Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 15:08
Behavioral task
behavioral1
Sample
f8a1a6d1f4c5e0140ba0f031e0619c1f_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f8a1a6d1f4c5e0140ba0f031e0619c1f_JaffaCakes118.exe
-
Size
199KB
-
MD5
f8a1a6d1f4c5e0140ba0f031e0619c1f
-
SHA1
a4abfe05265cdb6a61fc47a852a84f22ef4e0419
-
SHA256
e53e4993c6b7198cc04f7efd0623b2555d9c9cdf6d421212386a2a4bc201ce4e
-
SHA512
1a16b277489a5193f0ff20d7d19b122b561ad7cb7a4ed70258c31a0e6bbbf9814b29ea9a516c7683aca0a67852507be2b9f83528fd5dda809200889504b9685a
-
SSDEEP
6144:6p4Eh3MEP6TnqnJHqeH9MBt9MDKJjJaOa:U4Eh3vgeqHODKJjJaOa
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2552 igfxman86.exe -
Executes dropped EXE 47 IoCs
pid Process 2552 igfxman86.exe 2812 igfxman86.exe 2648 igfxman86.exe 2864 igfxman86.exe 2004 igfxman86.exe 2928 igfxman86.exe 2796 igfxman86.exe 2920 igfxman86.exe 2956 igfxman86.exe 2996 igfxman86.exe 2576 igfxman86.exe 1092 igfxman86.exe 712 igfxman86.exe 1772 igfxman86.exe 1548 igfxman86.exe 2492 igfxman86.exe 328 igfxman86.exe 888 igfxman86.exe 1600 igfxman86.exe 2588 igfxman86.exe 2240 igfxman86.exe 2896 igfxman86.exe 2772 igfxman86.exe 2748 igfxman86.exe 356 igfxman86.exe 988 igfxman86.exe 588 igfxman86.exe 580 igfxman86.exe 444 igfxman86.exe 2000 igfxman86.exe 2152 igfxman86.exe 1416 igfxman86.exe 2996 igfxman86.exe 2576 igfxman86.exe 1092 igfxman86.exe 1332 igfxman86.exe 1252 igfxman86.exe 2080 igfxman86.exe 780 igfxman86.exe 3048 igfxman86.exe 1052 igfxman86.exe 1908 igfxman86.exe 1972 igfxman86.exe 2716 igfxman86.exe 2548 igfxman86.exe 2132 igfxman86.exe 3012 igfxman86.exe -
Loads dropped DLL 64 IoCs
pid Process 1972 f8a1a6d1f4c5e0140ba0f031e0619c1f_JaffaCakes118.exe 1972 f8a1a6d1f4c5e0140ba0f031e0619c1f_JaffaCakes118.exe 2552 igfxman86.exe 2552 igfxman86.exe 2812 igfxman86.exe 2812 igfxman86.exe 2648 igfxman86.exe 2648 igfxman86.exe 2864 igfxman86.exe 2864 igfxman86.exe 2004 igfxman86.exe 2004 igfxman86.exe 2928 igfxman86.exe 2928 igfxman86.exe 2796 igfxman86.exe 2796 igfxman86.exe 2920 igfxman86.exe 2920 igfxman86.exe 2956 igfxman86.exe 2956 igfxman86.exe 2996 igfxman86.exe 2996 igfxman86.exe 2576 igfxman86.exe 2576 igfxman86.exe 1092 igfxman86.exe 1092 igfxman86.exe 712 igfxman86.exe 712 igfxman86.exe 1772 igfxman86.exe 1772 igfxman86.exe 1548 igfxman86.exe 1548 igfxman86.exe 2492 igfxman86.exe 2492 igfxman86.exe 328 igfxman86.exe 328 igfxman86.exe 888 igfxman86.exe 888 igfxman86.exe 1600 igfxman86.exe 1600 igfxman86.exe 2588 igfxman86.exe 2588 igfxman86.exe 2240 igfxman86.exe 2240 igfxman86.exe 2896 igfxman86.exe 2896 igfxman86.exe 2772 igfxman86.exe 2772 igfxman86.exe 2748 igfxman86.exe 2748 igfxman86.exe 356 igfxman86.exe 356 igfxman86.exe 988 igfxman86.exe 988 igfxman86.exe 588 igfxman86.exe 588 igfxman86.exe 580 igfxman86.exe 580 igfxman86.exe 444 igfxman86.exe 444 igfxman86.exe 2000 igfxman86.exe 2000 igfxman86.exe 2152 igfxman86.exe 2152 igfxman86.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 f8a1a6d1f4c5e0140ba0f031e0619c1f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum f8a1a6d1f4c5e0140ba0f031e0619c1f_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxman86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxman86.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\ f8a1a6d1f4c5e0140ba0f031e0619c1f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe f8a1a6d1f4c5e0140ba0f031e0619c1f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe f8a1a6d1f4c5e0140ba0f031e0619c1f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\ igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File opened for modification C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe File created C:\Windows\SysWOW64\igfxman86.exe igfxman86.exe -
resource yara_rule behavioral1/memory/1972-0-0x0000000000400000-0x0000000000480000-memory.dmp upx behavioral1/memory/1972-11-0x0000000002F50000-0x0000000002FD0000-memory.dmp upx behavioral1/files/0x00090000000120ce-13.dat upx behavioral1/memory/2812-26-0x0000000000400000-0x0000000000480000-memory.dmp upx behavioral1/memory/2004-41-0x0000000000400000-0x0000000000480000-memory.dmp upx behavioral1/memory/2928-51-0x0000000000400000-0x0000000000480000-memory.dmp upx behavioral1/memory/2796-57-0x0000000000400000-0x0000000000480000-memory.dmp upx behavioral1/memory/2996-77-0x0000000000400000-0x0000000000480000-memory.dmp upx behavioral1/memory/2748-134-0x0000000000400000-0x0000000000480000-memory.dmp upx behavioral1/memory/356-138-0x0000000000400000-0x0000000000480000-memory.dmp upx behavioral1/memory/588-145-0x0000000000400000-0x0000000000480000-memory.dmp upx behavioral1/memory/2576-163-0x0000000000400000-0x0000000000480000-memory.dmp upx behavioral1/memory/1908-181-0x0000000000400000-0x0000000000480000-memory.dmp upx behavioral1/memory/2716-189-0x0000000000400000-0x0000000000480000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 48 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f8a1a6d1f4c5e0140ba0f031e0619c1f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxman86.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1972 f8a1a6d1f4c5e0140ba0f031e0619c1f_JaffaCakes118.exe 1972 f8a1a6d1f4c5e0140ba0f031e0619c1f_JaffaCakes118.exe 2552 igfxman86.exe 2552 igfxman86.exe 2812 igfxman86.exe 2812 igfxman86.exe 2648 igfxman86.exe 2648 igfxman86.exe 2864 igfxman86.exe 2864 igfxman86.exe 2004 igfxman86.exe 2004 igfxman86.exe 2928 igfxman86.exe 2928 igfxman86.exe 2796 igfxman86.exe 2796 igfxman86.exe 2920 igfxman86.exe 2920 igfxman86.exe 2956 igfxman86.exe 2956 igfxman86.exe 2996 igfxman86.exe 2996 igfxman86.exe 2576 igfxman86.exe 2576 igfxman86.exe 1092 igfxman86.exe 1092 igfxman86.exe 712 igfxman86.exe 712 igfxman86.exe 1772 igfxman86.exe 1772 igfxman86.exe 1548 igfxman86.exe 1548 igfxman86.exe 2492 igfxman86.exe 2492 igfxman86.exe 328 igfxman86.exe 328 igfxman86.exe 888 igfxman86.exe 888 igfxman86.exe 1600 igfxman86.exe 1600 igfxman86.exe 2588 igfxman86.exe 2588 igfxman86.exe 2240 igfxman86.exe 2240 igfxman86.exe 2896 igfxman86.exe 2896 igfxman86.exe 2772 igfxman86.exe 2772 igfxman86.exe 2748 igfxman86.exe 2748 igfxman86.exe 356 igfxman86.exe 356 igfxman86.exe 988 igfxman86.exe 988 igfxman86.exe 588 igfxman86.exe 588 igfxman86.exe 580 igfxman86.exe 580 igfxman86.exe 444 igfxman86.exe 444 igfxman86.exe 2000 igfxman86.exe 2000 igfxman86.exe 2152 igfxman86.exe 2152 igfxman86.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2552 1972 f8a1a6d1f4c5e0140ba0f031e0619c1f_JaffaCakes118.exe 30 PID 1972 wrote to memory of 2552 1972 f8a1a6d1f4c5e0140ba0f031e0619c1f_JaffaCakes118.exe 30 PID 1972 wrote to memory of 2552 1972 f8a1a6d1f4c5e0140ba0f031e0619c1f_JaffaCakes118.exe 30 PID 1972 wrote to memory of 2552 1972 f8a1a6d1f4c5e0140ba0f031e0619c1f_JaffaCakes118.exe 30 PID 2552 wrote to memory of 2812 2552 igfxman86.exe 31 PID 2552 wrote to memory of 2812 2552 igfxman86.exe 31 PID 2552 wrote to memory of 2812 2552 igfxman86.exe 31 PID 2552 wrote to memory of 2812 2552 igfxman86.exe 31 PID 2812 wrote to memory of 2648 2812 igfxman86.exe 32 PID 2812 wrote to memory of 2648 2812 igfxman86.exe 32 PID 2812 wrote to memory of 2648 2812 igfxman86.exe 32 PID 2812 wrote to memory of 2648 2812 igfxman86.exe 32 PID 2648 wrote to memory of 2864 2648 igfxman86.exe 33 PID 2648 wrote to memory of 2864 2648 igfxman86.exe 33 PID 2648 wrote to memory of 2864 2648 igfxman86.exe 33 PID 2648 wrote to memory of 2864 2648 igfxman86.exe 33 PID 2864 wrote to memory of 2004 2864 igfxman86.exe 35 PID 2864 wrote to memory of 2004 2864 igfxman86.exe 35 PID 2864 wrote to memory of 2004 2864 igfxman86.exe 35 PID 2864 wrote to memory of 2004 2864 igfxman86.exe 35 PID 2004 wrote to memory of 2928 2004 igfxman86.exe 36 PID 2004 wrote to memory of 2928 2004 igfxman86.exe 36 PID 2004 wrote to memory of 2928 2004 igfxman86.exe 36 PID 2004 wrote to memory of 2928 2004 igfxman86.exe 36 PID 2928 wrote to memory of 2796 2928 igfxman86.exe 37 PID 2928 wrote to memory of 2796 2928 igfxman86.exe 37 PID 2928 wrote to memory of 2796 2928 igfxman86.exe 37 PID 2928 wrote to memory of 2796 2928 igfxman86.exe 37 PID 2796 wrote to memory of 2920 2796 igfxman86.exe 38 PID 2796 wrote to memory of 2920 2796 igfxman86.exe 38 PID 2796 wrote to memory of 2920 2796 igfxman86.exe 38 PID 2796 wrote to memory of 2920 2796 igfxman86.exe 38 PID 2920 wrote to memory of 2956 2920 igfxman86.exe 39 PID 2920 wrote to memory of 2956 2920 igfxman86.exe 39 PID 2920 wrote to memory of 2956 2920 igfxman86.exe 39 PID 2920 wrote to memory of 2956 2920 igfxman86.exe 39 PID 2956 wrote to memory of 2996 2956 igfxman86.exe 40 PID 2956 wrote to memory of 2996 2956 igfxman86.exe 40 PID 2956 wrote to memory of 2996 2956 igfxman86.exe 40 PID 2956 wrote to memory of 2996 2956 igfxman86.exe 40 PID 2996 wrote to memory of 2576 2996 igfxman86.exe 41 PID 2996 wrote to memory of 2576 2996 igfxman86.exe 41 PID 2996 wrote to memory of 2576 2996 igfxman86.exe 41 PID 2996 wrote to memory of 2576 2996 igfxman86.exe 41 PID 2576 wrote to memory of 1092 2576 igfxman86.exe 42 PID 2576 wrote to memory of 1092 2576 igfxman86.exe 42 PID 2576 wrote to memory of 1092 2576 igfxman86.exe 42 PID 2576 wrote to memory of 1092 2576 igfxman86.exe 42 PID 1092 wrote to memory of 712 1092 igfxman86.exe 43 PID 1092 wrote to memory of 712 1092 igfxman86.exe 43 PID 1092 wrote to memory of 712 1092 igfxman86.exe 43 PID 1092 wrote to memory of 712 1092 igfxman86.exe 43 PID 712 wrote to memory of 1772 712 igfxman86.exe 44 PID 712 wrote to memory of 1772 712 igfxman86.exe 44 PID 712 wrote to memory of 1772 712 igfxman86.exe 44 PID 712 wrote to memory of 1772 712 igfxman86.exe 44 PID 1772 wrote to memory of 1548 1772 igfxman86.exe 45 PID 1772 wrote to memory of 1548 1772 igfxman86.exe 45 PID 1772 wrote to memory of 1548 1772 igfxman86.exe 45 PID 1772 wrote to memory of 1548 1772 igfxman86.exe 45 PID 1548 wrote to memory of 2492 1548 igfxman86.exe 46 PID 1548 wrote to memory of 2492 1548 igfxman86.exe 46 PID 1548 wrote to memory of 2492 1548 igfxman86.exe 46 PID 1548 wrote to memory of 2492 1548 igfxman86.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8a1a6d1f4c5e0140ba0f031e0619c1f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f8a1a6d1f4c5e0140ba0f031e0619c1f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Users\Admin\AppData\Local\Temp\F8A1A6~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2492 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:328 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:888 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1600 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2588 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2240 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE23⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2896 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2772 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2748 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:356 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:988 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:588 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE29⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:580 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:444 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2000 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2152 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1416 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2996 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2576 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1092 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1332 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1252 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2080 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:780 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3048 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE42⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1052 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1908 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE44⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1972 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2716 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2548 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE47⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2132 -
C:\Windows\SysWOW64\igfxman86.exe"C:\Windows\system32\igfxman86.exe" C:\Windows\SysWOW64\IGFXMA~1.EXE48⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:3012
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
199KB
MD5f8a1a6d1f4c5e0140ba0f031e0619c1f
SHA1a4abfe05265cdb6a61fc47a852a84f22ef4e0419
SHA256e53e4993c6b7198cc04f7efd0623b2555d9c9cdf6d421212386a2a4bc201ce4e
SHA5121a16b277489a5193f0ff20d7d19b122b561ad7cb7a4ed70258c31a0e6bbbf9814b29ea9a516c7683aca0a67852507be2b9f83528fd5dda809200889504b9685a