Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 06:10
Static task
static1
Behavioral task
behavioral1
Sample
f7bd4d033dc8ad8abb92bad71742943d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f7bd4d033dc8ad8abb92bad71742943d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f7bd4d033dc8ad8abb92bad71742943d_JaffaCakes118.exe
-
Size
272KB
-
MD5
f7bd4d033dc8ad8abb92bad71742943d
-
SHA1
77009159058e8af7dbc8abf13be1e20cf1c846fe
-
SHA256
29c8f46c98fb0e7415f14e50e98089ce0d01e3d0254734ca1fe0f193a225eb4a
-
SHA512
499617fe7596777469ec6c652b84c4a881728a68811637f8ecb57cda18bf3b73b5f460289f5bb30bf473fa45e8d6753a55a5bc77c9b3921a013ef71b17d1b51a
-
SSDEEP
6144:pyAj0KReO5yu54tJdJ0G1+78wY7Dsqp0JdGm52nHNTUq9:pyABeLtJ7F1PwY7SynN
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2068 igfxpd32.exe -
Executes dropped EXE 64 IoCs
pid Process 2068 igfxpd32.exe 2808 igfxpd32.exe 2576 igfxpd32.exe 2616 igfxpd32.exe 2976 igfxpd32.exe 2044 igfxpd32.exe 1740 igfxpd32.exe 1932 igfxpd32.exe 1040 igfxpd32.exe 1792 igfxpd32.exe 2308 igfxpd32.exe 2152 igfxpd32.exe 1092 igfxpd32.exe 1948 igfxpd32.exe 1236 igfxpd32.exe 2920 igfxpd32.exe 1852 igfxpd32.exe 2304 igfxpd32.exe 3028 igfxpd32.exe 1500 igfxpd32.exe 3000 igfxpd32.exe 2368 igfxpd32.exe 2348 igfxpd32.exe 2696 igfxpd32.exe 2908 igfxpd32.exe 2836 igfxpd32.exe 2736 igfxpd32.exe 2612 igfxpd32.exe 2980 igfxpd32.exe 672 igfxpd32.exe 2044 igfxpd32.exe 1728 igfxpd32.exe 2668 igfxpd32.exe 1928 igfxpd32.exe 2824 igfxpd32.exe 1756 igfxpd32.exe 2268 igfxpd32.exe 2608 igfxpd32.exe 1032 igfxpd32.exe 2440 igfxpd32.exe 1336 igfxpd32.exe 1584 igfxpd32.exe 856 igfxpd32.exe 1960 igfxpd32.exe 1852 igfxpd32.exe 264 igfxpd32.exe 1732 igfxpd32.exe 1500 igfxpd32.exe 1720 igfxpd32.exe 2008 igfxpd32.exe 2296 igfxpd32.exe 2708 igfxpd32.exe 2724 igfxpd32.exe 2644 igfxpd32.exe 2616 igfxpd32.exe 1532 igfxpd32.exe 1420 igfxpd32.exe 2456 igfxpd32.exe 2196 igfxpd32.exe 1296 igfxpd32.exe 2148 igfxpd32.exe 936 igfxpd32.exe 1340 igfxpd32.exe 1388 igfxpd32.exe -
Loads dropped DLL 64 IoCs
pid Process 2512 f7bd4d033dc8ad8abb92bad71742943d_JaffaCakes118.exe 2512 f7bd4d033dc8ad8abb92bad71742943d_JaffaCakes118.exe 2068 igfxpd32.exe 2068 igfxpd32.exe 2808 igfxpd32.exe 2808 igfxpd32.exe 2576 igfxpd32.exe 2576 igfxpd32.exe 2616 igfxpd32.exe 2616 igfxpd32.exe 2976 igfxpd32.exe 2976 igfxpd32.exe 2044 igfxpd32.exe 2044 igfxpd32.exe 1740 igfxpd32.exe 1740 igfxpd32.exe 1932 igfxpd32.exe 1932 igfxpd32.exe 1040 igfxpd32.exe 1040 igfxpd32.exe 1792 igfxpd32.exe 1792 igfxpd32.exe 2308 igfxpd32.exe 2308 igfxpd32.exe 2152 igfxpd32.exe 2152 igfxpd32.exe 1092 igfxpd32.exe 1092 igfxpd32.exe 1948 igfxpd32.exe 1948 igfxpd32.exe 1236 igfxpd32.exe 1236 igfxpd32.exe 2920 igfxpd32.exe 2920 igfxpd32.exe 1852 igfxpd32.exe 1852 igfxpd32.exe 2304 igfxpd32.exe 2304 igfxpd32.exe 3028 igfxpd32.exe 3028 igfxpd32.exe 1500 igfxpd32.exe 1500 igfxpd32.exe 3000 igfxpd32.exe 3000 igfxpd32.exe 2368 igfxpd32.exe 2368 igfxpd32.exe 2348 igfxpd32.exe 2348 igfxpd32.exe 2696 igfxpd32.exe 2696 igfxpd32.exe 2908 igfxpd32.exe 2908 igfxpd32.exe 2836 igfxpd32.exe 2836 igfxpd32.exe 2736 igfxpd32.exe 2736 igfxpd32.exe 2612 igfxpd32.exe 2612 igfxpd32.exe 2980 igfxpd32.exe 2980 igfxpd32.exe 672 igfxpd32.exe 672 igfxpd32.exe 2044 igfxpd32.exe 2044 igfxpd32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum f7bd4d033dc8ad8abb92bad71742943d_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 f7bd4d033dc8ad8abb92bad71742943d_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxpd32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File created C:\Windows\SysWOW64\igfxpd32.exe igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe File opened for modification C:\Windows\SysWOW64\ igfxpd32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7bd4d033dc8ad8abb92bad71742943d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2512 f7bd4d033dc8ad8abb92bad71742943d_JaffaCakes118.exe 2512 f7bd4d033dc8ad8abb92bad71742943d_JaffaCakes118.exe 2068 igfxpd32.exe 2068 igfxpd32.exe 2808 igfxpd32.exe 2808 igfxpd32.exe 2576 igfxpd32.exe 2576 igfxpd32.exe 2616 igfxpd32.exe 2616 igfxpd32.exe 2976 igfxpd32.exe 2976 igfxpd32.exe 2044 igfxpd32.exe 2044 igfxpd32.exe 1740 igfxpd32.exe 1740 igfxpd32.exe 1932 igfxpd32.exe 1932 igfxpd32.exe 1040 igfxpd32.exe 1040 igfxpd32.exe 1792 igfxpd32.exe 1792 igfxpd32.exe 2308 igfxpd32.exe 2308 igfxpd32.exe 2152 igfxpd32.exe 2152 igfxpd32.exe 1092 igfxpd32.exe 1092 igfxpd32.exe 1948 igfxpd32.exe 1948 igfxpd32.exe 1236 igfxpd32.exe 1236 igfxpd32.exe 2920 igfxpd32.exe 2920 igfxpd32.exe 1852 igfxpd32.exe 1852 igfxpd32.exe 2304 igfxpd32.exe 2304 igfxpd32.exe 3028 igfxpd32.exe 3028 igfxpd32.exe 1500 igfxpd32.exe 1500 igfxpd32.exe 3000 igfxpd32.exe 3000 igfxpd32.exe 2368 igfxpd32.exe 2368 igfxpd32.exe 2348 igfxpd32.exe 2348 igfxpd32.exe 2696 igfxpd32.exe 2696 igfxpd32.exe 2908 igfxpd32.exe 2908 igfxpd32.exe 2836 igfxpd32.exe 2836 igfxpd32.exe 2736 igfxpd32.exe 2736 igfxpd32.exe 2612 igfxpd32.exe 2612 igfxpd32.exe 2980 igfxpd32.exe 2980 igfxpd32.exe 672 igfxpd32.exe 672 igfxpd32.exe 2044 igfxpd32.exe 2044 igfxpd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2068 2512 f7bd4d033dc8ad8abb92bad71742943d_JaffaCakes118.exe 30 PID 2512 wrote to memory of 2068 2512 f7bd4d033dc8ad8abb92bad71742943d_JaffaCakes118.exe 30 PID 2512 wrote to memory of 2068 2512 f7bd4d033dc8ad8abb92bad71742943d_JaffaCakes118.exe 30 PID 2512 wrote to memory of 2068 2512 f7bd4d033dc8ad8abb92bad71742943d_JaffaCakes118.exe 30 PID 2068 wrote to memory of 2808 2068 igfxpd32.exe 31 PID 2068 wrote to memory of 2808 2068 igfxpd32.exe 31 PID 2068 wrote to memory of 2808 2068 igfxpd32.exe 31 PID 2068 wrote to memory of 2808 2068 igfxpd32.exe 31 PID 2808 wrote to memory of 2576 2808 igfxpd32.exe 32 PID 2808 wrote to memory of 2576 2808 igfxpd32.exe 32 PID 2808 wrote to memory of 2576 2808 igfxpd32.exe 32 PID 2808 wrote to memory of 2576 2808 igfxpd32.exe 32 PID 2576 wrote to memory of 2616 2576 igfxpd32.exe 34 PID 2576 wrote to memory of 2616 2576 igfxpd32.exe 34 PID 2576 wrote to memory of 2616 2576 igfxpd32.exe 34 PID 2576 wrote to memory of 2616 2576 igfxpd32.exe 34 PID 2616 wrote to memory of 2976 2616 igfxpd32.exe 35 PID 2616 wrote to memory of 2976 2616 igfxpd32.exe 35 PID 2616 wrote to memory of 2976 2616 igfxpd32.exe 35 PID 2616 wrote to memory of 2976 2616 igfxpd32.exe 35 PID 2976 wrote to memory of 2044 2976 igfxpd32.exe 36 PID 2976 wrote to memory of 2044 2976 igfxpd32.exe 36 PID 2976 wrote to memory of 2044 2976 igfxpd32.exe 36 PID 2976 wrote to memory of 2044 2976 igfxpd32.exe 36 PID 2044 wrote to memory of 1740 2044 igfxpd32.exe 37 PID 2044 wrote to memory of 1740 2044 igfxpd32.exe 37 PID 2044 wrote to memory of 1740 2044 igfxpd32.exe 37 PID 2044 wrote to memory of 1740 2044 igfxpd32.exe 37 PID 1740 wrote to memory of 1932 1740 igfxpd32.exe 38 PID 1740 wrote to memory of 1932 1740 igfxpd32.exe 38 PID 1740 wrote to memory of 1932 1740 igfxpd32.exe 38 PID 1740 wrote to memory of 1932 1740 igfxpd32.exe 38 PID 1932 wrote to memory of 1040 1932 igfxpd32.exe 39 PID 1932 wrote to memory of 1040 1932 igfxpd32.exe 39 PID 1932 wrote to memory of 1040 1932 igfxpd32.exe 39 PID 1932 wrote to memory of 1040 1932 igfxpd32.exe 39 PID 1040 wrote to memory of 1792 1040 igfxpd32.exe 40 PID 1040 wrote to memory of 1792 1040 igfxpd32.exe 40 PID 1040 wrote to memory of 1792 1040 igfxpd32.exe 40 PID 1040 wrote to memory of 1792 1040 igfxpd32.exe 40 PID 1792 wrote to memory of 2308 1792 igfxpd32.exe 41 PID 1792 wrote to memory of 2308 1792 igfxpd32.exe 41 PID 1792 wrote to memory of 2308 1792 igfxpd32.exe 41 PID 1792 wrote to memory of 2308 1792 igfxpd32.exe 41 PID 2308 wrote to memory of 2152 2308 igfxpd32.exe 42 PID 2308 wrote to memory of 2152 2308 igfxpd32.exe 42 PID 2308 wrote to memory of 2152 2308 igfxpd32.exe 42 PID 2308 wrote to memory of 2152 2308 igfxpd32.exe 42 PID 2152 wrote to memory of 1092 2152 igfxpd32.exe 43 PID 2152 wrote to memory of 1092 2152 igfxpd32.exe 43 PID 2152 wrote to memory of 1092 2152 igfxpd32.exe 43 PID 2152 wrote to memory of 1092 2152 igfxpd32.exe 43 PID 1092 wrote to memory of 1948 1092 igfxpd32.exe 44 PID 1092 wrote to memory of 1948 1092 igfxpd32.exe 44 PID 1092 wrote to memory of 1948 1092 igfxpd32.exe 44 PID 1092 wrote to memory of 1948 1092 igfxpd32.exe 44 PID 1948 wrote to memory of 1236 1948 igfxpd32.exe 45 PID 1948 wrote to memory of 1236 1948 igfxpd32.exe 45 PID 1948 wrote to memory of 1236 1948 igfxpd32.exe 45 PID 1948 wrote to memory of 1236 1948 igfxpd32.exe 45 PID 1236 wrote to memory of 2920 1236 igfxpd32.exe 46 PID 1236 wrote to memory of 2920 1236 igfxpd32.exe 46 PID 1236 wrote to memory of 2920 1236 igfxpd32.exe 46 PID 1236 wrote to memory of 2920 1236 igfxpd32.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7bd4d033dc8ad8abb92bad71742943d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f7bd4d033dc8ad8abb92bad71742943d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Users\Admin\AppData\Local\Temp\F7BD4D~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2920 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1852 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2304 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3028 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1500 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3000 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2368 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2348 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2696 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2908 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2836 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2736 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2612 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2980 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:672 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2044 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1728 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2668 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1928 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2824 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe37⤵
- Executes dropped EXE
- Maps connected drives based on registry
PID:1756 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2268 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2608 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1032 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2440 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1336 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1584 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:856 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe45⤵
- Executes dropped EXE
- Maps connected drives based on registry
PID:1960 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1852 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:264 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe48⤵
- Executes dropped EXE
- Maps connected drives based on registry
PID:1732 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe49⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1500 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe50⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1720 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe51⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2008 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe52⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2296 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe53⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2708 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe54⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2724 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2644 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe56⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2616 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe57⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1532 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe58⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1420 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2456 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe60⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2196 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe61⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1296 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe62⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2148 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe63⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:936 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe64⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1340 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe65⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1388 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe66⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1952 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe67⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2164 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe68⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2268 -
C:\Windows\SysWOW64\igfxpd32.exe"C:\Windows\system32\igfxpd32.exe" C:\Windows\SysWOW64\igfxpd32.exe69⤵
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2140
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
272KB
MD5f7bd4d033dc8ad8abb92bad71742943d
SHA177009159058e8af7dbc8abf13be1e20cf1c846fe
SHA25629c8f46c98fb0e7415f14e50e98089ce0d01e3d0254734ca1fe0f193a225eb4a
SHA512499617fe7596777469ec6c652b84c4a881728a68811637f8ecb57cda18bf3b73b5f460289f5bb30bf473fa45e8d6753a55a5bc77c9b3921a013ef71b17d1b51a