Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/09/2024, 10:38
Static task
static1
Behavioral task
behavioral1
Sample
f8304a020a16271268904b709f192d0a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f8304a020a16271268904b709f192d0a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f8304a020a16271268904b709f192d0a_JaffaCakes118.exe
-
Size
256KB
-
MD5
f8304a020a16271268904b709f192d0a
-
SHA1
eef82875ee4bf8f1270623526a2842e4da3daf75
-
SHA256
db23b65ee8a02b57f7f29d883a909df65ed93c35202d033cfbed5493f7f4a264
-
SHA512
c90a723d450fdfa6660be315d0eb981fc81ecfdce30c836234d2490864422ad58c19c098ead8b9fd0c4d33bb5a7e03fad5b9c123ce38f2a78b2746df305ed256
-
SSDEEP
6144:T2h0Qo8B5hJtXBU8RQuS1MSwY5e4l/nb/9qa6JmFeadxvQo:TO0iBbrXBJQukMShhBnb/9d6JmVvP
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2916 igfxdct32.exe -
Executes dropped EXE 49 IoCs
pid Process 2916 igfxdct32.exe 1972 igfxdct32.exe 264 igfxdct32.exe 1288 igfxdct32.exe 2232 igfxdct32.exe 2340 igfxdct32.exe 2796 igfxdct32.exe 2956 igfxdct32.exe 2200 igfxdct32.exe 2476 igfxdct32.exe 1468 igfxdct32.exe 448 igfxdct32.exe 988 igfxdct32.exe 1704 igfxdct32.exe 896 igfxdct32.exe 2108 igfxdct32.exe 376 igfxdct32.exe 1036 igfxdct32.exe 1568 igfxdct32.exe 2852 igfxdct32.exe 2696 igfxdct32.exe 2612 igfxdct32.exe 880 igfxdct32.exe 2460 igfxdct32.exe 2192 igfxdct32.exe 2816 igfxdct32.exe 2672 igfxdct32.exe 1940 igfxdct32.exe 2060 igfxdct32.exe 3012 igfxdct32.exe 2472 igfxdct32.exe 2476 igfxdct32.exe 1188 igfxdct32.exe 1064 igfxdct32.exe 1580 igfxdct32.exe 1360 igfxdct32.exe 1960 igfxdct32.exe 2548 igfxdct32.exe 2552 igfxdct32.exe 2280 igfxdct32.exe 2908 igfxdct32.exe 2984 igfxdct32.exe 2308 igfxdct32.exe 2660 igfxdct32.exe 932 igfxdct32.exe 1020 igfxdct32.exe 880 igfxdct32.exe 2556 igfxdct32.exe 1904 igfxdct32.exe -
Loads dropped DLL 64 IoCs
pid Process 2844 f8304a020a16271268904b709f192d0a_JaffaCakes118.exe 2844 f8304a020a16271268904b709f192d0a_JaffaCakes118.exe 2916 igfxdct32.exe 2916 igfxdct32.exe 1972 igfxdct32.exe 1972 igfxdct32.exe 264 igfxdct32.exe 264 igfxdct32.exe 1288 igfxdct32.exe 1288 igfxdct32.exe 2232 igfxdct32.exe 2232 igfxdct32.exe 2340 igfxdct32.exe 2340 igfxdct32.exe 2796 igfxdct32.exe 2796 igfxdct32.exe 2956 igfxdct32.exe 2956 igfxdct32.exe 2200 igfxdct32.exe 2200 igfxdct32.exe 2476 igfxdct32.exe 2476 igfxdct32.exe 1468 igfxdct32.exe 1468 igfxdct32.exe 448 igfxdct32.exe 448 igfxdct32.exe 988 igfxdct32.exe 988 igfxdct32.exe 1704 igfxdct32.exe 1704 igfxdct32.exe 896 igfxdct32.exe 896 igfxdct32.exe 2108 igfxdct32.exe 2108 igfxdct32.exe 376 igfxdct32.exe 376 igfxdct32.exe 1036 igfxdct32.exe 1036 igfxdct32.exe 1568 igfxdct32.exe 1568 igfxdct32.exe 2852 igfxdct32.exe 2852 igfxdct32.exe 2696 igfxdct32.exe 2696 igfxdct32.exe 2612 igfxdct32.exe 2612 igfxdct32.exe 880 igfxdct32.exe 880 igfxdct32.exe 2460 igfxdct32.exe 2460 igfxdct32.exe 2192 igfxdct32.exe 2192 igfxdct32.exe 2816 igfxdct32.exe 2816 igfxdct32.exe 2672 igfxdct32.exe 2672 igfxdct32.exe 1940 igfxdct32.exe 1940 igfxdct32.exe 2060 igfxdct32.exe 2060 igfxdct32.exe 3012 igfxdct32.exe 3012 igfxdct32.exe 2472 igfxdct32.exe 2472 igfxdct32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum f8304a020a16271268904b709f192d0a_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 f8304a020a16271268904b709f192d0a_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdct32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ f8304a020a16271268904b709f192d0a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe f8304a020a16271268904b709f192d0a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File opened for modification C:\Windows\SysWOW64\ igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File opened for modification C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe File created C:\Windows\SysWOW64\igfxdct32.exe igfxdct32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 50 IoCs
pid Process 2844 f8304a020a16271268904b709f192d0a_JaffaCakes118.exe 2916 igfxdct32.exe 1972 igfxdct32.exe 264 igfxdct32.exe 1288 igfxdct32.exe 2232 igfxdct32.exe 2340 igfxdct32.exe 2796 igfxdct32.exe 2956 igfxdct32.exe 2200 igfxdct32.exe 2476 igfxdct32.exe 1468 igfxdct32.exe 448 igfxdct32.exe 988 igfxdct32.exe 1704 igfxdct32.exe 896 igfxdct32.exe 2108 igfxdct32.exe 376 igfxdct32.exe 1036 igfxdct32.exe 1568 igfxdct32.exe 2852 igfxdct32.exe 2696 igfxdct32.exe 2612 igfxdct32.exe 880 igfxdct32.exe 2460 igfxdct32.exe 2192 igfxdct32.exe 2816 igfxdct32.exe 2672 igfxdct32.exe 1940 igfxdct32.exe 2060 igfxdct32.exe 3012 igfxdct32.exe 2472 igfxdct32.exe 2476 igfxdct32.exe 1188 igfxdct32.exe 1064 igfxdct32.exe 1580 igfxdct32.exe 1360 igfxdct32.exe 1960 igfxdct32.exe 2548 igfxdct32.exe 2552 igfxdct32.exe 2280 igfxdct32.exe 2908 igfxdct32.exe 2984 igfxdct32.exe 2308 igfxdct32.exe 2660 igfxdct32.exe 932 igfxdct32.exe 1020 igfxdct32.exe 880 igfxdct32.exe 2556 igfxdct32.exe 1904 igfxdct32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 49 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f8304a020a16271268904b709f192d0a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdct32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2844 f8304a020a16271268904b709f192d0a_JaffaCakes118.exe 2844 f8304a020a16271268904b709f192d0a_JaffaCakes118.exe 2844 f8304a020a16271268904b709f192d0a_JaffaCakes118.exe 2844 f8304a020a16271268904b709f192d0a_JaffaCakes118.exe 2844 f8304a020a16271268904b709f192d0a_JaffaCakes118.exe 2844 f8304a020a16271268904b709f192d0a_JaffaCakes118.exe 2844 f8304a020a16271268904b709f192d0a_JaffaCakes118.exe 2844 f8304a020a16271268904b709f192d0a_JaffaCakes118.exe 2844 f8304a020a16271268904b709f192d0a_JaffaCakes118.exe 2844 f8304a020a16271268904b709f192d0a_JaffaCakes118.exe 2844 f8304a020a16271268904b709f192d0a_JaffaCakes118.exe 2844 f8304a020a16271268904b709f192d0a_JaffaCakes118.exe 2844 f8304a020a16271268904b709f192d0a_JaffaCakes118.exe 2844 f8304a020a16271268904b709f192d0a_JaffaCakes118.exe 2844 f8304a020a16271268904b709f192d0a_JaffaCakes118.exe 2844 f8304a020a16271268904b709f192d0a_JaffaCakes118.exe 2916 igfxdct32.exe 2916 igfxdct32.exe 2916 igfxdct32.exe 2916 igfxdct32.exe 2916 igfxdct32.exe 2916 igfxdct32.exe 2916 igfxdct32.exe 2916 igfxdct32.exe 2916 igfxdct32.exe 2916 igfxdct32.exe 2916 igfxdct32.exe 2916 igfxdct32.exe 2916 igfxdct32.exe 2916 igfxdct32.exe 2916 igfxdct32.exe 2916 igfxdct32.exe 1972 igfxdct32.exe 1972 igfxdct32.exe 1972 igfxdct32.exe 1972 igfxdct32.exe 1972 igfxdct32.exe 1972 igfxdct32.exe 1972 igfxdct32.exe 1972 igfxdct32.exe 1972 igfxdct32.exe 1972 igfxdct32.exe 1972 igfxdct32.exe 1972 igfxdct32.exe 1972 igfxdct32.exe 1972 igfxdct32.exe 1972 igfxdct32.exe 1972 igfxdct32.exe 264 igfxdct32.exe 264 igfxdct32.exe 264 igfxdct32.exe 264 igfxdct32.exe 264 igfxdct32.exe 264 igfxdct32.exe 264 igfxdct32.exe 264 igfxdct32.exe 264 igfxdct32.exe 264 igfxdct32.exe 264 igfxdct32.exe 264 igfxdct32.exe 264 igfxdct32.exe 264 igfxdct32.exe 264 igfxdct32.exe 264 igfxdct32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2916 2844 f8304a020a16271268904b709f192d0a_JaffaCakes118.exe 30 PID 2844 wrote to memory of 2916 2844 f8304a020a16271268904b709f192d0a_JaffaCakes118.exe 30 PID 2844 wrote to memory of 2916 2844 f8304a020a16271268904b709f192d0a_JaffaCakes118.exe 30 PID 2844 wrote to memory of 2916 2844 f8304a020a16271268904b709f192d0a_JaffaCakes118.exe 30 PID 2916 wrote to memory of 1972 2916 igfxdct32.exe 31 PID 2916 wrote to memory of 1972 2916 igfxdct32.exe 31 PID 2916 wrote to memory of 1972 2916 igfxdct32.exe 31 PID 2916 wrote to memory of 1972 2916 igfxdct32.exe 31 PID 1972 wrote to memory of 264 1972 igfxdct32.exe 32 PID 1972 wrote to memory of 264 1972 igfxdct32.exe 32 PID 1972 wrote to memory of 264 1972 igfxdct32.exe 32 PID 1972 wrote to memory of 264 1972 igfxdct32.exe 32 PID 264 wrote to memory of 1288 264 igfxdct32.exe 33 PID 264 wrote to memory of 1288 264 igfxdct32.exe 33 PID 264 wrote to memory of 1288 264 igfxdct32.exe 33 PID 264 wrote to memory of 1288 264 igfxdct32.exe 33 PID 1288 wrote to memory of 2232 1288 igfxdct32.exe 34 PID 1288 wrote to memory of 2232 1288 igfxdct32.exe 34 PID 1288 wrote to memory of 2232 1288 igfxdct32.exe 34 PID 1288 wrote to memory of 2232 1288 igfxdct32.exe 34 PID 2232 wrote to memory of 2340 2232 igfxdct32.exe 35 PID 2232 wrote to memory of 2340 2232 igfxdct32.exe 35 PID 2232 wrote to memory of 2340 2232 igfxdct32.exe 35 PID 2232 wrote to memory of 2340 2232 igfxdct32.exe 35 PID 2340 wrote to memory of 2796 2340 igfxdct32.exe 36 PID 2340 wrote to memory of 2796 2340 igfxdct32.exe 36 PID 2340 wrote to memory of 2796 2340 igfxdct32.exe 36 PID 2340 wrote to memory of 2796 2340 igfxdct32.exe 36 PID 2796 wrote to memory of 2956 2796 igfxdct32.exe 37 PID 2796 wrote to memory of 2956 2796 igfxdct32.exe 37 PID 2796 wrote to memory of 2956 2796 igfxdct32.exe 37 PID 2796 wrote to memory of 2956 2796 igfxdct32.exe 37 PID 2956 wrote to memory of 2200 2956 igfxdct32.exe 39 PID 2956 wrote to memory of 2200 2956 igfxdct32.exe 39 PID 2956 wrote to memory of 2200 2956 igfxdct32.exe 39 PID 2956 wrote to memory of 2200 2956 igfxdct32.exe 39 PID 2200 wrote to memory of 2476 2200 igfxdct32.exe 40 PID 2200 wrote to memory of 2476 2200 igfxdct32.exe 40 PID 2200 wrote to memory of 2476 2200 igfxdct32.exe 40 PID 2200 wrote to memory of 2476 2200 igfxdct32.exe 40 PID 2476 wrote to memory of 1468 2476 igfxdct32.exe 41 PID 2476 wrote to memory of 1468 2476 igfxdct32.exe 41 PID 2476 wrote to memory of 1468 2476 igfxdct32.exe 41 PID 2476 wrote to memory of 1468 2476 igfxdct32.exe 41 PID 1468 wrote to memory of 448 1468 igfxdct32.exe 42 PID 1468 wrote to memory of 448 1468 igfxdct32.exe 42 PID 1468 wrote to memory of 448 1468 igfxdct32.exe 42 PID 1468 wrote to memory of 448 1468 igfxdct32.exe 42 PID 448 wrote to memory of 988 448 igfxdct32.exe 43 PID 448 wrote to memory of 988 448 igfxdct32.exe 43 PID 448 wrote to memory of 988 448 igfxdct32.exe 43 PID 448 wrote to memory of 988 448 igfxdct32.exe 43 PID 988 wrote to memory of 1704 988 igfxdct32.exe 44 PID 988 wrote to memory of 1704 988 igfxdct32.exe 44 PID 988 wrote to memory of 1704 988 igfxdct32.exe 44 PID 988 wrote to memory of 1704 988 igfxdct32.exe 44 PID 1704 wrote to memory of 896 1704 igfxdct32.exe 45 PID 1704 wrote to memory of 896 1704 igfxdct32.exe 45 PID 1704 wrote to memory of 896 1704 igfxdct32.exe 45 PID 1704 wrote to memory of 896 1704 igfxdct32.exe 45 PID 896 wrote to memory of 2108 896 igfxdct32.exe 46 PID 896 wrote to memory of 2108 896 igfxdct32.exe 46 PID 896 wrote to memory of 2108 896 igfxdct32.exe 46 PID 896 wrote to memory of 2108 896 igfxdct32.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8304a020a16271268904b709f192d0a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f8304a020a16271268904b709f192d0a_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Users\Admin\AppData\Local\Temp\F8304A~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2108 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:376 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1036 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1568 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2852 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2696 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2612 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:880 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2460 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2192 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2816 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2672 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE29⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1940 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2060 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3012 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2472 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE33⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2476 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1188 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1064 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1580 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE37⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1360 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1960 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2548 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2552 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2280 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE42⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2908 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE43⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2984 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2308 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2660 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE46⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:932 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE47⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1020 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE48⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:880 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE49⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2556 -
C:\Windows\SysWOW64\igfxdct32.exe"C:\Windows\system32\igfxdct32.exe" C:\Windows\SysWOW64\IGFXDC~1.EXE50⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1904
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5f8304a020a16271268904b709f192d0a
SHA1eef82875ee4bf8f1270623526a2842e4da3daf75
SHA256db23b65ee8a02b57f7f29d883a909df65ed93c35202d033cfbed5493f7f4a264
SHA512c90a723d450fdfa6660be315d0eb981fc81ecfdce30c836234d2490864422ad58c19c098ead8b9fd0c4d33bb5a7e03fad5b9c123ce38f2a78b2746df305ed256