Analysis
-
max time kernel
149s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03-11-2024 13:23
Static task
static1
Behavioral task
behavioral1
Sample
8bb0de12653c79c491ccd88cbd4d9c38_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8bb0de12653c79c491ccd88cbd4d9c38_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
8bb0de12653c79c491ccd88cbd4d9c38_JaffaCakes118.exe
-
Size
244KB
-
MD5
8bb0de12653c79c491ccd88cbd4d9c38
-
SHA1
e0b1562e1f8846a7c3198d1490b1c275234d60bf
-
SHA256
ed9fd821b1dfadc00cf953619b290b0f8e2c4f49195c365129365130aa8f2453
-
SHA512
49c221a5afd5f6089cd9dea8a816a89f6b6df6eb79646c084f2811aaf971c94b07649e83404f9da03000f09533f490d07cb6c64dc795695db66666f206dc8144
-
SSDEEP
6144:ubNgxYPVpzzN8aYFrPAQk42rpptCjI5y+WFEpQQ:ubNg2VdyFpd2rntCjIVW
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
Processes:
igfxdxr32.exepid Process 2744 igfxdxr32.exe -
Executes dropped EXE 45 IoCs
Processes:
igfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exepid Process 2744 igfxdxr32.exe 2844 igfxdxr32.exe 2616 igfxdxr32.exe 2292 igfxdxr32.exe 1776 igfxdxr32.exe 1820 igfxdxr32.exe 988 igfxdxr32.exe 2248 igfxdxr32.exe 2972 igfxdxr32.exe 2976 igfxdxr32.exe 2428 igfxdxr32.exe 568 igfxdxr32.exe 1200 igfxdxr32.exe 2952 igfxdxr32.exe 1688 igfxdxr32.exe 1288 igfxdxr32.exe 2148 igfxdxr32.exe 2544 igfxdxr32.exe 1832 igfxdxr32.exe 2188 igfxdxr32.exe 1680 igfxdxr32.exe 2856 igfxdxr32.exe 2668 igfxdxr32.exe 3048 igfxdxr32.exe 1984 igfxdxr32.exe 268 igfxdxr32.exe 2864 igfxdxr32.exe 1820 igfxdxr32.exe 956 igfxdxr32.exe 1780 igfxdxr32.exe 2164 igfxdxr32.exe 2780 igfxdxr32.exe 908 igfxdxr32.exe 2020 igfxdxr32.exe 2560 igfxdxr32.exe 2400 igfxdxr32.exe 2952 igfxdxr32.exe 1540 igfxdxr32.exe 2324 igfxdxr32.exe 2336 igfxdxr32.exe 1596 igfxdxr32.exe 1380 igfxdxr32.exe 2760 igfxdxr32.exe 596 igfxdxr32.exe 1616 igfxdxr32.exe -
Loads dropped DLL 64 IoCs
Processes:
8bb0de12653c79c491ccd88cbd4d9c38_JaffaCakes118.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exepid Process 2548 8bb0de12653c79c491ccd88cbd4d9c38_JaffaCakes118.exe 2548 8bb0de12653c79c491ccd88cbd4d9c38_JaffaCakes118.exe 2744 igfxdxr32.exe 2744 igfxdxr32.exe 2844 igfxdxr32.exe 2844 igfxdxr32.exe 2616 igfxdxr32.exe 2616 igfxdxr32.exe 2292 igfxdxr32.exe 2292 igfxdxr32.exe 1776 igfxdxr32.exe 1776 igfxdxr32.exe 1820 igfxdxr32.exe 1820 igfxdxr32.exe 988 igfxdxr32.exe 988 igfxdxr32.exe 2248 igfxdxr32.exe 2248 igfxdxr32.exe 2972 igfxdxr32.exe 2972 igfxdxr32.exe 2976 igfxdxr32.exe 2976 igfxdxr32.exe 2428 igfxdxr32.exe 2428 igfxdxr32.exe 568 igfxdxr32.exe 568 igfxdxr32.exe 1200 igfxdxr32.exe 1200 igfxdxr32.exe 2952 igfxdxr32.exe 2952 igfxdxr32.exe 1688 igfxdxr32.exe 1688 igfxdxr32.exe 1288 igfxdxr32.exe 1288 igfxdxr32.exe 2148 igfxdxr32.exe 2148 igfxdxr32.exe 2544 igfxdxr32.exe 2544 igfxdxr32.exe 1832 igfxdxr32.exe 1832 igfxdxr32.exe 2188 igfxdxr32.exe 2188 igfxdxr32.exe 1680 igfxdxr32.exe 1680 igfxdxr32.exe 2856 igfxdxr32.exe 2856 igfxdxr32.exe 2668 igfxdxr32.exe 2668 igfxdxr32.exe 3048 igfxdxr32.exe 3048 igfxdxr32.exe 1984 igfxdxr32.exe 1984 igfxdxr32.exe 268 igfxdxr32.exe 268 igfxdxr32.exe 2864 igfxdxr32.exe 2864 igfxdxr32.exe 1820 igfxdxr32.exe 1820 igfxdxr32.exe 956 igfxdxr32.exe 956 igfxdxr32.exe 1780 igfxdxr32.exe 1780 igfxdxr32.exe 2164 igfxdxr32.exe 2164 igfxdxr32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
igfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exe8bb0de12653c79c491ccd88cbd4d9c38_JaffaCakes118.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 8bb0de12653c79c491ccd88cbd4d9c38_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 8bb0de12653c79c491ccd88cbd4d9c38_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdxr32.exe -
Drops file in System32 directory 64 IoCs
Processes:
igfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exe8bb0de12653c79c491ccd88cbd4d9c38_JaffaCakes118.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe 8bb0de12653c79c491ccd88cbd4d9c38_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File opened for modification C:\Windows\SysWOW64\ igfxdxr32.exe File created C:\Windows\SysWOW64\igfxdxr32.exe igfxdxr32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 45 IoCs
Processes:
8bb0de12653c79c491ccd88cbd4d9c38_JaffaCakes118.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exepid Process 2548 8bb0de12653c79c491ccd88cbd4d9c38_JaffaCakes118.exe 2744 igfxdxr32.exe 2844 igfxdxr32.exe 2616 igfxdxr32.exe 2292 igfxdxr32.exe 1776 igfxdxr32.exe 1820 igfxdxr32.exe 988 igfxdxr32.exe 2248 igfxdxr32.exe 2972 igfxdxr32.exe 2976 igfxdxr32.exe 2428 igfxdxr32.exe 568 igfxdxr32.exe 1200 igfxdxr32.exe 2952 igfxdxr32.exe 1688 igfxdxr32.exe 1288 igfxdxr32.exe 2148 igfxdxr32.exe 2544 igfxdxr32.exe 1832 igfxdxr32.exe 2188 igfxdxr32.exe 1680 igfxdxr32.exe 2856 igfxdxr32.exe 2668 igfxdxr32.exe 3048 igfxdxr32.exe 1984 igfxdxr32.exe 268 igfxdxr32.exe 2864 igfxdxr32.exe 1820 igfxdxr32.exe 956 igfxdxr32.exe 1780 igfxdxr32.exe 2164 igfxdxr32.exe 2780 igfxdxr32.exe 908 igfxdxr32.exe 2020 igfxdxr32.exe 2560 igfxdxr32.exe 2400 igfxdxr32.exe 2952 igfxdxr32.exe 1540 igfxdxr32.exe 2324 igfxdxr32.exe 1596 igfxdxr32.exe 1380 igfxdxr32.exe 2760 igfxdxr32.exe 596 igfxdxr32.exe 1616 igfxdxr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 45 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
igfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exe8bb0de12653c79c491ccd88cbd4d9c38_JaffaCakes118.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8bb0de12653c79c491ccd88cbd4d9c38_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdxr32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
8bb0de12653c79c491ccd88cbd4d9c38_JaffaCakes118.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exepid Process 2548 8bb0de12653c79c491ccd88cbd4d9c38_JaffaCakes118.exe 2548 8bb0de12653c79c491ccd88cbd4d9c38_JaffaCakes118.exe 2548 8bb0de12653c79c491ccd88cbd4d9c38_JaffaCakes118.exe 2548 8bb0de12653c79c491ccd88cbd4d9c38_JaffaCakes118.exe 2548 8bb0de12653c79c491ccd88cbd4d9c38_JaffaCakes118.exe 2548 8bb0de12653c79c491ccd88cbd4d9c38_JaffaCakes118.exe 2548 8bb0de12653c79c491ccd88cbd4d9c38_JaffaCakes118.exe 2548 8bb0de12653c79c491ccd88cbd4d9c38_JaffaCakes118.exe 2548 8bb0de12653c79c491ccd88cbd4d9c38_JaffaCakes118.exe 2548 8bb0de12653c79c491ccd88cbd4d9c38_JaffaCakes118.exe 2548 8bb0de12653c79c491ccd88cbd4d9c38_JaffaCakes118.exe 2548 8bb0de12653c79c491ccd88cbd4d9c38_JaffaCakes118.exe 2548 8bb0de12653c79c491ccd88cbd4d9c38_JaffaCakes118.exe 2548 8bb0de12653c79c491ccd88cbd4d9c38_JaffaCakes118.exe 2548 8bb0de12653c79c491ccd88cbd4d9c38_JaffaCakes118.exe 2548 8bb0de12653c79c491ccd88cbd4d9c38_JaffaCakes118.exe 2744 igfxdxr32.exe 2744 igfxdxr32.exe 2744 igfxdxr32.exe 2744 igfxdxr32.exe 2744 igfxdxr32.exe 2744 igfxdxr32.exe 2744 igfxdxr32.exe 2744 igfxdxr32.exe 2744 igfxdxr32.exe 2744 igfxdxr32.exe 2744 igfxdxr32.exe 2744 igfxdxr32.exe 2744 igfxdxr32.exe 2744 igfxdxr32.exe 2744 igfxdxr32.exe 2744 igfxdxr32.exe 2844 igfxdxr32.exe 2844 igfxdxr32.exe 2844 igfxdxr32.exe 2844 igfxdxr32.exe 2844 igfxdxr32.exe 2844 igfxdxr32.exe 2844 igfxdxr32.exe 2844 igfxdxr32.exe 2844 igfxdxr32.exe 2844 igfxdxr32.exe 2844 igfxdxr32.exe 2844 igfxdxr32.exe 2844 igfxdxr32.exe 2844 igfxdxr32.exe 2844 igfxdxr32.exe 2844 igfxdxr32.exe 2616 igfxdxr32.exe 2616 igfxdxr32.exe 2616 igfxdxr32.exe 2616 igfxdxr32.exe 2616 igfxdxr32.exe 2616 igfxdxr32.exe 2616 igfxdxr32.exe 2616 igfxdxr32.exe 2616 igfxdxr32.exe 2616 igfxdxr32.exe 2616 igfxdxr32.exe 2616 igfxdxr32.exe 2616 igfxdxr32.exe 2616 igfxdxr32.exe 2616 igfxdxr32.exe 2616 igfxdxr32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
8bb0de12653c79c491ccd88cbd4d9c38_JaffaCakes118.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exeigfxdxr32.exedescription pid Process procid_target PID 2548 wrote to memory of 2744 2548 8bb0de12653c79c491ccd88cbd4d9c38_JaffaCakes118.exe 29 PID 2548 wrote to memory of 2744 2548 8bb0de12653c79c491ccd88cbd4d9c38_JaffaCakes118.exe 29 PID 2548 wrote to memory of 2744 2548 8bb0de12653c79c491ccd88cbd4d9c38_JaffaCakes118.exe 29 PID 2548 wrote to memory of 2744 2548 8bb0de12653c79c491ccd88cbd4d9c38_JaffaCakes118.exe 29 PID 2744 wrote to memory of 2844 2744 igfxdxr32.exe 30 PID 2744 wrote to memory of 2844 2744 igfxdxr32.exe 30 PID 2744 wrote to memory of 2844 2744 igfxdxr32.exe 30 PID 2744 wrote to memory of 2844 2744 igfxdxr32.exe 30 PID 2844 wrote to memory of 2616 2844 igfxdxr32.exe 31 PID 2844 wrote to memory of 2616 2844 igfxdxr32.exe 31 PID 2844 wrote to memory of 2616 2844 igfxdxr32.exe 31 PID 2844 wrote to memory of 2616 2844 igfxdxr32.exe 31 PID 2616 wrote to memory of 2292 2616 igfxdxr32.exe 32 PID 2616 wrote to memory of 2292 2616 igfxdxr32.exe 32 PID 2616 wrote to memory of 2292 2616 igfxdxr32.exe 32 PID 2616 wrote to memory of 2292 2616 igfxdxr32.exe 32 PID 2292 wrote to memory of 1776 2292 igfxdxr32.exe 33 PID 2292 wrote to memory of 1776 2292 igfxdxr32.exe 33 PID 2292 wrote to memory of 1776 2292 igfxdxr32.exe 33 PID 2292 wrote to memory of 1776 2292 igfxdxr32.exe 33 PID 1776 wrote to memory of 1820 1776 igfxdxr32.exe 34 PID 1776 wrote to memory of 1820 1776 igfxdxr32.exe 34 PID 1776 wrote to memory of 1820 1776 igfxdxr32.exe 34 PID 1776 wrote to memory of 1820 1776 igfxdxr32.exe 34 PID 1820 wrote to memory of 988 1820 igfxdxr32.exe 35 PID 1820 wrote to memory of 988 1820 igfxdxr32.exe 35 PID 1820 wrote to memory of 988 1820 igfxdxr32.exe 35 PID 1820 wrote to memory of 988 1820 igfxdxr32.exe 35 PID 988 wrote to memory of 2248 988 igfxdxr32.exe 36 PID 988 wrote to memory of 2248 988 igfxdxr32.exe 36 PID 988 wrote to memory of 2248 988 igfxdxr32.exe 36 PID 988 wrote to memory of 2248 988 igfxdxr32.exe 36 PID 2248 wrote to memory of 2972 2248 igfxdxr32.exe 37 PID 2248 wrote to memory of 2972 2248 igfxdxr32.exe 37 PID 2248 wrote to memory of 2972 2248 igfxdxr32.exe 37 PID 2248 wrote to memory of 2972 2248 igfxdxr32.exe 37 PID 2972 wrote to memory of 2976 2972 igfxdxr32.exe 38 PID 2972 wrote to memory of 2976 2972 igfxdxr32.exe 38 PID 2972 wrote to memory of 2976 2972 igfxdxr32.exe 38 PID 2972 wrote to memory of 2976 2972 igfxdxr32.exe 38 PID 2976 wrote to memory of 2428 2976 igfxdxr32.exe 39 PID 2976 wrote to memory of 2428 2976 igfxdxr32.exe 39 PID 2976 wrote to memory of 2428 2976 igfxdxr32.exe 39 PID 2976 wrote to memory of 2428 2976 igfxdxr32.exe 39 PID 2428 wrote to memory of 568 2428 igfxdxr32.exe 40 PID 2428 wrote to memory of 568 2428 igfxdxr32.exe 40 PID 2428 wrote to memory of 568 2428 igfxdxr32.exe 40 PID 2428 wrote to memory of 568 2428 igfxdxr32.exe 40 PID 568 wrote to memory of 1200 568 igfxdxr32.exe 41 PID 568 wrote to memory of 1200 568 igfxdxr32.exe 41 PID 568 wrote to memory of 1200 568 igfxdxr32.exe 41 PID 568 wrote to memory of 1200 568 igfxdxr32.exe 41 PID 1200 wrote to memory of 2952 1200 igfxdxr32.exe 42 PID 1200 wrote to memory of 2952 1200 igfxdxr32.exe 42 PID 1200 wrote to memory of 2952 1200 igfxdxr32.exe 42 PID 1200 wrote to memory of 2952 1200 igfxdxr32.exe 42 PID 2952 wrote to memory of 1688 2952 igfxdxr32.exe 43 PID 2952 wrote to memory of 1688 2952 igfxdxr32.exe 43 PID 2952 wrote to memory of 1688 2952 igfxdxr32.exe 43 PID 2952 wrote to memory of 1688 2952 igfxdxr32.exe 43 PID 1688 wrote to memory of 1288 1688 igfxdxr32.exe 44 PID 1688 wrote to memory of 1288 1688 igfxdxr32.exe 44 PID 1688 wrote to memory of 1288 1688 igfxdxr32.exe 44 PID 1688 wrote to memory of 1288 1688 igfxdxr32.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\8bb0de12653c79c491ccd88cbd4d9c38_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8bb0de12653c79c491ccd88cbd4d9c38_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Users\Admin\AppData\Local\Temp\8BB0DE~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1288 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2148 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE19⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2544 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1832 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2188 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1680 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2856 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2668 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3048 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1984 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:268 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2864 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE29⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1820 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:956 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1780 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2164 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2780 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:908 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2020 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2560 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE37⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2400 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2952 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1540 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2324 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2336 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE42⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1596 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1380 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2760 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:596 -
C:\Windows\SysWOW64\igfxdxr32.exe"C:\Windows\system32\igfxdxr32.exe" C:\Windows\SysWOW64\IGFXDX~1.EXE46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1616
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
244KB
MD58bb0de12653c79c491ccd88cbd4d9c38
SHA1e0b1562e1f8846a7c3198d1490b1c275234d60bf
SHA256ed9fd821b1dfadc00cf953619b290b0f8e2c4f49195c365129365130aa8f2453
SHA51249c221a5afd5f6089cd9dea8a816a89f6b6df6eb79646c084f2811aaf971c94b07649e83404f9da03000f09533f490d07cb6c64dc795695db66666f206dc8144