxper32.exe 33 PID 2632 wrote to memory of 2680 2632 igfxper32.exe 33 PID 2632 wrote to memory of 2680 2632 igfxper32.exe 33 PID 2680 wrote to memory of 1940 2680 igfxper32.exe 34 PID 2680 wrote to memory of 1940 2680 igfxper32.exe 34 PID 2680 wrote to memory of 1940 2680 igfxper32.exe 34 PID 2680 wrote to memory of 1940 2680 igfxper32.exe 34 PID 1940 wrote to memory of 308 1940 igfxper32.exe 35 PID 1940 wrote to memory of 308 1940 igfxper32.exe 35 PID 1940 wrote to memory of 308 1940 igfxper32.exe 35 PID 1940 wrote to memory of 308 1940 igfxper32.exe 35 PID 308 wrote to memory of 2688 308 igfxper32.exe 36 PID 308 wrote to memory of 2688 308 igfxper32.exe 36 PID 308 wrote to memory of 2688 308 igfxper32.exe 36 PID 308 wrote to memory of 2688 308 igfxper32.exe 36 PID 2688 wrote to memory of 1916 2688 igfxper32.exe 37 PID 2688 wrote to memory of 1916 2688 igfxper32.exe 37 PID 2688 wrote to memory of 1916 2688 igfxper32.exe 37 PID 2688 wrote to memory of 1916 2688 igfxper32.exe 37 PID 1916 wrote to memory of 1472 1916 igfxper32.exe 38 PID 1916 wrote to memory of 1472 1916 igfxper32.exe 38 PID 1916 wrote to memory of 1472 1916 igfxper32.exe 38 PID 1916 wrote to memory of 1472 1916 igfxper32.exe 38 PID 1472 wrote to memory of 2484 1472 igfxper32.exe 39 PID 1472 wrote to memory of 2484 1472 igfxper32.exe 39 PID 1472 wrote to memory of 2484 1472 igfxper32.exe 39 PID 1472 wrote to memory of 2484 1472 igfxper32.exe 39 PID 2484 wrote to memory of 1956 2484 igfxper32.exe 40 PID 2484 wrote to memory of 1956 2484 igfxper32.exe 40 PID 2484 wrote to memory of 1956 2484 igfxper32.exe 40 PID 2484 wrote to memory of 1956 2484 igfxper32.exe 40 PID 1956 wrote to memory of 2304 1956 igfxper32.exe 41 PID 1956 wrote to memory of 2304 1956 igfxper32.exe 41 PID 1956 wrote to memory of 2304 1956 igfxper32.exe 41 PID 1956 wrote to memory of 2304 1956 igfxper32.exe 41 PID 2304 wrote to memory of 2356 2304 igfxper32.exe 42 PID 2304 wrote to memory of 2356 2304 igfxper32.exe 42 PID 2304 wrote to memory of 2356 2304 igfxper32.exe 42 PID 2304 wrote to memory of 2356 2304 igfxper32.exe 42 PID 2356 wrote to memory of 352 2356 igfxper32.exe 43 PID 2356 wrote to memory of 352 2356 igfxper32.exe 43 PID 2356 wrote to memory of 352 2356 igfxper32.exe 43 PID 2356 wrote to memory of 352 2356 igfxper32.exe 43 PID 352 wrote to memory of 2316 352 igfxper32.exe 44 PID 352 wrote to memory of 2316 352 igfxper32.exe 44 PID 352 wrote to memory of 2316 352 igfxper32.exe 44 PID 352 wrote to memory of 2316 352 igfxper32.exe 44 PID 2316 wrote to memory of 552 2316 igfxper32.exe 45 PID 2316 wrote to memory of 552 2316 igfxper32.exe 45 PID 2316 wrote to memory of 552 2316 igfxper32.exe 45 PID 2316 wrote to memory of 552 2316 igfxper32.exe 45 PID 552 wrote to memory of 1688 552 igfxper32.exe 46 PID 552 wrote to memory of 1688 552 igfxper32.exe 46 PID 552 wrote to memory of 1688 552 igfxper32.exe 46 PID 552 wrote to memory of 1688 552 igfxper32.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\f45ba1d46debf5df8ffd9fb3639f4daf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f45ba1d46debf5df8ffd9fb3639f4daf_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Users\Admin\AppData\Local\Temp\F45BA1~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:352 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1688 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2020 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2320 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2092 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2240 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2412 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2640 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2620 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2668 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1932 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1200 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2024 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE29⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1268 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2840 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1840 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2996 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2940 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2308 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1096 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2176 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2136 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2344 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2340 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1552 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1152 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE42⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1748 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2084 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1832 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2972 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2660 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE47⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2296 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE48⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1668 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE49⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2496 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE50⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1572 -
C:\Windows\SysWOW64\igfxper32.exe"C:\Windows\system32\igfxper32.exe" C:\Windows\SysWOW64\IGFXPE~1.EXE51⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1768
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD5f45ba1d46debf5df8ffd9fb3639f4daf
SHA14f26613249f597c535039e6f815d318f96ab29ef
SHA25634cb613dc986a0c9f64bd35f761268e462768545d1a769fb88e620c2ba5a8de6
SHA5129a9e8d4709c891b6eaf3d9fb69623bb28d96b4e34488b104b5d68161db80921dcf1bc4cdee2c9a73581a254692301ab675e977a895d87c1225806dcbdd4d78ac